This document proposes a unified dashboard for managing collaborative robot (COBOT) systems across multiple factories. The dashboard would provide centralized monitoring and control of COBOT assets and production data. It incorporates interactive 3D visualization of COBOT movement for troubleshooting. The dashboard has role-based access, with views tailored for super administrators, administrators and regular users. It utilizes a hierarchical interface and "batch actions" to efficiently manage large numbers of COBOTs.
Improved learning through remote desktop mirroring controlConference Papers
The document describes a Wireless Stream Management System (WSMS) that allows a moderator (teacher) to remotely manage and control wireless screen mirroring from student devices to support collaborative learning. Key features of WSMS include allowing the teacher to select any student's laptop screen to project, enabling the teacher to remotely control the student's laptop, and distributing presentation content as images to student devices. The system architecture uses various components like a Wireless Screen Sender, Receiver, Administrator and Controller. Performance tests showed the system using under 2 Mbps of bandwidth and latency under 173ms with no major CPU utilization issues.
Cobot fleet management system using cloud and edge computing bukharyConference Papers
This document proposes a Cobot Fleet Management System (CFMS) that uses cloud and edge computing to manage multiple collaborative robots (cobots) in factories. The CFMS has a dual-sided architecture with cloud-based centralized control and management, and edge computing nodes that bridge communication between the manufacturing floor and cloud applications. The CFMS is intended to automate and simplify cobot development, deployment, operation, and maintenance. It would collect health and production data from cobots, enable simulation and design tools in the cloud, and provide predictive maintenance and error notifications to support zero downtime.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and popular orchestration platforms like Docker Swarm and Kubernetes. It then highlights issues with default scheduling approaches and proposes a resource-aware placement algorithm and SLA-based monitoring to minimize container migration and ensure performance. The key components of the proposed architecture are described and its advantages over default scheduling are discussed. In conclusion, the solution is meant to benefit container orchestrators by improving application performance through more effective scheduling and issues prevention.
Improved learning through remote desktop mirroring controlConference Papers
The document describes a Wireless Stream Management System (WSMS) that allows a moderator (teacher) to remotely manage and control wireless screen mirroring from student devices to support collaborative learning. Key features of WSMS include allowing the teacher to select any student's laptop screen to project, enabling the teacher to remotely control the student's laptop, and distributing presentation content as images to student devices. The system architecture uses various components like a Wireless Screen Sender, Receiver, Administrator and Controller. Performance tests showed the system using under 2 Mbps of bandwidth and latency under 173ms with no major CPU utilization issues.
Cobot fleet management system using cloud and edge computing bukharyConference Papers
This document proposes a Cobot Fleet Management System (CFMS) that uses cloud and edge computing to manage multiple collaborative robots (cobots) in factories. The CFMS has a dual-sided architecture with cloud-based centralized control and management, and edge computing nodes that bridge communication between the manufacturing floor and cloud applications. The CFMS is intended to automate and simplify cobot development, deployment, operation, and maintenance. It would collect health and production data from cobots, enable simulation and design tools in the cloud, and provide predictive maintenance and error notifications to support zero downtime.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and popular orchestration platforms like Docker Swarm and Kubernetes. It then highlights issues with default scheduling approaches and proposes a resource-aware placement algorithm and SLA-based monitoring to minimize container migration and ensure performance. The key components of the proposed architecture are described and its advantages over default scheduling are discussed. In conclusion, the solution is meant to benefit container orchestrators by improving application performance through more effective scheduling and issues prevention.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software testing automation a comparative study on productivity rate of ope...Conference Papers
This document compares the productivity of two open source automated software testing tools, Robot Framework 3.0 and Katalon Studio 7.0, for testing smart manufacturing applications. Ten subject matter experts tested their productivity using each tool across various stages of the software development lifecycle. Katalon Studio 7.0 was found to be significantly more productive than Robot Framework 3.0 based on statistical analysis of the time taken using each tool. The study provides guidance for selecting automated testing tools to improve productivity for software test engineers working in smart manufacturing.
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a
framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called "CaRE – Custom Assistance for Remote Employees". With possible Architectural Smells and Anti-Pattern in mind, a Microservice Architecture shall be presented which forms the backend-system of CaRE.
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
This document summarizes an article from the International Journal of Computer Networks and Communications Security about developing service level agreement (SLA) based information security metrics for cloud computing using the COBIT framework. The article discusses how information security metrics can help cloud customers and providers measure and improve security. It also explains that while SLAs are commonly used to measure performance, they do not typically address information security risks. The article proposes using elements of the COBIT framework to build SLA-based information security metrics for cloud computing.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
This document discusses security issues and challenges in mobile cloud computing. It begins by introducing mobile cloud computing and its architecture, which connects mobile devices to cloud resources over wireless networks. It then discusses some key characteristics of mobile cloud computing like computing as a service and the SPI service model.
The document focuses on security issues, separating them into those associated with the cloud and those related to mobile networks. For the cloud, it discusses risks from data sharing in a multi-tenant environment, unauthorized access, and lack of transparency. For mobile networks, it covers loss of control over data, privacy, lack of quality guarantees, and legal/regulatory compliance challenges. It concludes by suggesting some solutions to these security problems like data encryption, access
This document discusses dynamic resource allocation using virtual machines. It begins by introducing cloud computing and how it allows scaling of resource usage based on demand through virtualization technology. It then analyzes the existing system of mapping virtual machines to physical resources and proposes an automated resource management system to achieve a balance between overload avoidance and green computing. The key modules of the proposed system are described as the cloud computing module, resource management module, and virtualization module. It further discusses system requirements, feasibility analysis, various UML diagrams including use case diagrams and sequence diagrams, and concludes with describing the software technologies used.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses the development of a Virtual Computing Lab (VCL) using a private cloud at Terna Engineering College in India. It begins with an abstract that outlines how a VCL and private cloud can help meet increasing demands on limited resources. It then reviews related work on VCL implementations at other universities. The proposed system would use the open-source Eucalyptus framework to create the private cloud infrastructure and provide on-demand access to virtual machines and applications through a web portal. Setting up the private cloud involves configuring controller and node machines running Eucalyptus services. Once complete, students and faculty could remotely launch and manage virtual environments. The conclusion discusses potential future work like expanding capabilities and mobile access.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
This document presents a reference framework for classifying software quality models. It proposes analyzing software quality using four "worlds": 1) Subject World, which defines what software quality is, 2) Usage World, which identifies user intentions and goals for quality, 3) System World, which specifies how quality will be represented and measured, and 4) Development World, which contains processes and tools to achieve quality objectives. Each world addresses a fundamental question about quality. The framework characterizes each model based on attributes within these worlds. It aims to provide a comprehensive way to analyze, compare, and develop software quality models.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
This document summarizes a research paper on secure virtualization for cloud environments. The paper proposes a two-tier security architecture that uses multiple working modes for security components at the guest level to decrease overhead from security processes. It also includes a security supervisor at the hypervisor layer to avoid false security alarms. The paper discusses security issues in virtualized cloud environments like access control vulnerabilities, DOS attacks, vulnerabilities in the virtualization platform and security management. It proposes solutions like access control policies, load balancing during attacks, secure administrative zones, and additional security mechanisms like firewalls and intrusion detection to address these issues.
This document proposes a model for resource management using a volunteering community cloud for educational purposes. It utilizes underutilized computing resources from organizations through virtualization to provide software services at a lower cost, especially for rural schools. The model uses Citrix XenServer to create virtual machines from idle resources. A web app is developed for educational management and deployed in the community cloud. Load balancing is achieved through the Gale-Shapley algorithm to optimally match user demands to available resources. This ensures resources are utilized efficiently while providing reliable services to users in a cost-effective manner.
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
1) Homomorphic encryption allows processing of encrypted data without decrypting it first, enabling secure computations on outsourced data in cloud computing.
2) A homomorphic encryption scheme is proposed that uses a large integer ring as the plaintext space and a single key for encryption and decryption, providing confidentiality even when a non-trusted cloud server processes encrypted data.
3) The scheme could enable applications like private queries to a search engine, private information retrieval from databases, and secure electronic voting by allowing computations on encrypted data.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Ibm bluemix—from idea to application by karim abousederaBill Duncan
IBM Bluemix is a platform as a service (PaaS) that allows developers to quickly build, deploy and manage applications on a cloud-based platform using various programming languages, frameworks and services. Bluemix uses Cloud Foundry as its underlying open source technology and is powered by IBM's SoftLayer infrastructure. Bluemix provides features like a web IDE, source code management, continuous delivery and integration capabilities to simplify the development lifecycle.
IoT platforms provide tools and services to connect heterogeneous IoT devices, enable data flow and storage, and offer data analysis capabilities. They are scalable to handle billions of devices and messages per hour. Key features of IoT platforms include powerful data analytics and visualization dashboards, integration with other tools and platforms, and pay-as-you-go pricing models. Popular IoT platforms include Google Cloud Platform, Salesforce IoT Cloud, ThingWorx, IBM Watson IoT, Amazon AWS IoT Core, Microsoft Azure IoT Suite, Oracle IoT, and Cisco IoT Cloud Connect.
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
This document discusses testing uncertainties in cyber-physical systems (CPS) that span Internet of Things (IoT) and cloud infrastructures. It proposes combining model-driven engineering and elastic execution techniques to dynamically provision both the CPS under test and testing utilities across various IoT and cloud infrastructures. Specifically, it suggests using software-defined IoT units and cloud-based elastic services that can be composed, controlled via APIs, and provisioned elastically to enable testing CPS configurations and behaviors across heterogeneous environments.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software testing automation a comparative study on productivity rate of ope...Conference Papers
This document compares the productivity of two open source automated software testing tools, Robot Framework 3.0 and Katalon Studio 7.0, for testing smart manufacturing applications. Ten subject matter experts tested their productivity using each tool across various stages of the software development lifecycle. Katalon Studio 7.0 was found to be significantly more productive than Robot Framework 3.0 based on statistical analysis of the time taken using each tool. The study provides guidance for selecting automated testing tools to improve productivity for software test engineers working in smart manufacturing.
CARE –AN ARCHITECTURAL APPROACH FOR A MULTIMEDIA ASSISTANCE SYSTEM FOR SINGLE...IJITCA Journal
In contrast to the increasing degree of automation in the production industry, commissioning and maintenance activities will essentially be limited to manual activities. Production involves repetitive actions that are manageable and clearly defined as a process. Unlike this, commissioning and maintenance have to deal with uncontrollable, undefined, and non - standardized processes. The paper provides a
framework for a multimedia assistance system for singletons. It was found that the paradigm has to consist of five key components to provide tailored assistance to customers. These key components are Expertise, Infrastructure, Application & Platforms, Security & Privacy and Business Process & Business Model. The resulting stack and the overlaying business model are called "CaRE – Custom Assistance for Remote Employees". With possible Architectural Smells and Anti-Pattern in mind, a Microservice Architecture shall be presented which forms the backend-system of CaRE.
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
This document summarizes an article from the International Journal of Computer Networks and Communications Security about developing service level agreement (SLA) based information security metrics for cloud computing using the COBIT framework. The article discusses how information security metrics can help cloud customers and providers measure and improve security. It also explains that while SLAs are commonly used to measure performance, they do not typically address information security risks. The article proposes using elements of the COBIT framework to build SLA-based information security metrics for cloud computing.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
This document discusses security issues and challenges in mobile cloud computing. It begins by introducing mobile cloud computing and its architecture, which connects mobile devices to cloud resources over wireless networks. It then discusses some key characteristics of mobile cloud computing like computing as a service and the SPI service model.
The document focuses on security issues, separating them into those associated with the cloud and those related to mobile networks. For the cloud, it discusses risks from data sharing in a multi-tenant environment, unauthorized access, and lack of transparency. For mobile networks, it covers loss of control over data, privacy, lack of quality guarantees, and legal/regulatory compliance challenges. It concludes by suggesting some solutions to these security problems like data encryption, access
This document discusses dynamic resource allocation using virtual machines. It begins by introducing cloud computing and how it allows scaling of resource usage based on demand through virtualization technology. It then analyzes the existing system of mapping virtual machines to physical resources and proposes an automated resource management system to achieve a balance between overload avoidance and green computing. The key modules of the proposed system are described as the cloud computing module, resource management module, and virtualization module. It further discusses system requirements, feasibility analysis, various UML diagrams including use case diagrams and sequence diagrams, and concludes with describing the software technologies used.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document discusses the development of a Virtual Computing Lab (VCL) using a private cloud at Terna Engineering College in India. It begins with an abstract that outlines how a VCL and private cloud can help meet increasing demands on limited resources. It then reviews related work on VCL implementations at other universities. The proposed system would use the open-source Eucalyptus framework to create the private cloud infrastructure and provide on-demand access to virtual machines and applications through a web portal. Setting up the private cloud involves configuring controller and node machines running Eucalyptus services. Once complete, students and faculty could remotely launch and manage virtual environments. The conclusion discusses potential future work like expanding capabilities and mobile access.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
This document presents a reference framework for classifying software quality models. It proposes analyzing software quality using four "worlds": 1) Subject World, which defines what software quality is, 2) Usage World, which identifies user intentions and goals for quality, 3) System World, which specifies how quality will be represented and measured, and 4) Development World, which contains processes and tools to achieve quality objectives. Each world addresses a fundamental question about quality. The framework characterizes each model based on attributes within these worlds. It aims to provide a comprehensive way to analyze, compare, and develop software quality models.
micE Model for Defining Enterprise Mobile Strategyidescitation
Enterprises develop mobile solutions based on competitor offerings and
immediate business needs, without a clear enterprise wide mobile strategy. Thin, thick and
hybrid mobile apps, enterprise mobile platforms, mobile cloud services are all available
across a range of budgets and timing needs, and can be leveraged based on requirement.
Enterprise mobile strategy is typically viewed from the lenses of the IT stakeholders, who
often times have very focused and narrow agendas. The outcome of proceeding with point
solutions to address immediate needs, is unused licenses, replication of effort, rework due to
lack of proper guidelines and other issues that all lead to increased capital and operational
expenditure. This paper defines a user centric, holistic micE model for defining enterprise
mobile strategy and a staged process in leveraging the model in enterprise context.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
This document summarizes a research paper on secure virtualization for cloud environments. The paper proposes a two-tier security architecture that uses multiple working modes for security components at the guest level to decrease overhead from security processes. It also includes a security supervisor at the hypervisor layer to avoid false security alarms. The paper discusses security issues in virtualized cloud environments like access control vulnerabilities, DOS attacks, vulnerabilities in the virtualization platform and security management. It proposes solutions like access control policies, load balancing during attacks, secure administrative zones, and additional security mechanisms like firewalls and intrusion detection to address these issues.
This document proposes a model for resource management using a volunteering community cloud for educational purposes. It utilizes underutilized computing resources from organizations through virtualization to provide software services at a lower cost, especially for rural schools. The model uses Citrix XenServer to create virtual machines from idle resources. A web app is developed for educational management and deployed in the community cloud. Load balancing is achieved through the Gale-Shapley algorithm to optimally match user demands to available resources. This ensures resources are utilized efficiently while providing reliable services to users in a cost-effective manner.
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
1) Homomorphic encryption allows processing of encrypted data without decrypting it first, enabling secure computations on outsourced data in cloud computing.
2) A homomorphic encryption scheme is proposed that uses a large integer ring as the plaintext space and a single key for encryption and decryption, providing confidentiality even when a non-trusted cloud server processes encrypted data.
3) The scheme could enable applications like private queries to a search engine, private information retrieval from databases, and secure electronic voting by allowing computations on encrypted data.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Ibm bluemix—from idea to application by karim abousederaBill Duncan
IBM Bluemix is a platform as a service (PaaS) that allows developers to quickly build, deploy and manage applications on a cloud-based platform using various programming languages, frameworks and services. Bluemix uses Cloud Foundry as its underlying open source technology and is powered by IBM's SoftLayer infrastructure. Bluemix provides features like a web IDE, source code management, continuous delivery and integration capabilities to simplify the development lifecycle.
IoT platforms provide tools and services to connect heterogeneous IoT devices, enable data flow and storage, and offer data analysis capabilities. They are scalable to handle billions of devices and messages per hour. Key features of IoT platforms include powerful data analytics and visualization dashboards, integration with other tools and platforms, and pay-as-you-go pricing models. Popular IoT platforms include Google Cloud Platform, Salesforce IoT Cloud, ThingWorx, IBM Watson IoT, Amazon AWS IoT Core, Microsoft Azure IoT Suite, Oracle IoT, and Cisco IoT Cloud Connect.
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET Journal
This document discusses testing uncertainties in cyber-physical systems (CPS) that span Internet of Things (IoT) and cloud infrastructures. It proposes combining model-driven engineering and elastic execution techniques to dynamically provision both the CPS under test and testing utilities across various IoT and cloud infrastructures. Specifically, it suggests using software-defined IoT units and cloud-based elastic services that can be composed, controlled via APIs, and provisioned elastically to enable testing CPS configurations and behaviors across heterogeneous environments.
IRJET- IoT based Vending Machine with Cashless PaymentIRJET Journal
This document describes an IoT-based vending machine that allows for cashless payment. The proposed system uses a website interface for customers to select products, make online payments using Razorpay, and receive a unique code to enter at the vending machine to retrieve their purchase. An Arduino board connected to the vending machine via WiFi receives the code and verifies payment by checking a database before using servo motors to dispense the correct product. The system aims to streamline the purchasing process and eliminate the need to carry cash.
The document discusses workplace telecommunications systems at XYZ Corporation. Their phone system consists of 1,000 digital phones that help improve efficiency through enhanced features like expandable buttons and the ability to move phones without wiring changes. The organization uses an interactive voice response system for time and attendance tracking across multiple locations. Citrix servers enable on-demand, secure access for users through a flexible architecture.
The idea that the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) are fads is quickly fading. Today, the real challenge is how to implement a solution that can adjust to the volatility of a rapidly changing market. The round-table features how does IIoT trends help to illustrate on using a platform-based approach to address such challenges.
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
1. The document discusses several emerging technologies including context-aware computing, cloud computing, fabric-based computers, quantum computing, ubiquitous computing, in-memory computing, Senseye technology, consumerization, big data analytics, social media analytics, real-time analytics, voice command applications, and augmented reality.
2. It provides brief descriptions and examples of each technology as well as potential uses and applicability in business and other sectors.
3. Many of the technologies are still in development but aim to improve areas like data access, analysis, security, and human-computer interaction through mobility and natural interfaces.
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
1. The document discusses several emerging technologies including context-aware computing, cloud computing, fabric-based computers, quantum computing, ubiquitous computing, in-memory computing, Senseye technology, consumerization, big data analytics, social media analytics, real-time analytics, voice command applications, and augmented reality.
2. Many of these technologies can be applied in insurance and other sectors to increase efficiency, gain insights from large datasets, and better serve customers through personalized, real-time interactions and information.
3. Emerging technologies will continue to change how businesses operate as consumers increasingly demand online, self-service options available anywhere, anytime.
The Architecture Of Software Defined Radios EssayDivya Watson
This project aims to build a smart assistant to help users purchase books online by integrating
multiple sources of information about books and the purchasing process into a single system. By
consolidating data from sources about books, reviews, prices and retailers, the assistant can provide
users all the necessary information to make an informed purchase decision in one place. The goal is
to streamline the online book buying experience for users by eliminating the need to search across
multiple websites during the purchase process.
Business success increasingly depends on
the ability to apply new and innovative
business models and supporting IT solutions
more quickly than one's competitors can. In
short, it requires an agile enterprise. Recent
advancements in cloud computing can provide
an enterprise with the essential capabilities it
needs to become an agile enterprise
This document provides an overview of cloud computing and its role in IoT. It discusses key cloud computing concepts like SaaS, PaaS, and IaaS and how cloud services allow for cost savings, global access, and other benefits. The document also introduces IoT, describing how embedded devices connect things to the internet and how an IoT platform bridges devices and applications. Decision frameworks and architectures for IoT are outlined which involve areas like user experience, data, security and more. Finally, popular IoT platforms from Amazon, Microsoft, IBM and others are highlighted.
Industry 4.0 or the fourth industrial revolution, which has been introduced by German government in 2012 [1], which is depends on the integration of different categories of electrical and electronic devices, from personal computers, smartphones, smartwatches, machinery robotics and enterprise resource planning systems, which can be integrated together and communicated with others to analyse the optimal criteria of potential solutions for improving productivity via internet [2]. however, the requirements of the new technology will force the old technology to retired. which will will force the big companies to change the specification of the industrial components to keep up with the latest processors. Ultimately, the goal of Industry 4.0 is to produce smarter and resource-efficient factories which are more productive and competitive says Mika Lomax [3]. Which mean that the Devices are getting smarter. "Not only does the IIoT enable real-time monitoring on smartphones and via emails, but, in plants, everyone has LCDs (liquid-crystal displays), TV screens and marquees showing the production staff useful information," says Kumar. "The technology in the modern HMI, including drivers and connectivity, is moving to message displays and marquees. This will enable programming and monitoring in these smart displays. Technology is pushing PLC and HMI functionality to text displays and it will all be connected to the IIoT."[4] The characteristics of high-technology industries include steady order quantities, standardized product features and high product value [3].
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
STUDY OF VARIOUS INTERNET OF THINGS PLATFORMSIJCSES Journal
Internet of Things is a technological revolution which provides the vision of connected world of Things.Devices, people and systems are connected with one another in such a way that they can communicate with each other over Internet. So the form of communication from human-human is now turned into humanhuman,human-things and things- things. Variety of platforms are now a days available that can support
entire development to deployment of IoT applications and systems. In this paper, we will first start with the introduction of IoT platforms as well as IoT middle ware and then will discuss various IoT platforms,compare various IoT platforms and will end up with the conclusion.
The document discusses cloud mobility and mobile enterprise application platforms. It describes how bringing your own device (BYOD) allows users flexibility and increases productivity. It also outlines some business problems with mobilizing systems, like separating processes, security, integration, and supporting different devices and infrastructure. The document then explains that mobile enterprise application platforms allow "any app to any device" and discusses key elements like middleware, management tools, and application development environments.
The document provides background information on the instructor for a cloud computing course. It introduces Tudor Marius Cosmin as the instructor and outlines his professional experience in cloud delivery and IT management. It also reviews the course timetable and provides an overview of topics to be covered in the first session, including a history of cloud computing, fundamental concepts and terminology, cloud characteristics and delivery models, and benefits and challenges of cloud computing.
Here are some ways people who cannot read the alphabet can still learn to read:
- Learn to read braille. Braille uses patterns of raised dots that can be read with the fingers. It allows blind and visually impaired people to read text independently.
- Use assistive technology like screen readers. Screen readers are programs or devices that read digital text out loud. They work with many electronic devices like computers, smartphones, and e-readers. This allows non-alphabet readers to access written content.
- Memorize common symbols, logos, or pictograms. Many public signs, labels, and icons use universal visuals instead of words. With exposure and practice, non-readers can learn to interpret these symbols.
A Survey Embedded Systems Supporting By Different Operating Systems.pdfFiona Phillips
This document discusses different operating systems that support embedded systems. It begins by defining embedded systems and their increasing use in various applications like consumer electronics, medical devices, transportation systems, and wireless sensor networks. It then examines several commonly used operating systems for embedded systems like QNX, Windows CE, Linux, and domain-specific operating systems for sensor networks. For each OS, it provides details on features like architecture, scheduling algorithms, memory management, and language support. It concludes by characterizing embedded systems as either standalone or networked systems and provides examples of each type.
Similar to A unified dashboard for collaborative robot management system (20)
The document describes an AI-driven Occupational Skills Generator (AIOSG) that aims to automate the process of creating occupational skills reference documents. The AIOSG utilizes an intelligent web crawler, natural language processing, neural networks, and a blockchain to gather data on occupational skills from various sources, analyze the data, and generate standardized skills reference documents. It is meant to make the document creation process more efficient, data-driven, and able to incorporate rapidly changing skills demands compared to the traditional manual process. The system architecture and key components of data collection, analysis, skills ontology construction, and reference document generation are outlined.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and different container orchestration platforms like Docker Swarm, Kubernetes, and Mesos. It then discusses the need for resource-aware container placement and SLA-based monitoring to minimize container migration and ensure performance. The proposed architecture consists of different components like a request manager, information collector, policy manager, and resource manager to enable advanced scheduling and monitoring of containers on Kubernetes. The proposed solution aims to analyze future resource utilization to improve placement decisions and reduce issues after deployment.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication solution that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of a user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process flow and provides examples of how penalties would be applied based on the identified source type.
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
- The document analyzes the absorption spectrum of dentine sialophosphoprotein (DSPP) in gingival crevicular fluid (GCF) samples from orthodontic patients to develop a model for detecting orthodontic-induced inflammatory root resorption (OIIRR).
- GCF samples were collected from orthodontic patients at different treatment periods (3, 6, 12 months) and from non-orthodontic patients. Absorption spectroscopy found DSPP absorbance spectra increased with longer treatment duration, indicating more DSPP released due to more OIIRR.
- A qualitative model using SIMCA analysis accurately classified GCF samples into orthodontic and non-orthodont
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The methodology involves backing up configurations, testing connectivity between virtual networks and clusters before and after upgrades, and analyzing issues that arise. The goal is to establish structures for troubleshooting by classifying relationships between applications, libraries, operating systems, and browsers involved. This may improve determining the root cause of errors during upgrades involving virtualization.
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
The document discusses an approach to automatically map clinical terms in clinical discharge summary data from Malaysian hospitals to SNOMED CT terminology in order to improve the accuracy of queries for cardiology-related cases. Natural language processing techniques are used to preprocess the free-text discharge notes by removing formatting tags and identifying clinical terms, which are then mapped to SNOMED CT concepts using techniques like synonym matching, subsumption relationships, and identifying and excluding negative statements. The goal is to enrich the query results by standardizing the clinical terms to SNOMED CT and taking relationships like synonyms, subsumption, and negation into account to provide more accurate analytic results for monitoring and planning related to heart disease in Malaysia.
Automated login method selection in a multi modal authentication - login meth...Conference Papers
The document proposes an intelligent model to automatically select the login authentication method in a multi-modal authentication system based on user behavior profiling. It analyzes user behavior data from login sessions to minimize real-time processing and prevent untrusted attempts, while facilitating a frictionless user experience. The system determines the user, retrieves their behavioral historical data, matches the user profile based on data retrieval, and selects the authentication method based on evaluating the user profile and environmental parameters. It then updates the user profile with new successful login session data for future evaluations.
Atomization of reduced graphene oxide ultra thin film for transparent electro...Conference Papers
This document summarizes research on using an atomization process to deposit reduced graphene oxide (rGO) thin films for use as transparent conductive electrodes. Key points:
- Graphene oxide was spray coated onto silicon wafers and glass slides using an ultrasonic atomizer. Thermal reduction processes were then used to make the films electrically conductive while maintaining optical transparency.
- Thinner films with 1-2 spray coats had higher transparency (>90%) but higher resistivity, while thicker 3-4 coat films had lower transparency (77.1%) but lower resistivity (5.3 kΩ/sq).
- Rapid thermal processing was more effective than plasma processing at reducing resistivity. Sheet resistance decreased
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve over 125 audience devices with an average delay of 1.74ms per page load. System resources on the web server remained mostly idle, indicating it could potentially serve a much larger audience size.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load in an auditorium with 159 seats.
2. A setup using a wireless mesh network of three NerveNet nodes, which provided a quick and easy setup without wired connections but needs further performance improvements. Results from tests of both setups were analyzed to evaluate the network technologies for smart community applications.
Validation of early testing method for e government projects by requirement ...Conference Papers
The document describes a validation study of an Early Requirement Testing Method (ERTM) for e-government projects. Test engineers used the ERTM, which involves reviewing requirements documents and providing feedback, on six e-government projects. The number of defects found before and after applying the ERTM and providing interventions was compared using a statistical test. The results showed that overall, there was a statistically significant reduction in the number of defects found after applying the ERTM, suggesting it is useful for improving requirements documentation. However, one project saw an increase in defects due to additional requirements added later in the project.
The design and implementation of trade finance application based on hyperledg...Conference Papers
This document describes the design and implementation of a trade finance application built on the Hyperledger Fabric permissioned blockchain platform. It discusses the architecture of blockchain-based applications in general and this trade finance application specifically. Key aspects covered include identifying different types of software connectors (linkage, arbitrator, event, adaptor) that are important building blocks in the architecture. The trade finance application uses connectors like the blockchain facade connector and block/transaction event connector to interface between layers and handle asynchronous event propagation. Overall the document aims to provide insights into architectural considerations and best practices for developing blockchain-based applications.
Unified theory of acceptance and use of technology of e government services i...Conference Papers
This document describes a study that developed and validated a survey instrument to understand technology acceptance of an e-Government system called MYGOVSVC among Malaysian government employees. A literature review was conducted on previous studies applying the Unified Theory of Acceptance and Use of Technology (UTAUT) model to e-Government systems. A 21-item survey was developed containing questions on performance expectancy, effort expectancy, hedonic motivation, and facilitating conditions. The survey was translated to Malay and validated with stakeholders. It was administered to 419 government employees and results found the survey to be reliable in measuring acceptance of the MYGOVSVC system. The validated survey can be used to help improve e-Government services for Malaysian citizens.
Towards predictive maintenance for marine sector in malaysiaConference Papers
This research uses machine learning on sensor data from ships to predict failures of components and their remaining useful life. Interviews with marine experts identified significant maintenance items to prioritize for ship supply chains. The results were analyzed to provide recommendations to a government company on implementing predictive analytics and supply chain strategies for ship maintenance in Malaysia.
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
This document describes the development of a lead ion-selective electrode (Pb2+-ISE) sensor based on a poly-tetrahydrofurfuryl acrylate (pTHFA) membrane without plasticizers using photo-polymerization. The sensor demonstrated a linear range of 0.1-10-5 M, Nernstian slope of 26.5-29.8 mV/decade, limit of detection of 3.24-3.98 x 10-6 M, and good selectivity against interfering ions. Sensor characterization showed comparable results to measurements using atomic absorption spectroscopy on artificial and real samples. Optimization of the lipophilic salt potassium tetrakis(4-chlorophenyl)borate and lead ionophore
This document summarizes security definitions for searchable symmetric encryption (SSE) schemes. It reviews the indistinguishability and semantic security game definitions, noting that attacks have succeeded against published schemes. It then proposes a new security game definition against distribution-based query recovery attacks, to better capture practical adversary capabilities. The goal is to define security in a way that implies the current indistinguishability and semantic security definitions.
Study on performance of capacitor less ldo with different types of resistorConference Papers
The document summarizes a study on the performance of a capacitor-less low dropout (LDO) voltage regulator using different types of resistors. A 1.8V LDO voltage regulator was designed and simulated using five different resistor types in Cadence. The performance metrics compared included output voltage accuracy, phase margin, unity gain bandwidth, and power supply rejection ratio. Simulation results showed differences in LDO performance depending on the resistor type. The LDO with hpoly resistor had the best stability performance, while the LDO with pdiffb resistor produced the highest power supply rejection ratio. In conclusion, the type of resistor used can significantly impact key performance characteristics of a capacitor-less LDO regulator.
Stil test pattern generation enhancement in mixed signal designConference Papers
This document describes a process for generating STIL test patterns from mixed signal design simulations in order to test digital blocks on an SoC. It involves simulating the mixed signal design, sampling the waveforms to generate test vectors, and converting those vectors into an ATPG-compliant STIL format using an automation program. This was implemented successfully at MIMOS Berhad, generating STIL test patterns that passed 100% of stuck-at tests.
The document discusses the implementation of an on-premise AI platform at MIMOS Berhad, a Malaysian research institute. The platform makes use of existing on-premise services such as a private cloud, distributed storage, and authentication platform. It provides an AI training facility using containers on VMs, with distributed training and GPU/CPU support. A version management system stores AI models and applications in Docker images. Deployment is supported on the private cloud and edge devices using containers. The goal is to enable internal development and hosting of AI projects in a secure, customizable manner.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Astute Business Solutions | Oracle Cloud Partner |
A unified dashboard for collaborative robot management system
1. A Unified Dashboard for Collaborative Robot
Management System
Hishamadie Ahmad
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
hishamadie.ahmad@mimos.my
Mohd Nizam Mohd Mydin
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
nizam.mydin@mimos.my
Mohammad Fairus Khalid
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
fairus.khalid@mimos.my
Bukhary Ikhwan Ismail
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
ikhwan.ismail@mimos.my
Rajendar Kandan
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
rajendar.kandan@mimos.my
Ong Hong Hoe
Advanced Computing Lab
MIMOS Berhad
Kuala Lumpur, Malaysia
hh.ong@mimos.my
Abstract—Industry Revolution 4.0 transforms product
design and fabrication. It revolutionize how manufacturing
operates and performs maintenance. Information Technology
plays a crucial role in IR4.0 that drives the digitalization of
manufacturing. The combination of Information Technology
with Operational Technology forms the core of Smart
Manufacturing. It works beyond automation and machine-to-
machine communications. Among the benefits of IR4.0 are
enhanced efficiency in production, mass-customization of
product, zero downtime, extended tool life and energy efficiency.
Robotics is an ideal smart technology of IR4.0. Current trend in
Robotics introduces the deployment of collaborative robot, for
SME. However, monitoring and interaction with such system
comes with additional challenges especially in large-scale
deployment. Dashboard application becomes more important
for such system to have a better management. Most of the
existing applications are managed in an isolated system even
within the same factory, thus make it difficult to maintain and
troubleshoot if problems occur. In this paper, we proposed a
design of centralized dashboard application with interactive 3D
visualization and informative visualization for managing and
troubleshooting COBOT System.
Keywords—Collaborative Robot, dashboard, visualization,
user interface, Industry Revolution 4.0
I. INTRODUCTION
Robotics is a fast paced industry. It keeps evolving and
revolutionizes human way of life. The utilization of robots
capabilities brings a wide range of benefits including in
productivity and efficiency. The lack of centralized
application or dashboard in the COBOT System and no proper
integrations between COBOT applications makes operation
and maintenance difficult to handle. Troubleshooting would
require too much effort in understanding, given the available
unprocessed data. These issue proves to be a challenge in the
area of COBOT Systems.
The main objective is to have a single dashboard
application managing multiple COBOT Systems that would
combine both operational and maintenance input and
eventually display the processed data in a unified and
simplified way through the dashboard.
In this paper, we propose a unified dashboard which would
act as a one stop center to monitor, operate, maintain and
troubleshoot the COBOT Systems. We categorize three types
of user namely super admin, admin and a normal user. Each
users has a set of privileges (a list of permitted operations) and
a different form of dashboard views accordingly. We
introduce a hierarchical view of COBOTs which mainly help
to provide aggregated information about COBOTs. This will
also help user to control certain actions to a group of COBOTs
having similar attribute. Another feature we address is
interactive 3D visualization for troubleshooting, which could
manage COBOT movement operations and maintenance.
This paper is organized as follows. Section II describes the
background and our proposed solution in Section III.
Implementation and results are discussed in Section IV
followed by conclusion in Section V.
II. BACKGROUND
A. Industry Revolution 4.0 in Malaysia
Industry Revolution 4.0 creates opportunity as well as
threats to the industry [1]. Companies that fail to adapt may
suffer from being irrelevant and will fail in creating new and
innovative products. IR4.0 increases productivity and
production output and reduces the dependency of foreign
labor [4]. Malaysia’s Ministry of Trade and Investment
(MITI) has set up an Industry4WRD an IR4.0 national policy.
Among the objectives are to create new job creation, enhance
productivity, innovation in product development and have
skilled talent in IR4.0 [2].
B. Edge Computing in IR4.0
For the past 10 years, cloud computing has matured.
Nevertheless, the latency in data transmission and network
communication is still and an issue. Edge computing can solve
the problem by processing data and information closer to the
source [3].The accelerated decline in computing costs
compared to network, drives the demand for moving
computing nearer to the source of data. Computing requires
high CAPEX, while operational networking costs more in the
long run. Placing computing power near to the edge is the
approach that is much more sensible. In future, computers
compute power will shift from macro to micro-build data
centers, that will be in close proximity, modular and mobile
[4]. Open platform edge economy will emerge. Companies
can run applications on edge, while the infrastructure is owned
by a different entity. In manufacturing scenario, edge-
computing technology provides greater and faster response
time for delivering actionable analytics to the manufacturer
where processing is done directly on the shop floor closer to
the factory equipment’s [1].
2. C. Collaborative Robot
Collaborative robot (COBOT) is a breed of ROBOT that
manipulates objects and can work in close proximity with
humans. COBOT can assist worker in complex tasks hand-in-
hand with human for task which is not fit for full automation.
With COBOT, the human-machine collaboration helps a
person with challenging, repetitive, and complex activities
while protecting the worker from health or work injuries. For
example, it can perform more accurate assembly related
activities compared to a human.
It is a lightweight device as compared to industrial robots
and can be placed and relocated easily [5]. Among the
benefits of COBOT are increase in productivity and improved
workspace condition in terms of ergonomics and safety.
COBOT is suitable for small to mid-sized industry needs. It is
one of the smart device suitable to be adopted in IR4.0.
III. PROPOSED USER INTERFACE
The dashboard application is a part of COBOT system. It
is a main place user can oversee all COBOT operation,
manage the problems and with the capability of controlling it.
We monitor the COBOT from cloud. Each production cell
consists of COBOT arm, manipulator controller, gripper and
other equipment attached [6].
Fig. 1. Proposed user interface on cloud
We deploy our user interface on cloud along with other
components for managing the COBOTs across factories as
shown in Figure 1. Application InfluxDB is used to store
time-series data. MQTT subscriber and publisher for getting
health information and COBOT operation respectively. Mi-
Focus manages host application as containers on cloud as well
as edge. Mi-Cloud is used to manage Virtual machines for
containers. Mi-ROSS is used for storage solutions across
Virtual machines. Mi-Focus registry manages the Docker
images across Cloud and Edge.
A. Edge Components
Our Edge consists of the following components: -
1) COBOT – COBOT arm, gripper and controller.
2) Edge Server - communicate with factory equipment
e.g. PLC, PC, COBOT. One server communicates with
multiple COBOT on site.
3) Edge MQTT instance – publisher of data collected
from factory equipment & subscriber to cloud MQTT for
instruction.
B. Supporting Technologies
1) Three.js - Three.js is the JavaScript framework for
displaying 3D content on the web. It provides you capabilities
to load 3D models in games, music videos, scientific and data
visualizations etc in computer web browser and on
smartphone.
2) Grafana - Grafana is an open source analytics for
monitoring solution for every database. It allows user to
query, visualize, alert on and understand your metrics no
matter where they are stored [7].Among supported databases
are Graphite, Prometheus, InfluxDB, ElasticSearch, MySQL,
PostgreSQL etc.
3) Storage – three types types of data. Elasticsearch to
store events and logs. InfluxDB to store time series data,
RDBMS to store static information.
4) Docker - Docker is an Open Source OS-level
virtualization tool that facilitates the creation of a set of
software into one isolated environment called container. A
container differ from virtual machine (VMs) in which a VM is
an abstraction of physical hardware resources and
encapsulate the entire operating system, whereby a container
is an abstraction of application layer that isolates an area
within an operating system, but share the same OS kernel and
physical resources as the host. It does this by leveraging on
existing technology on linux OS, namely cgoups and
namespaces. Container utilizes less space than a VM would,
and is less demanding on hardware resources which provides
a faster deployment of container images [8].
5) Docker Registry - Docker registy is a software created
by Docker to host Docker images. Docker images is
technically a file that contains multiple layers, that is used
during the execution of Docker containers. The registry itself
is a stateless and highly scalable application that stores and
distributes Docker images. Distributed container hosts
benefits by having Docker registry, as images can be pushed
and pulled from a centralized location. The scaling of Docker
registry can serve a large number of access and speed up
image access in the process [8].
6) Kubernetes is a popular container orchestration
framework designed by Google. It is an open source product
that aims at deploying container applications across a cluster
similar to Docker swarm. Kubernetes cluster includes at least
one master and several compute nodes. The key benefit of
Kubernetes includes portability that offers the user to install
on-premises, hybrid or public cloud.
Focus
Registry
Focus
Container management
ROSS
Storage
Cloud Datacenter
Proposed
User Interface
Factory ‘N
Factory 1
Analytics and
simulation software
Client Client
DOCKER DOCKER
Edge
3. C. Data Collection
Fig. 2. Data Collection & Users
Figure 2 shows the components that will be monitored.
We collect operations, environmental metrics and data about
production output. The goal is to collect relevant metrics to
notify and recommend actionable actions to engineers more
effectively.
TABLE I: DATA COLLECTION LIST
Areas Description COBOT specific Examples
Asset
tracking
Asset encompasses of
physical as well as
virtual/soft attributes of
equipment. To track &
maintain device in
optimum condition
Physical - model, asset ID,
manufacturing date, date of
commence
Virtual - software, OS,
application, Cobot’s Program.
Device
status &
health
Operational Status. To
observe & maximize the
effectiveness of device
utilization
Events - Start, stoppages, halt,
job status, errors, collision.
Operational metrics -
movement, gripper, spin counts,
logs, motor load, temperature,
COBOT movement –
coordinate, speed, velocity.
Environmental
conditions. Data that can
influence machine
lifetime or even
COBOT’s task.
Temperature, humidity,
vibration (hits), power
consumption, current load
Producti
on Status
Product & job status.
Data which provide
productivity rate
calculation
Program status, current
task/sequence status, &
duration.
Table 1 shows COBOT tracking, status, health,
operational and, production data. These data provide
operational status information to the COBOT arm.
For asset tracking we collect hardware as well as software
information. Engineers can use this information to track or
check latest information pertaining to COBOT. We collect
COBOT arm movement. These data are used to visualize near
real-time COBOT movement on our dashboard as shown in .
The COBOT arm is represent with base, shoulder, elbow and
wrist. Each with angle, velocity, torque, speed and
acceleration data.
To check the status of production cell in higher
granularity, we collect the data of program and individual task
within the program itself. We collect the task status,
completion as duration to complete. From these data, we can
see if there is any stuck program or task and a possible
deviation of task duration. If any anomaly is detected, we will
then notify it to the engineers. These data can be used to
determine individual manufacturing cells productivity.
We capture the environmental data, to determine the
influence to the factory equipment. Temperature, humidity,
vibration, current is some of external stimuli that might affect
the equipment. We then compared to manufacturer’s
recommended operation standards and notify if it is beyond
the threshold or recommended environmental condition.
IV. IMPLEMENTATION & RESULTS
A. Centralized Dashboard Application from Cloud
The cloud-based dashboard application will have role-
based access and permission. There are three types of users
which are super admin, admin and user.
1) Super admin: Have all the access to all function and
dashboard pages. This type of user can create and customize
the dashboard and edit dashboard permissions.
2) Admin: Have access to multiple groups of COBOT for
example factory COBOT system admin, can customize and
create dashboards but cannot edit dashboard permissions.
3) User: Have access and view the dashboard up to
his/her assigned level
The dashboard is multi-tenant which is capable of serving
multiple types of users with one install of the application. Each
type of user have a completely different view and is isolated
within their assigned level. Multi-tenancy application is
designed to maintain a common code-based application and
run a common instance(s) of the application for multiple
tenants. This is easier to maintain for example if new firmware
available only one system needs to be updated.
Each user has their role to make sure the COBOT system
is running efficiently without any problems. Users and their
privileges are described in Figure 3.
Fig. 3. User role and privileges
As shown in Figure 4, as a super admin, their role is to
monitor, manage and maintain the whole system. They can
view the COBOT in details and read the data from each of the
COBOT in the system and control its movement. General info
and summary details of the system is also provided. If a new
firmware patch is available, Super admin can update it to all
COBOT in the system. As shown in Figure 5, admin role is
the same as super admin but only limited to their own factory.
Figure 6 describes the view of a user. As a user, they can only
have access to the COBOT details assigned to them. General
information, status and health of their COBOT will also be
displayed across all types of user.
Fig. 4. Sample super admin view
Fig. 5. Sample super admin view
Sensors Software
Robot
Arms
Gripper
s
Other
Collector
Monitor
components
4. Fig. 6. Sample user view
The dashboard adopted a hierarchical interface design.
The detailed information has been divided into multiple levels.
Clicking on the details of each level makes the user move into
a level of greater detail, so the deeper into the hierarchy, the
more detailed the information is.
COBOT installation could be a lot in the future across this
region. The hierarchical interface will make it much easier to
manage the COBOT system collectively. There are actions
instead of doing it one by one COBOT, users can apply it at
many COBOT simultaneously. Thus saving time and
operation cost. We call it “Write once, execute many”
concept.
Fig. 7. Hierarchical interface
Fig. 8. Clickable info
The hierarchical interface shows only critical and
summarized information based on their respective level. That
information is clickable and will bring the user to the table
which is filtered by clicked info. For example, if a user clicks
on Total COBOT info, the table will show a list of total
available COBOT in Region A.
The dashboard allows users to do certain actions to
multiple COBOT at the same time. Users can group COBOT
by status, region name, date and so on and then execute the
selected action. This activity can be done by using a check box
or filter field.
Fig. 9. Batch action
Figure above shows how firmware is updated to multiple
COBOT. Usually this process requires the user usually admin
to connect to each COBOT to do the firmware update.
Another action can be applied this way is scheduled
maintenance. Users can schedule maintenance especially at
night without disturbing any day operation.
B. Interactive 3D Visualization
1) Load COBOT 3D model
3D visualization, especially ones related to the robotics
industry, requires the highest level of accuracy. To make sure
of that, 3D models are acquired from COBOT manufacture.
The file is in STL format which native format usually used in
CAD applications. This file is a complex 3D model which was
used to create the COBOT itself. The vertex count is very high
because it includes all the inner vertices of the model. Since
this is just a 3D visualization only, those vertices are not
required and will be removed. Lower count vertex is important
to ensure it can be loaded in the dashboard app and can be
animated smoothly.
The model is loaded to Blender and then simplify it by
removing unnecessary vertices as mentioned above. The
texture is then applied to make it look more realistic as the
actual ones. To make animation easier to control later, the
model is divided into different parts. The parts are exported
into different filenames in gLTF(GL Transmission Format)
format.
The 3D files imported in another html portal which is
loaded with threejs plugin. Grafana will load the portal in
iframe in order to view the 3D COBOT visualization.
Fig. 10. Flow to load 3d model loads in html
2) Simulation COBOT based on data
There will be cases where COBOT failed due to certain
issues. The simulation using previous data up to the time it
failed will help users identify the problems. This visualization
also can read straight from the operational COBOT. But
latency is expected because of network limitation and
constraint. Another feature that can help the user is ability to
plan the COBOT movement. Users can record the simulation
data before applying it to the actual COBOT.
The infrastructure is ready to do bi-directional
communication i.e. Read & Control COBOT from cloud.
Safety and security precautions and procedures should be in
place before executing this feature.
C. Visualization for Troubleshooting
1) Preventive maintenance
Every COBOT need calibration after operational in certain
amount of time. The last date calibration will be stated at
COBOT details. The system will suggest a calibration if it is
near or past the date of the calibration cycle. This process can
be done remotely with the help of 3D visualization.
5. Fig. 11. COBOT calibration
2) Error report
When COBOT down or facing error, it will trigger error
notification to the user who owns it. The notification will
come as an email and SMS notification. Users also will be
notified at the dashboard.
Fig. 12. Error details
3) Efficiency report
This report will be presented by a graph that will show out
production comparison between this month and last month.
This can be used to monitor the level of efficiency of each
operational COBOT. For example, each task requires certain
amount of time to complete. Since COBOT is a mechanical
robot, over time the time to complete gradually become more
and more longer due to many factors such as wear and tear.
Like all mechanical robots, calibration and maintenance is
required periodically to make sure the COBOT is working at
optimum level.
Fig. 13. Efficiency graph
V. CONCLUSION
Our proposed dashboard solution addresses the unified
management of COBOT system across Cloud and Edge. It
provides various dashboard views based on users to simply the
overall management and control. It simplifies the user in
identifying any issues and helps them to troubleshoot with
minimal effort. In future, we plan to focus on the predictive
maintenance based on the data collected. We also plan to
expand our work with different types of COBOT available in
industry.
REFERENCES
[1] J. Lee, “Start small, aim big,” The Star, 2019. [Online]. Available:
https://www.thestar.com.my/business/smebiz/2019/05/20/start-small-
aim-big/. [Accessed: 08-Apr-2020].
[2] Industry4wrd - National Policy on Industry 4.0. Kuala Lumpur:
Ministry of Trade International Trade and Industry, 2013.
[3] B. I. Ismail et al., “Evaluation of Docker as Edge computing platform,”
in 2015 IEEE Conference on Open Systems (ICOS), 2015, pp. 130–135.
[4] M. Bazli et al., “Extending Cloud Resources to the Edge : Possible
Scenarios , Challenges and Experiments,” in 2016 International
Conference on Cloud Computing Research and Innovations (ICCCRI
2016), 2016.
[5] M. Bortolini, E. Ferrari, M. Gamberi, F. Pilati, and M. Faccio,
“Assembly system design in the Industry 4.0 era: a general framework,”
IFAC-PapersOnLine, vol. 50, no. 1, pp. 5700–5705, 2017.
[6] M. F. Khalid, B. I. Ismail, R. Kandan, and H. H. Ong, “Super-
Convergence of Autonomous Things,” ICTC 2019 - 10th Int. Conf. ICT
Converg. ICT Converg. Lead. Auton. Futur., pp. 429–432, 2019.
[7] Grafana Labs, “Grafana Features,” 2020. [Online]. Available:
https://grafana.com/grafana/.
[8] Docker Inc, “About Registry.” [Online]. Available:
https://docs.docker.com/registry/introduction/. [Accessed: 06-Apr-
2020].