This document discusses enabling basic automation control through the USB interface for educational purposes. It outlines the limitations of current interfaces for real-world control and proposes a simplified hardware and software framework. Key points:
- Legacy interfaces like printer ports allowed simple on/off control but have been replaced by USB, limiting real-time control opportunities.
- The objective is to provide low-cost, simplified methods for custom control applications beyond pre-packaged software.
- The approach involves minimal interface hardware and an "open" software architecture using functional decomposition to express the control logic.
The Wireless Remote Control Car Based On Arm9IOSR Journals
Abstract: TheInternetof Things (IoT) are of great importance in promoting and guiding development of information technology and economic. At Present, theapplicationoftheIoT develops rapidly, but due to the special requirements of some applications, the existing technology cannot meet them very good. Much research work is doing to build IoT. Wi-Fi basedWirelessremote control has the features of high bandwidth and rate, non-line-transmission ability, large-scale data collection and high cost-effective, and it has the capability of video monitoring, which cannot be realized with RF. The research on Wi-Fi based remote control car has high practical significance to the development oftheInternetof Things. Based on the current research work ofapplicationsthe characteristics of Wi-Fi, this paper discusses controlling the car by using Wi-Fi module along with the conditions can be monitored through remote PC or Lap top which supports Wi-Fi technology. In PC or Lap top two tabs are present. In the first tab we can monitor the conditions and in the second tab four buttons are present to control the car in forward, back ward, left side and right side directions. Keywords: S3C2440 (ARM9), Wi-Fi Module, Camera, DC motors with driver IC and laptop with Wi-Fi module.
The business alchemy of the IoT. The M2M/IoT community
is now carrying out a transformation, turning silicon, copper, rare earth elements and the airy ether of the radio spectrum into new products, services, business models and profits.
The document summarizes research on reimagining text input on touchscreen devices through a "word gesture keyboard" paradigm. Key points of the paradigm include using a single continuous gesture to input an entire word by tracing the letters, rather than tapping each letter individually. This takes advantage of the fact that possible letter combinations in a language are limited and can be modeled statistically. Research included developing prototypes, testing with users, and commercial products being developed using this paradigm under names like Shape Writer and Slide IT. Benefits noted include faster input speed compared to tapping each letter due to eliminating lifts of the finger between letters.
Programmable integrated circuits (PICs) were developed to allow integrated circuits to be reconfigured and reused for different tasks. PICs can be programmed using assembly or other languages to perform specific functions. As more complex electronic circuits were created, PICs evolved to include millions of logic gates and regular arrays of logic elements. Today, device programmers are used to transfer Boolean logic patterns into PICs to configure them for different applications.
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
1. The document discusses several emerging technologies including context-aware computing, cloud computing, fabric-based computers, quantum computing, ubiquitous computing, in-memory computing, Senseye technology, consumerization, big data analytics, social media analytics, real-time analytics, voice command applications, and augmented reality.
2. Many of these technologies can be applied in insurance and other sectors to increase efficiency, gain insights from large datasets, and better serve customers through personalized, real-time interactions and information.
3. Emerging technologies will continue to change how businesses operate as consumers increasingly demand online, self-service options available anywhere, anytime.
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
The document discusses mobile commerce (m-commerce) and pervasive computing. It defines m-commerce and describes key characteristics like mobility and ubiquity. Technologies enabling m-commerce include wireless networks, mobile devices, location services and applications. Examples are provided for financial, advertising, retail and organizational uses of m-commerce. Pervasive computing embeds technology in everyday objects and environments. Applications discussed include smart homes, appliances and cars that are networked and enhanced through embedded computing.
This document discusses key concepts in information systems and technology infrastructure. It defines basic units like bits and bytes, and describes the evolution of IT infrastructure from mainframes to personal computers to client/server systems and cloud computing. It outlines the main components of an IT infrastructure including hardware, software, networks, data storage and integration services. Finally, it differentiates between proprietary and open source software models.
The Wireless Remote Control Car Based On Arm9IOSR Journals
Abstract: TheInternetof Things (IoT) are of great importance in promoting and guiding development of information technology and economic. At Present, theapplicationoftheIoT develops rapidly, but due to the special requirements of some applications, the existing technology cannot meet them very good. Much research work is doing to build IoT. Wi-Fi basedWirelessremote control has the features of high bandwidth and rate, non-line-transmission ability, large-scale data collection and high cost-effective, and it has the capability of video monitoring, which cannot be realized with RF. The research on Wi-Fi based remote control car has high practical significance to the development oftheInternetof Things. Based on the current research work ofapplicationsthe characteristics of Wi-Fi, this paper discusses controlling the car by using Wi-Fi module along with the conditions can be monitored through remote PC or Lap top which supports Wi-Fi technology. In PC or Lap top two tabs are present. In the first tab we can monitor the conditions and in the second tab four buttons are present to control the car in forward, back ward, left side and right side directions. Keywords: S3C2440 (ARM9), Wi-Fi Module, Camera, DC motors with driver IC and laptop with Wi-Fi module.
The business alchemy of the IoT. The M2M/IoT community
is now carrying out a transformation, turning silicon, copper, rare earth elements and the airy ether of the radio spectrum into new products, services, business models and profits.
The document summarizes research on reimagining text input on touchscreen devices through a "word gesture keyboard" paradigm. Key points of the paradigm include using a single continuous gesture to input an entire word by tracing the letters, rather than tapping each letter individually. This takes advantage of the fact that possible letter combinations in a language are limited and can be modeled statistically. Research included developing prototypes, testing with users, and commercial products being developed using this paradigm under names like Shape Writer and Slide IT. Benefits noted include faster input speed compared to tapping each letter due to eliminating lifts of the finger between letters.
Programmable integrated circuits (PICs) were developed to allow integrated circuits to be reconfigured and reused for different tasks. PICs can be programmed using assembly or other languages to perform specific functions. As more complex electronic circuits were created, PICs evolved to include millions of logic gates and regular arrays of logic elements. Today, device programmers are used to transfer Boolean logic patterns into PICs to configure them for different applications.
PoV on Latest technology Trends impact on Insurance Industry Jishnu Mithre
1. The document discusses several emerging technologies including context-aware computing, cloud computing, fabric-based computers, quantum computing, ubiquitous computing, in-memory computing, Senseye technology, consumerization, big data analytics, social media analytics, real-time analytics, voice command applications, and augmented reality.
2. Many of these technologies can be applied in insurance and other sectors to increase efficiency, gain insights from large datasets, and better serve customers through personalized, real-time interactions and information.
3. Emerging technologies will continue to change how businesses operate as consumers increasingly demand online, self-service options available anywhere, anytime.
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
The document discusses mobile commerce (m-commerce) and pervasive computing. It defines m-commerce and describes key characteristics like mobility and ubiquity. Technologies enabling m-commerce include wireless networks, mobile devices, location services and applications. Examples are provided for financial, advertising, retail and organizational uses of m-commerce. Pervasive computing embeds technology in everyday objects and environments. Applications discussed include smart homes, appliances and cars that are networked and enhanced through embedded computing.
This document discusses key concepts in information systems and technology infrastructure. It defines basic units like bits and bytes, and describes the evolution of IT infrastructure from mainframes to personal computers to client/server systems and cloud computing. It outlines the main components of an IT infrastructure including hardware, software, networks, data storage and integration services. Finally, it differentiates between proprietary and open source software models.
This document summarizes a research paper about coordinating and controlling hybrid wind generator power systems. It describes a hybrid power system that includes a wind generator, fuel cells, electrolyzers, and supercapacitors. Two power management strategies are presented: the grid-following strategy and the source-following strategy. The grid-following strategy regulates the DC bus voltage by adjusting the power exchanged with the grid, while allowing the wind generator to operate at maximum power point tracking. The source-following strategy controls the grid's active power using a current loop and regulates the DC bus voltage using the wind generator and storage units. It is observed that the source-following strategy provides better grid regulation performance than the grid-following strategy under normal and abnormal conditions
This document discusses electrical energy management and load forecasting in smart grids using artificial neural networks. It presents a study applying backpropagation neural networks to short-term load forecasting for Sudan's National Electric Company. The neural network model was used to forecast load, with error calculated by comparing forecasted and actual load data. The document also discusses generation dispatch, demand forecasting techniques, and designing a neural network for one-day load forecasting. It evaluates network performance and error for different training data sizes, finding that a ten-day training dataset produced the best results with minimum error. The neural network approach was able to reliably predict the nonlinear relationship between historical data and load.
1. The document analyzes combustion and heat release characteristics of a diesel engine fueled with blends of soybean biodiesel and diesel. Soybean oil was converted to biodiesel via transesterification, producing soybean methyl ester (SOME) biodiesel.
2. Combustion tests were conducted with SOME blends (5%, 10%, 15%) using pistons with different geometries - torodial, shallow torodial, and deep torodial. The shallow torodial piston showed the best combustion characteristics, with up to 6% higher peak cylinder pressure compared to the other pistons.
3. In-cylinder pressure and heat release rate were measured. SOME blends
This document investigates the effect of fiber type and orientation on the tensile and flexural properties of jute and bamboo fiber-reinforced epoxy composites. Laminates were fabricated with jute and bamboo fibers oriented at 0/90 degrees and 45/45 degrees. Testing found that composites with 0/90 orientation had higher tensile and flexural strengths than those with 45/45 orientation. Jute composites generally exhibited higher strengths than bamboo composites. SEM images showed better fiber dispersion and distribution in jute composites. The study concludes that fiber type and orientation influence mechanical properties, with jute at 0/90 orientation exhibiting the highest strengths for potential structural applications.
The document presents two numerical methods, finite difference method (FDM) and Adomian decomposition method (ADM), for solving the Schnackenberg model, which is a system of two nonlinearly coupled reaction-diffusion equations. FDM approximates the partial derivatives in the equations with finite differences. ADM rewrites the system as an operator equation and decomposes the solution into a series. The document derives the finite difference approximations and outlines the steps of ADM. An example application is mentioned to show that ADM is more accurate and efficient than FDM for this type of problem.
This document discusses social media risks and how organizations can manage them. It notes that the biggest risk is not using social media at all. Other key risks include lack of control over an organization's voice on social media and non-compliance with social media policies. The document provides a risk matrix to assess likelihood and impact of potential negative social media events. It emphasizes that organizations must prepare internal roles, processes, policies, and stakeholders to successfully use social media. Key documents and frameworks outlined include a social media strategy, guidelines, an escalation plan, and moderation policies.
1) El documento analiza la "crisis de la salud pública" en Latinoamérica en el contexto de la globalización, y examina los movimientos ideológicos que han dado forma al campo de la salud, incluyendo la Policía Médica, la Medicina Social, la Salud Pública, la Atención Primaria de Salud y la Promoción de Salud.
2) También resume los esfuerzos recientes de la OPS para debatir la teoría y práctica de la Salud Pública en las Américas, con la
This document summarizes research into optimizing process parameters for Eli-Twist yarn production. Eli-Twist yarn is produced using Suessen Elite compact spinning technology and has advantages over traditional two-ply yarns. The distance between roving strands and negative pressure applied in the suction zone can substantially impact yarn quality. Ten trials were conducted varying these two parameters. The effects on yarn fineness, strength, elongation, imperfections and hairiness were evaluated. A process capability index (Cpk) was used to assess yarn quality. The goal was to optimize the parameters to improve Eli-Twist yarn quality.
This document summarizes and analyzes different Flash Translation Layer (FTL) schemes for Solid State Drives (SSDs). It discusses the strengths and weaknesses of page mapping, block mapping, and hybrid mapping FTL schemes. It proposes that the optimal FTL scheme would have infrequent garbage collection, short garbage collection latency, low computation and memory overhead, and maintain good average and worst-case write performance. The document suggests that modified page mapping and FAST mapping schemes may achieve this if their computation overhead and worst-case latency issues are addressed without hurting average performance.
The document proposes a fast handoff scheme for IEEE 802.11 wireless networks using virtual access points. It aims to reduce handoff latency, which is primarily caused by the probe delay during scanning for new access points. The scheme uses selective scanning to identify neighboring access points with strong signals. It performs pre-registration of the mobile host with neighboring access points to transfer security contexts in advance. A virtual access point handles communication between the mobile host and registered access points to enable fast switching during handoff. Buffering at the virtual access point allows seamless data transfer when the connection changes between access points.
The document discusses tensile properties of long jute fiber reinforced polypropylene composites. It begins with an abstract that states the objective is to test tensile properties of composites made from chemically treated long jute fibers reinforced in polypropylene at different weight ratios. The results showed tensile strength and modulus increased for treated fiber composites compared to plain polypropylene, with up to a 28.4% increase for 15% NaOH treated fibers at 10% weight ratio. The introduction provides background on composites and defines them. It also describes the phases in a composite including polypropylene matrix and jute fiber reinforcement. Experimental details on materials and fiber extraction are then presented.
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
This document summarizes a proposed security model for transaction management in distributed mobile database environments. The model uses encryption/decryption between base stations and mobile hosts to securely transmit data. It also uses a damage assessment algorithm to detect the spread of malicious transactions across replicated distributed databases and aid in recovery. The architecture includes fixed proxy servers that update an encrypted mobile request and return an encrypted result. The damage assessment algorithm evaluates logs to assess attack impacts and supports both "coldstart" and "warmstart" recovery methods.
This document summarizes challenges with migrating applications between cloud environments and discusses potential solutions. It addresses three main points:
1) Application architecture impacts migration ability, and architectures like asynchronous apps are better suited for cloud portability.
2) Standards like OVF could help by providing universal metadata for virtual machines, but full standards adoption will take time.
3) Tools to automate migration are needed to move apps without rewriting them for each cloud, but current tools often result in multiple versions that are difficult to manage.
The document analyzes the bit error rate (BER) performance of the mobile WiMAX physical layer under different communication channels and modulation techniques. It simulates BER and signal-to-noise ratio (SNR) using the Stanford University Interim (SUI) channel models, which model six different channel conditions for varying terrain types. The performance is evaluated for different data rates and modulation schemes like BPSK and OFDMA under the SUI channel models.
This document summarizes a research paper that proposes improvements to the probabilistic packet marking (PPM) algorithm for detecting the path of distributed denial-of-service attacks. The PPM algorithm allows routers to mark attack packets with identification information based on a predetermined probability. However, its termination condition is not well-defined, which can result in an incorrectly constructed attack path. The paper proposes a modified PPM algorithm called rectified PPM (RPPM) that defines a precise termination condition to guarantee the constructed attack path is correct with a specified level of confidence. An experimental framework is designed to test the RPPM algorithm under different packet marking probabilities and network structures.
This document discusses estimating lateral aerodynamic parameters of an aircraft called the Hansa-3 using a neural-based method called Neural-Gauss-Newton. Flight test data was collected from the Hansa-3 involving aileron and rudder control inputs. The data was checked for compatibility and found to accurately reconstruct aircraft motion. An aerodynamic model was formulated involving side force, rolling moment, and yawing moment coefficients. The goal was to estimate the parameters in this model using the neural-based method, which does not require an exact mathematical model.
The document describes techniques for reducing power consumption during integrated circuit testing by reordering test vectors. It discusses two algorithms: 1) Minimum Transition (MT)-fill, which fills don't care bits in a way to minimize transitions and reduce average/peak power. 2) Hamming distance-based technique, which divides test data into blocks, calculates block frequencies, and merges blocks with low Hamming distance to increase compression ratio while reducing dynamic power. Experimental results showed MT-fill achieved lower average/peak power while Hamming distance-based method yielded higher compression. The proposed approach reorders test vectors to minimize switching activity and reduce test power.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
The document provides an introduction to information technology and software applications. It discusses:
- The increasing prevalence of computers and how software contributed to this growth.
- The shifts in computing paradigms from host-centric to client-server to network-centric models.
- Common types of application software including word processors, spreadsheets, databases, and presentations.
- How application software transforms raw data into useful information for users, with examples involving student records and smart cards.
The document discusses several topics related to computers and information technology:
1) It summarizes the goals of the Fifth Generation Computer Systems project in Japan to create a new "fifth generation" computer using parallel processing.
2) It explains what an Arithmetic Logic Unit (ALU) is and its important role in the central processing unit (CPU) of performing arithmetic and logical operations.
3) It distinguishes between application software and system software, with application software designed for specific tasks and system software involved in integrating computer capabilities.
This document summarizes a research paper about coordinating and controlling hybrid wind generator power systems. It describes a hybrid power system that includes a wind generator, fuel cells, electrolyzers, and supercapacitors. Two power management strategies are presented: the grid-following strategy and the source-following strategy. The grid-following strategy regulates the DC bus voltage by adjusting the power exchanged with the grid, while allowing the wind generator to operate at maximum power point tracking. The source-following strategy controls the grid's active power using a current loop and regulates the DC bus voltage using the wind generator and storage units. It is observed that the source-following strategy provides better grid regulation performance than the grid-following strategy under normal and abnormal conditions
This document discusses electrical energy management and load forecasting in smart grids using artificial neural networks. It presents a study applying backpropagation neural networks to short-term load forecasting for Sudan's National Electric Company. The neural network model was used to forecast load, with error calculated by comparing forecasted and actual load data. The document also discusses generation dispatch, demand forecasting techniques, and designing a neural network for one-day load forecasting. It evaluates network performance and error for different training data sizes, finding that a ten-day training dataset produced the best results with minimum error. The neural network approach was able to reliably predict the nonlinear relationship between historical data and load.
1. The document analyzes combustion and heat release characteristics of a diesel engine fueled with blends of soybean biodiesel and diesel. Soybean oil was converted to biodiesel via transesterification, producing soybean methyl ester (SOME) biodiesel.
2. Combustion tests were conducted with SOME blends (5%, 10%, 15%) using pistons with different geometries - torodial, shallow torodial, and deep torodial. The shallow torodial piston showed the best combustion characteristics, with up to 6% higher peak cylinder pressure compared to the other pistons.
3. In-cylinder pressure and heat release rate were measured. SOME blends
This document investigates the effect of fiber type and orientation on the tensile and flexural properties of jute and bamboo fiber-reinforced epoxy composites. Laminates were fabricated with jute and bamboo fibers oriented at 0/90 degrees and 45/45 degrees. Testing found that composites with 0/90 orientation had higher tensile and flexural strengths than those with 45/45 orientation. Jute composites generally exhibited higher strengths than bamboo composites. SEM images showed better fiber dispersion and distribution in jute composites. The study concludes that fiber type and orientation influence mechanical properties, with jute at 0/90 orientation exhibiting the highest strengths for potential structural applications.
The document presents two numerical methods, finite difference method (FDM) and Adomian decomposition method (ADM), for solving the Schnackenberg model, which is a system of two nonlinearly coupled reaction-diffusion equations. FDM approximates the partial derivatives in the equations with finite differences. ADM rewrites the system as an operator equation and decomposes the solution into a series. The document derives the finite difference approximations and outlines the steps of ADM. An example application is mentioned to show that ADM is more accurate and efficient than FDM for this type of problem.
This document discusses social media risks and how organizations can manage them. It notes that the biggest risk is not using social media at all. Other key risks include lack of control over an organization's voice on social media and non-compliance with social media policies. The document provides a risk matrix to assess likelihood and impact of potential negative social media events. It emphasizes that organizations must prepare internal roles, processes, policies, and stakeholders to successfully use social media. Key documents and frameworks outlined include a social media strategy, guidelines, an escalation plan, and moderation policies.
1) El documento analiza la "crisis de la salud pública" en Latinoamérica en el contexto de la globalización, y examina los movimientos ideológicos que han dado forma al campo de la salud, incluyendo la Policía Médica, la Medicina Social, la Salud Pública, la Atención Primaria de Salud y la Promoción de Salud.
2) También resume los esfuerzos recientes de la OPS para debatir la teoría y práctica de la Salud Pública en las Américas, con la
This document summarizes research into optimizing process parameters for Eli-Twist yarn production. Eli-Twist yarn is produced using Suessen Elite compact spinning technology and has advantages over traditional two-ply yarns. The distance between roving strands and negative pressure applied in the suction zone can substantially impact yarn quality. Ten trials were conducted varying these two parameters. The effects on yarn fineness, strength, elongation, imperfections and hairiness were evaluated. A process capability index (Cpk) was used to assess yarn quality. The goal was to optimize the parameters to improve Eli-Twist yarn quality.
This document summarizes and analyzes different Flash Translation Layer (FTL) schemes for Solid State Drives (SSDs). It discusses the strengths and weaknesses of page mapping, block mapping, and hybrid mapping FTL schemes. It proposes that the optimal FTL scheme would have infrequent garbage collection, short garbage collection latency, low computation and memory overhead, and maintain good average and worst-case write performance. The document suggests that modified page mapping and FAST mapping schemes may achieve this if their computation overhead and worst-case latency issues are addressed without hurting average performance.
The document proposes a fast handoff scheme for IEEE 802.11 wireless networks using virtual access points. It aims to reduce handoff latency, which is primarily caused by the probe delay during scanning for new access points. The scheme uses selective scanning to identify neighboring access points with strong signals. It performs pre-registration of the mobile host with neighboring access points to transfer security contexts in advance. A virtual access point handles communication between the mobile host and registered access points to enable fast switching during handoff. Buffering at the virtual access point allows seamless data transfer when the connection changes between access points.
The document discusses tensile properties of long jute fiber reinforced polypropylene composites. It begins with an abstract that states the objective is to test tensile properties of composites made from chemically treated long jute fibers reinforced in polypropylene at different weight ratios. The results showed tensile strength and modulus increased for treated fiber composites compared to plain polypropylene, with up to a 28.4% increase for 15% NaOH treated fibers at 10% weight ratio. The introduction provides background on composites and defines them. It also describes the phases in a composite including polypropylene matrix and jute fiber reinforcement. Experimental details on materials and fiber extraction are then presented.
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
This document summarizes a proposed security model for transaction management in distributed mobile database environments. The model uses encryption/decryption between base stations and mobile hosts to securely transmit data. It also uses a damage assessment algorithm to detect the spread of malicious transactions across replicated distributed databases and aid in recovery. The architecture includes fixed proxy servers that update an encrypted mobile request and return an encrypted result. The damage assessment algorithm evaluates logs to assess attack impacts and supports both "coldstart" and "warmstart" recovery methods.
This document summarizes challenges with migrating applications between cloud environments and discusses potential solutions. It addresses three main points:
1) Application architecture impacts migration ability, and architectures like asynchronous apps are better suited for cloud portability.
2) Standards like OVF could help by providing universal metadata for virtual machines, but full standards adoption will take time.
3) Tools to automate migration are needed to move apps without rewriting them for each cloud, but current tools often result in multiple versions that are difficult to manage.
The document analyzes the bit error rate (BER) performance of the mobile WiMAX physical layer under different communication channels and modulation techniques. It simulates BER and signal-to-noise ratio (SNR) using the Stanford University Interim (SUI) channel models, which model six different channel conditions for varying terrain types. The performance is evaluated for different data rates and modulation schemes like BPSK and OFDMA under the SUI channel models.
This document summarizes a research paper that proposes improvements to the probabilistic packet marking (PPM) algorithm for detecting the path of distributed denial-of-service attacks. The PPM algorithm allows routers to mark attack packets with identification information based on a predetermined probability. However, its termination condition is not well-defined, which can result in an incorrectly constructed attack path. The paper proposes a modified PPM algorithm called rectified PPM (RPPM) that defines a precise termination condition to guarantee the constructed attack path is correct with a specified level of confidence. An experimental framework is designed to test the RPPM algorithm under different packet marking probabilities and network structures.
This document discusses estimating lateral aerodynamic parameters of an aircraft called the Hansa-3 using a neural-based method called Neural-Gauss-Newton. Flight test data was collected from the Hansa-3 involving aileron and rudder control inputs. The data was checked for compatibility and found to accurately reconstruct aircraft motion. An aerodynamic model was formulated involving side force, rolling moment, and yawing moment coefficients. The goal was to estimate the parameters in this model using the neural-based method, which does not require an exact mathematical model.
The document describes techniques for reducing power consumption during integrated circuit testing by reordering test vectors. It discusses two algorithms: 1) Minimum Transition (MT)-fill, which fills don't care bits in a way to minimize transitions and reduce average/peak power. 2) Hamming distance-based technique, which divides test data into blocks, calculates block frequencies, and merges blocks with low Hamming distance to increase compression ratio while reducing dynamic power. Experimental results showed MT-fill achieved lower average/peak power while Hamming distance-based method yielded higher compression. The proposed approach reorders test vectors to minimize switching activity and reduce test power.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
The document provides an introduction to information technology and software applications. It discusses:
- The increasing prevalence of computers and how software contributed to this growth.
- The shifts in computing paradigms from host-centric to client-server to network-centric models.
- Common types of application software including word processors, spreadsheets, databases, and presentations.
- How application software transforms raw data into useful information for users, with examples involving student records and smart cards.
The document discusses several topics related to computers and information technology:
1) It summarizes the goals of the Fifth Generation Computer Systems project in Japan to create a new "fifth generation" computer using parallel processing.
2) It explains what an Arithmetic Logic Unit (ALU) is and its important role in the central processing unit (CPU) of performing arithmetic and logical operations.
3) It distinguishes between application software and system software, with application software designed for specific tasks and system software involved in integrating computer capabilities.
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
This document describes a Bluetooth-based automatic hotel service system implemented using Python. The system uses Bluetooth to track hotel employees and provide services to customers. It aims to reduce costs for hotels by automating services. The system scans Bluetooth devices to authenticate employees accessing different departments and records employee entry/exit times. Customers are provided Bluetooth devices at check-in to access food ordering and room services. The system was tested and able to track employees and provide services to customers as intended. Future work could improve security and performance.
P-ISM is a conceptual pen-style device package being developed by NEC Corporation that includes five functions: a cellular phone, virtual keyboard, small projector, camera scanner, and ID/payment chip. The devices would connect to each other and the internet wirelessly. Each function would be housed in its own pen-sized device. Together the system provides portable computing capabilities and allows for ubiquitous access to information.
The document discusses how the graphical user interface (GUI) and mouse enabled widespread adoption of personal computers and new technologies like ATMs, self-checkout systems, and online shopping. It explains how the GUI paradigm of direct manipulation introduced by Xerox PARC in the 1970s transformed human-computer interaction and led to technologies that increased convenience in both social and business settings. Key enabling technologies for practical implementation of the Internet of Things include low power operations, integrated precision-analog capabilities, small devices with extended battery life and graphical user interfaces.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
This document describes the design and implementation of a computer interfaced voice activated switch. The system allows electrical devices to be switched on and off using voice commands or manual control. The hardware components include a microcontroller, buffer, relays, and regulated power supply. The software uses Visual Basic 6.0 for the voice recognition application and to interface with the parallel port of the computer. When a voice command is received, the computer sends a signal to the microcontroller through the parallel port. The microcontroller then uses this signal to activate the appropriate relay and switch the connected load on or off. The system was tested and able to successfully control loads using both voice and manual methods.
This document discusses a security system project that uses fingerprint and keypad authentication to allow authorized individuals access. The system is programmed using an embedded microcontroller and C language. When a person places their finger on the reader, the system will check if they are authorized and prompt for a pin entry via keypad or mobile. If authorized, a message is sent to their mobile via GSM technology. The system aims to provide low-cost, automated security access for applications like ATMs.
IRJET- Voice Controlled Personal Assistant Bot with Smart StorageIRJET Journal
This document describes a proposed system that combines a voice-controlled personal assistant with smart wireless storage capabilities. The system aims to create a portable device that can act as both an intelligent assistant and storage for excess user data. By integrating file storage access with a voice assistant, the device would function as a smart memory assistant with processing power for user interactions, streaming, and personal cloud storage. The proposed system was motivated by limitations of existing voice assistants that do not provide storage, as well as drawbacks of separate storage devices like limited capacity and need for active internet connectivity with cloud storage.
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
IoT platforms provide tools and services to connect heterogeneous IoT devices, enable data flow and storage, and offer data analysis capabilities. They are scalable to handle billions of devices and messages per hour. Key features of IoT platforms include powerful data analytics and visualization dashboards, integration with other tools and platforms, and pay-as-you-go pricing models. Popular IoT platforms include Google Cloud Platform, Salesforce IoT Cloud, ThingWorx, IBM Watson IoT, Amazon AWS IoT Core, Microsoft Azure IoT Suite, Oracle IoT, and Cisco IoT Cloud Connect.
This document describes the development of an electronic nameplate system that allows users to change the displayed text wirelessly using an Android application. The system uses an Arduino Uno microcontroller connected to an LCD display to show the text. A Bluetooth module is used to wirelessly receive text messages sent from an Android app. Users can easily update the nameplate's text in real-time from their mobile phone without needing to physically access the display. The project aims to create a low-cost and user-friendly electronic nameplate system using Bluetooth communication between an Android application and the Arduino/LCD receiver module.
This document describes a touch screen and Zigbee based control system for apartments using an embedded system. The system uses a microcontroller, touch screen, Zigbee modules, and other components to allow users to control home appliances in their apartment wirelessly via the touch screen or voice commands. The microcontroller interfaces with the touch screen, Zigbee modules, and other devices. It receives input from the touch screen or other inputs and sends wireless signals via Zigbee to control appliances like lights and fans. The system aims to provide a compact, user-friendly, and low-cost way to remotely control home appliances within an apartment.
This document provides a network design for a small office. It outlines the hardware requirements, including routers, switches, printers, access points, cables, and computers. It assigns IP addresses to devices on two floors and shows the network topology diagram. The physical diagram and simulation pictures demonstrate how the network will be implemented. Costs are provided for each hardware component, with a total projected cost of the network. Advantages of the design include efficient performance, file and device sharing between users, and centralized data backup. Disadvantages include high upfront equipment costs and potential virus spreading.
Integrating sensors to sensor processing boards.docxSVITSEEERK
This document discusses single-board architectures (SBAs) that integrate sensors for data acquisition applications. It provides an overview of different types of SBAs, including single-board microcontrollers (SBMs) and single-board computers (SBCs). Examples are given of popular open-source and proprietary SBMs and SBCs, outlining their key specifications. The document emphasizes that SBAs are increasingly used in applications such as IoT, smart cities, transportation, and more, due to their low cost, size, and flexibility.
The document discusses options for multi-core platforms for human machine interfaces (HMIs) in industrial applications. It evaluates Texas Instruments' Sitara AM57x system on chip (SoC), Freescale/NXP's MAC57D5xx multi-core ARM-based microcontroller, and Intel's Atom E3800 SoC. The Sitara AM57x provides various CPU core options along with graphics and communications interfaces. The MAC57D5xx includes ARM Cortex cores, a graphics accelerator, and I/O processor. The Atom E3800 is based on Intel's x86 architecture and offers integrated graphics and I/O. A comparative analysis of these options is presented to determine the most suitable multi-
RAM allows data to be read and written in roughly the same amount of time regardless of the order accessed, unlike storage media like hard disks that are slower to access data in some locations. A CPU carries out computer program instructions by performing basic arithmetic, logical and input/output operations. A GPU is specialized for rapidly manipulating memory to generate graphics and is more efficient than CPUs for parallel processing of large data blocks. Common display technologies include LCD, CRT and plasma which present video output across a full rectangular area.
This document discusses key concepts related to information systems and technology infrastructure. It covers:
- The basic units of digital information, bits and bytes
- The evolution of IT infrastructure from mainframes to personal computers to client/server systems and cloud computing
- Factors driving infrastructure evolution like Moore's Law, network effects, and standards
- Components of computer networks, protocols like TCP/IP, and different network types
- The client/server model and packet switching for digital communications
- Proprietary versus open source software models
This document discusses edge computing in manufacturing. It begins by explaining the need for increased efficiency in manufacturing, which has led to paradigm shifts with each new industrial age. Edge computing is now driving the latest shift by analyzing data closer to where it is generated, such as from IoT devices. Edge computing involves infrastructure near data sources that enables local processing and analytics. This decentralized approach is necessary to fully leverage the large volumes of data now being produced. The cloud still has an important role to provide additional computing resources and centralized analysis of data. Effective communication between the edge and cloud is also important for seamless data transfer and automation.
Similar to Real-World Automation Control through the USB Interface (20)
This document discusses the impact of data mining on business intelligence. It begins by defining business intelligence as using new technologies to quickly respond to changes in the business environment. Data mining is an important part of the business intelligence lifecycle, which includes determining requirements, collecting and analyzing data, generating reports, and measuring performance. Data mining allows businesses to access real-time, accurate data from multiple sources to improve decision making. Using business intelligence and data mining techniques can help businesses become more efficient and make better decisions to increase profits and customer satisfaction. The expected results of applying business intelligence include improved decision making through accurate, timely information to support organizational goals and strategic plans.
This document presents a novel technique for solving the transcendental equations of selective harmonics elimination pulse width modulation (SHEPWM) inverters based on the secant method. The proposed algorithm uses the secant method to simplify the numerical solution of the nonlinear equations and solve them faster compared to other methods. Simulation results validate that the proposed method accurately estimates the switching angles to eliminate specific harmonics from the output voltage waveform and achieves near sinusoidal output current for various modulation indices and numbers of harmonics eliminated.
This document summarizes a research paper that designed and implemented a dual tone multi-frequency (DTMF) based GSM-controlled car security system. The system uses a DTMF decoder and GSM module to allow a car to be remotely controlled and secured from a mobile phone. It works by sending DTMF tones from the phone through calls to the GSM module in the car. The decoder interprets the tones and a microcontroller executes commands to disable the ignition or control other devices. The system was created to improve car security and accessibility through remote monitoring and control with DTMF and GSM technology.
This document presents an algorithm for imperceptibly embedding a DNA-encoded watermark into a color image for authentication purposes. It applies a multi-resolution discrete wavelet transform to decompose the image. The watermark, encoded into DNA nucleotides, is then embedded into the third-level wavelet coefficients through a quantization process. Specifically, the watermark nucleotides are complemented and used to quantize coefficients in the middle frequency band, modifying the coefficients. The watermarked image is reconstructed through inverse wavelet transform. Extraction reverses these steps to recover the watermark without the original image. The algorithm aims to balance imperceptibility and robustness through this wavelet-based, blind watermarking scheme.
1) The document analyzes the dynamic saturation point of a deep-water channel in Shanghai port based on actual traffic data and a ship domain model.
2) A dynamic channel transit capacity model is established that considers factors like channel width, ship density, speed, and reductions due to traffic conditions.
3) Based on AIS data from the channel, the average traffic flow is calculated to be 15.7 ships per hour, resulting in a dynamic saturation of 32.5%, or 43.3% accounting for uneven day/night traffic volumes.
The document summarizes research on the use of earth air tunnels and wind towers as passive solar techniques. Key findings include:
- Earth air tunnels circulate air through underground pipes to take advantage of the stable temperature 4 meters below ground for cooling in summer and heating in winter. Testing showed the technique can reduce ambient temperatures by up to 14 degrees Celsius.
- Wind towers circulate air through tall shafts to cool air entering buildings at night and provide downward airflow of cooled air during the day.
- Experimental testing of an earth air tunnel system over multiple months found maximum temperature reductions of 33% in spring and minimum reductions of 15% in summer.
The document compares the mechanical and physical properties of low density polyethylene (LDPE) thin films and sheets reinforced with graphene nanoparticles. LDPE/graphene thin films were produced via solution casting, while sheets were made by compression molding. Testing showed that the thin films had enhanced tensile strength, lower melt flow index, and higher thermal stability compared to sheets. The tensile strength of thin films increased by up to 160% with 1% graphene, while sheets increased by 70%. Melt flow index decreased more for thin films, indicating higher viscosity. Thin films also showed greater improvement in glass transition temperature. These results demonstrate that processing technique affects the properties of LDPE/graphene nanocomposites.
The document describes improvements made to a friction testing machine. A stepper motor and PLC control system were added to automatically vary the load on friction pairs, replacing the manual method. Tests using the improved machine found that the friction coefficient decreases as the load increases, and that abrasive and adhesive wear increased with higher loads. The improved machine allows more accurate and convenient testing of friction pairs under varying load conditions.
This document summarizes a research article that investigates the steady, two-dimensional Falkner-Skan boundary layer flow over a stationary wedge with momentum and thermal slip boundary conditions. The flow considers a temperature-dependent thermal conductivity in the presence of a porous medium and viscous dissipation. Governing partial differential equations are non-dimensionalized and transformed into ordinary differential equations using similarity transformations. The equations are highly nonlinear and cannot be solved analytically, so a numerical solver is used. Numerical results are presented for the skin friction coefficient, local Nusselt number, velocity and temperature profiles for varying parameters like the Falkner-Skan parameter and Eckert number.
An improvised white board compass was designed and developed to enhance the teaching of geometrical construction concepts in basic technology courses. The compass allows teachers to visually demonstrate geometric concepts and constructions on a white board in an engaging, hands-on manner. It supports constructivist learning principles by enabling students to observe and emulate the teacher. The design process utilized design and development research methodology to test educational theories and validate the practical application of the compass. The improvised compass was found to effectively engage students and improve their performance in learning geometric constructions.
The document describes the design of an energy meter that calculates energy using a one second logic for improved accuracy. The meter samples voltage and current values using an ADC synchronized to the line frequency via PLL. It calculates active and reactive power by averaging the sampled values over each second. The accumulated active power for each second is multiplied by one second to calculate energy, which is accumulated and converted to kWh. Test results showed the meter achieved an error of 0.3%, within the acceptable limit for class 1 meters. Considering energy over longer durations like one second helps reduce percentage error in the calculation.
This document presents a two-stage method for solving fuzzy transportation problems where the costs, supplies, and demands are represented by symmetric trapezoidal fuzzy numbers. In the first stage, the problem is solved to satisfy minimum demand requirements. Remaining supplies are then distributed in the second stage to further minimize costs. A numerical example demonstrates using robust ranking techniques to convert the fuzzy problem into a crisp one, which is then solved using a zero suffix method. The total optimal costs from both stages provide the solution to the original fuzzy transportation problem.
1) The document proposes using an Adaptive Neuro-Fuzzy Inference System (ANFIS) controller for a Distributed Power Flow Controller (DPFC) to improve voltage regulation and power quality in a transmission system.
2) A DPFC is placed at a load bus in an IEEE 4 bus system and its performance is compared using a PI controller and ANFIS controller.
3) Simulation results show the ANFIS controller provides faster convergence and better voltage profile maintenance during voltage sags and swells compared to the PI controller.
The document describes an improved particle swarm optimization algorithm to solve vehicle routing problems. It introduces concepts of leptons and hadrons to particles in the algorithm. Leptons interact weakly based on individual and neighborhood best positions, while hadrons (local best particles) undergo strong interactions by colliding with the global best particle. When stagnation occurs, particle decay is used to increase diversity. Simulations show the improved algorithm avoids premature convergence and finds better solutions compared to the basic particle swarm optimization.
This document presents a method for analyzing photoplethysmographic (PPG) signals using correlative analysis. The method involves calculating the autocorrelation function of the PPG signal, extracting the envelope of the autocorrelation function using a low pass filter, and approximating the envelope by determining attenuation coefficients. Ten PPG signals were collected from volunteers and analyzed using this method. The attenuation coefficients were found to have similar values around 0.46, providing a potentially useful parameter for medical diagnosis.
This document describes the simulation and design of a process to recover monoethylene glycol (MEG) from effluent waste streams of a petrochemical company in Iran. Aspen Plus simulation software was used to model the process, which involves separating water, salts, and various glycols (MEG, DEG, TEG, TTEG) using a series of distillation columns. Sensitivity analyses were performed to optimize column parameters such as pressure, reflux ratio, and boilup ratio. The results showed that MEG, DEG, TEG, and TTEG could be recovered at rates of 5.01, 2.039, 0.062, and 0.089 kg/hr, respectively.
This document presents a numerical analysis of fluid flow and heat transfer characteristics of ventilated disc brake rotors using computational fluid dynamics (CFD). Two types of rotor configurations are considered: circular pillared (CP) and diamond pillared radial vane (DP). A 20° sector of each rotor is modeled and meshed. Governing equations for mass, momentum, and energy are solved using ANSYS CFX. Boundary conditions include 900K and 1500K isothermal rotor walls for different speeds. Results show the DP rotor has 70% higher mass flow and 24% higher heat dissipation than the CP rotor. Velocity and pressure distributions are more uniform for the DP rotor at higher speeds, ensuring more uniform cooling. The
This document describes the design and testing of an automated cocoa drying house prototype in Trinidad and Tobago. The prototype included automated features like a retractable roof, automatic heaters, and remote control. It aims to address issues with the traditional manual sun drying process, which is time-consuming and relies on human monitoring of changing weather conditions. Initial testing with farmers showed interest in the automated system as a potential solution.
This document presents the design of a telemedical system for remote monitoring of cardiac insufficiency. The system includes an electrocardiography (ECG) device that collects and digitizes ECG signals. The ECG signals undergo digital signal processing including autocorrelation analysis. Graphical interfaces allow patients and doctors to view ECG data and attenuation coefficients derived from autocorrelation analysis. Data is transmitted between parties using TCP/IP protocol. The system aims to facilitate remote monitoring of cardiac patients to reduce hospitalizations through early detection of health changes.
The document summarizes a polygon oscillating piston engine invention. The engine uses multiple pistons arranged around the sides of a polygon within cylinders. As the pistons oscillate, they compress and combust air-fuel mixtures to produce power. This design achieves a very high power-to-weight ratio of up to 2 hp per pound. Engineering analysis and design of a prototype 6-sided engine is presented, showing it can produce 168 hp from a 353 cubic feet per minute air flow at 12,960 rpm. The invention overcomes issues with prior oscillating piston designs by keeping the pistons moving in straight lines within cylinders using conventional piston rings.
More from International Journal of Engineering Inventions www.ijeijournal.com (20)
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Real-World Automation Control through the USB Interface
1. International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 2, Issue 6 (April 2013) PP: 48-56
www.ijeijournal.com Page | 48
Real-World Automation Control through the USB Interface
Robert H. Sturges
Abstract: The shift in design of the personal computer to address applications in the area of multimedia and
the obsolescence of ports for convenient access to hardware-software interfaces has begun to limit opportunities
for the practice of custom-designed controls for automation. While several third-party hardware-software
control packages exist, their learning curves and expense has not addressed the more fundamental needs of the
designer to simply access and control a few bits or words of real-time information. This design shift has also
given rise to the need for specialists in programming or information technology where the application may not
support such effort. We address this need by providing a framework and examples of inexpensive hardware and
simplified software with its logical design expressed in interdisciplinary form.
Keywords: hardware-software interface, automation control, logical design
I. Introduction
The days of ubiquitous memory-addressable I/O are long gone (1950 through 1985), but the last
vestiges disappeared only recently with the phasing out of the printer port, and the adoption of the "Universal
Serial Bus", or USB. Thus, a large class of computer peripherals and related software were obsoleted long
before they were functionally unable to compete. While printer ports existed one could very easily turn an
external light on and off by simple programming. [1] In this paper, we will review the current needs to do this
simple task. We will find that the newer protocols have added additional layers of software and firmware
between the programmer and the real-world application.
Let us clarify the meaning of the term "real-world" in this instance. The intensely market-driven world
of personal computers (PC's) has led to the seamless integration of multimedia with business support software
and interfaces limited to keyboards, mice, and glowing rectangles. As this paper is drafted, we are seeing the
replacement of keyboards and mice with touch-screen interfaces for the consumer who wants to manipulate pre-
defined graphical images. Control or interactivity with anything else, such as a simple light bulb or non-
standard keyboard is practically out of the question if it does not support a large consumer market segment.
This "virtual world" by contrast, is pre-packaged and pre-defined for the consumer based on extensive analysis
of taste and desires of a public conditioned to consider the computer as an appliance rather than a device for the
implementation of specific logical needs. [2] The boundaries of "being digital" today are not surprising since
the vast majority of installed computers are operationally dependent on a monopoly.
The notion of using USB for control of "real-world" devices, we will assert, is based on the relatively
large capacity for computes at low cost compared with specialized control hardware. [3] Through our examples,
we will touch upon the necessary investments today's peripheral provider must make to remain in the business
At the time of this writing, USB 2.0 is commonplace, while we await the appearance of the next level
(USB 3.0) on the mass consumer market. Compared with the legacy methods of printer port and so-called
"serial port" interfaces, USB offers advantages in speed, power, and convenience [4]. Disadvantages include
lack of real-time response and the need to interface with unknowable codes written by others, and purposely not
publicly documented. [5]
With respect to speed, USB 2.0 offers a "throughput" of 480 Mbps, but the timing of such data may be
uncontrollable by the user. With respect to power, a built-in 500 mA source is specified at each "port", of which
there may be up to 127 such ports. Thus, some low-power peripherals may no longer require the otherwise
ubiquitous "AC adapter" or wall-wart in order to function. With respect to convenience, the USB specification
requires "plug and play" interconnectivity. This means, in brief, that the user may not be required to suspend the
operation of other running programs while the lower-level of connectivity is negotiated by the Operating System
(OS) and the peripheral. Of course, this implies that the peripheral is now required to support an intricate series
of handshaking activities not required previously. Fortunately, this software task has been implemented in
firmware by several vendors of "interface chips", e.g. Future Technology Devices International, a/k/a FTDI. [6]
On the minus side, while the USB standard is public knowledge, it spans several thousand pages of highly
detailed technical data that differs in detail for each hardware implementation. [7]
II. Objective
Our objective in this paper is to enable educators, researchers, low-volume practitioners, and unique
system creators to use the power of multi-GHz computing for custom programming not deemed relevant by the
forces of market-driven "applications". We would note also that the need for "real-time" control still exists in
2. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 49
laboratories. By this we refer to the practice of knowing precisely (to the microsecond) when a signal will
appear at an interface for use by either party. Such real-time operations are only approximated by the alternative
"synchronous service" of USB in the delivery of digital video data, but this ability is being phased out as the
digital television market is supplanted by streaming technologies that do not need to support real-time
transmission.
With the demise of analog television, a large market segment has also been eliminated from
consideration, but real-time computing is still supported by a small cadre of laboratory-focused providers. [8]
Another key objective is to educate our general engineering student population, excepting perhaps
those in pursuit of degrees in Computer Science, to the means needed to achieve "software literacy" consistent
with industrial automation classroom activities. We find that no market-driven "applications" address this need.
2.1 Brief Literature Review
We acknowledge here the popularity of several alternative technologies directed to the control of real-
world devices, for example, valves, relays, motors, indicators, etc. The programmable logic controller (PLC)
has been in use for decades with offline programming methods based on then-current PCs. These devices
typically employ a reduced-capacity processor for on-line implementation, performing sequential logical
calculations in the same vein as parallel connected devices. In general these systems do not employ a run-time
graphical user interface (GUI), and function as repetitive, customized controllers for a broad range of equipment
systems with relatively low data processing tasks, e.g., RS Logix. [9] With such systems, an investment needs to
be made in the acquisition and practice of proprietary computer architectures and languages.
For about 25 years, a unique software product from National Instruments [10] has enabled the creation
of virtual instruments on a PC using a proprietary graphical "language". Teamed with that company's interface
hardware, individual digital and analog I/O is made possible along with extensive logical internal processing.
With care, one can program with procedural code embedded in the graphical media. For specialized
applications, one can avoid the PC altogether and operate such virtual instruments using field-programmable
gate arrays. Similar to the PLC's, an investment needs to be made in the acquisition and practice of proprietary
computer architectures and languages, in addition to the I/O hardware. Recently, USB-compatible hardware for
introductory use has been offered. [e.g., NI's "6009" I/O block product]
We have surveyed the contemporary marketplace for introductory volumes to support the available
hardware and find that a relatively high level of programming skill is assumed, while the level of hardware
knowledge assumed is quite low. This indicates a trend away from interconnection with the real-world in favor
of the virtual world isolated from the exigencies of hardware save the screen and keyboard. This prospect and
the market pressures that created it are well-addressed in research devoted to rapid obsolescence. [11]
III. Approach
Our approach to providing a kernel of knowledge which may serve the related needs of educators and
the general engineering marketplace proceeds with the identification of a minimal set of interface hardware with
which to establish the USB communication protocols at the "outboard" end of the information chain. (Figure 1)
We then proceed to develop the "inboard" end of the information chain with the express interest in an "open"
architecture for personal program realization. In both steps, we assume the minimum amount of specialized
programming and electronic knowledge of the user.
To communicate (rather than encapsulate) this knowledge, we express here the basic functions that
need to be performed irrespective of the hardware or software platforms selected. Only to express examples of
the method do we resort to actual coding and select a hardware platform. The functional approach was
developed decades ago by teams of "value engineers" intent on reducing the cost of military acquisitions by
expressing the instance of a product or process by its generic functions, all logically connected by "and" and
"or" links. [12] An example function block diagram is shown in Figure 2, wherein the highest level function is
placed to the left, and its decomposed lower-level functions appear more rightward. Notice that the "flow" of
the knowledge is expressed by answering the question "why" by looking towards the left, and the question
"how" by looking towards the right.
The functions themselves are expressed by a single active verb and a measureable generic noun in a
small rectangle. For example, "support load" is a viable function, whereas "provide support" is not. [13] There
is no "right or wrong" function diagram, only viable and non-viable ones as judged by the team of users that
employ them for interdisciplinary communication purposes. Please notice also that such a diagram is not
intended to express the same information as a "flow chart" since the latter rarely explains the raison d'art for the
functions and their logical relationships. In our example, the right-most series of functions, when read from the
top to bottom concisely express the "pseudo code" prevalent in other articles. Taken all together, the function
diagram expresses the intent of the designer or user.
3. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 50
In any such endeavor, one must chose software and hardware platforms to realize this intent. We have
chosen the C-language for our software because is appears to be the most popular and most enduring choice.
We will additionally assume a low level of expertise in C by the reader so that the essence of the project can be
readily apprehended, but we will not be offering here a review of the elements of that language. We recognize
the strong following of other languages such as C#, Java, and C++, but have avoided the object-oriented
approach as not vital to the task at hand, and have steered away from proprietary implementations as much as
possible. We have also chosen the Phidgets™ hardware platform since, for the present at least, the hardware
and software implementation is more than adequate for the inexperienced user. We are in no case affiliated with
that company, and several others, such as J-Works™ or Active Wire™ may serve as well.
Another choice needed to be made in this endeavor: that of the PC itself. Since the market is led by
said monopoly, we have selected Windows™ as our OS, but you will find that others support the use we make
of it equally well. The PC hardware choice is fully generic, so long as it has a USB-compatible port.
To recapitulate, the goals of this project were to illustrate by practical example the steps one must take
to realize communication between an application of custom-developed code as practiced by a general
engineering audience with equally customized hardware. The examples we will now discuss in detail comprise
a general-purpose analog/digital interface ("ifKit"), and a commonplace R/C servo interface ("servo").
IV. Details of Implementation
The implementation of communication to a USB device in these cases comprises two separate
instances. In the first instance, the hardware supplier has provided software that interacts with the user through
a specialized window. This window displays the measured conditions of the external board at the "outside" end
of the USB chain. The user cannot access the code from which this window appears, but can determine through
its use the fact that the board may be attached and operating correctly. One may also "test" the outputs in some
cases by setting certain fields within the window.
In the second instance, the programmer uses software calling sequences to communicate with the
external board. These sequences are pre-compiled for the most part, so that again, the programmer cannot
access the code through which this communication occurs.
Prior to the instantiation of either of the two instances, the user must install a set of pre-compiled codes
called "drivers" into the OS of the target computer, in much the same way as "printer drivers" are installed for
that purpose. Because one cannot access this code, the possibility does not exist for the user to specify the
precise timing of any of the communication actions that take place. By dint of the high speed of the processor,
one must assume a "level of service" that may be commensurate with the task to be performed, but there are no
guarantees. Figure 3 illustrates the functionality of this driver (as much as can be known) by the isolated
function block in the upper left-hand corner, and the software agent by the oval entitled "Phidget Software".
These two fragments are connected by a solid line representing the functional "and" operator. In this example,
the board is a Phidget type 1018 Interface Kit.
The instructions needed to install the drivers and to access the test window are given in the company's
Programming Manual that was available on "the web" through that company's web-site, "Phidgets". (It is
important to note that the rapidly changing nature of the hardware and software market requires the user to
adopt a "digital" outlook and accept the fact that information may appear, change and even evaporate without
notice at any time. In this paper we have avoided giving such ephemeral references wherever possible.)
Our purpose is to educate users and implement examples of the code that we do have control over, so
our basic function is given as "Test Protocol". An equally valid basic function could be "Educate User" if the
working team agrees. How to perform this basic function is specified by three sub-functions: Verify
Communications, Display Changes, and Stop Communications. Each of these functions is further sub-divided
as shown.
Taking first the Verify Comm's function, we need to "open" the board for communications, and inform
the user (or his/her program) that we have done so. These two sub functions will comprise the most novel of the
tasks for the programmer with respect to the hardware. The order (top to bottom) of each sub-function for these
is arbitrary, but we have arranged the function block diagram (FBD) so that it reads at the fourth level like a
flow chart vertically insofar as possible. As with any program in C, one typically declares the variables and
their types at the beginning of the code. A new feature is next introduced, that of declaring a "handle" for the
external device to be invoked by the code in the PC. This handle takes the place of the memory-mapped I/O of
earlier days, and it is simply a pointer to an address that acts as the gateway for all communications with the
device. A separate step is needed to create the space in memory for this handle. The detailed instructions for
these steps are given in the on-line data base of the Phidgets web-site, or in the appendix which shows the actual
C-code used by the authors.
To account for the possibility that the device is not physically connected to the USB port of the PC, a
function is created that tests and waits for the attachment of the same for a user-specified period of time. During
4. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 51
this time, the user may post a warning on the screen of the PC. After the negotiation for communication is made
by the firmware of the device and the PC, the user may call a pre-written function to "open" the board for
communication (reminiscent of the "open" command in BASIC). Each of these pre-written functions are known
as the Application Programmer's Interface (API), and are supplied by the maker of the interface board so that
communication with the same is facilitated. In the C language, these may be placed in so-called "header files".
In this case, the major header file is named "Phidget21.h". Without it being present, the compiler will not
successfully bring these functions into the user's code. Also, there will be a corresponding library of pre-
compiled functions that must be linked to the compilation process. In this case the "Phidget.lib" file needs to be
attached to the linker through its input dependencies listing.
As Figure 3 illustrates, there are functions needed to inform the user (or the user's program) of other
activity: in the first sub-function, we invoke the API to fetch and display the serial number of the attached
device and its physical and functional characteristics. This step is crucial if more than one of the same type of
device is attached to the USB. The serial number found would be used to distinguish between the attached
devices for steering the desired I/O. Each handle created would be associated with a separate serial number. In
the second sub-function, error conditions are made visible, that is, an API call is made to extract details of the
error condition. Also, a "call-back" function is defined to catch any errors that are thrown by the compiled code.
This process involves the declaration of a function that will be invoked whenever an error condition arises. This
function is of our own design but must be identified by the type "__stdcall" so that the compiler can establish a
link between the internal error traps and the user's code. (There are two underscores before the letters "stdcall".)
The center portion of Figure 3 illustrates many opportunities to invoke the API provided by the Phidget
company. Here, the programmer sets bits in an output register according to the numbers returned by calling
analog input channels. In this case, a popular distance measurement unit (a Sharp 2Y0A02) returns an analog
voltage in response to detecting a reflective object within its range. The setting of the output bits is illustrated in
the C code with concern for reader transparency of the functions, not efficiency of the code itself.
Finally, the program is shown responding to a 'q' from the keyboard, indicating the end of the test. At
this point, the API is again invoked with functions to close the communications and delete the memory space
allocated in the handle creation step. Failure to do this may result in a build-up of inactive code, otherwise
known as a "memory leak" as the host system begins to respond more slowly with repeated usage.
The entire C code is given in the Appendix of this paper for reference, but may be available on our
website. <http://www.tbd...> In its recommended form, all comments are colored green, quoted text is colored
red, keywords are blue, and the code body is in black ink. Line numbers are shown in cyan. Except for the
"__stdcall" and a few necessary pointers, the C code is rendered as simply as possible for the inexperienced
reader.
4.1 A Further Example
To illustrate more fully the programming conventions needed to bridge the "USB gap" for the educator
and user of real-world devices, a second example will be briefly described. In this instance a USB-driven radio-
control type (R/C) servo board is chosen to illustrate slightly more complex communications. It is a Phidget
type 1061 Advanced Servo board. Figure 4 shows the FBD of the interface program, and one will note how
similar it is to the entirely different hardware and software system represented in Figure 3. One of the major
benefits of the FBD approach is to illustrate the commonality inherent in many artifacts that appear to be
otherwise quite distinct. For this reason we will examine this example of the servo control from the viewpoint
of the code itself, as it appears in the appendix.
The program begins (for the sake of the compiler) with the "includes". (It begins for us with the
"main()" function located near the physical end.) We add <stdlib.h> since we will be using the "atof" function
defined there. We continue with our global variables: a character to be read from the keyboard, a true/false
indicator for the main loop, and an array of values to hold the target movements of each servo. We define eight
of these, but will be using only two.
The first function is our "call-back" which is typed __stdcall. We name it ErrorHandler, and the
parameter list comprises the device handle (SRV), a utility pointer that we will not be using, the ErrorCode and
a pointer to the character string that describes the error itself. This function gets called by the compiled code
whenever the system of Phidget API software detects a problem. Otherwise it is inactive. Like all int functions,
we return a value (0) to the OS.
Our next function, display_properties, needs one parameter of type "CPhidgetAdvancedServoHandle".
The C language encourages customized typing, and in this case makes it clear that the language is C, the vendor
is Phidget, the type of interface board is AdvancedServo, and that the parameter itself is the pointer/handle to
the gateway that transmits all information about the board to the program which uses it. Our local variables
include facts about the board (to be determined) and a character string pointer for storing the name of the board.
We then make a call to the API function to return the type of device connected. Its parameter list contains a
5. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 52
seldom-used feature: the handle is "cast" as a "CPhidgetHandle" type just to be sure that the compiler knows to
look in its ...phidget21 library. A list of this information serves as the initial data base for identifying the
device, should there be multiple copies of the same type of board connected to the USB.
Our next function, move_servo, needs the familiar handle, SRV. This small function reads the
keyboard to get a floating-point number by way of a character string of up to 10 characters (value). After
scanning the keyboard, this string is converted to a double and saved in an array for use in the next line. We
then call another API function which needs the handle, the index value of the servo motor to move, and the
exact angle in degrees we command it to move to. Incidentally, the list of all the API functions available does
not appear in any reference book, but rather "on-line" at the Phidget web-site. The interested reader must
navigate to this list and its recommended usages by selecting the specific Phidget device from a list (in the left-
hand column). The list is only a few steps below the home page, so we will not describe it in detail here.
The "big" function appears next, and it would be considered the "main" function but for the stylistic
approach to C which keeps main mostly empty. Line 49 is both a declaration and an assignment, making space
for the device handle. In older PC's this would be a fixed location in memory to which we would make all
references to our attached device. The next line invokes an API function to actually reserve space for all the
data associated with the handle and our attached device. We then call an API function to define the name of the
error handler we defined earlier with our __stdcall. Now, the compiled code will compute the correct reference
to invoke when an error is thrown. Finally, we call another API function to open the board for communications.
The "-1" parameter is a requirement of the API.
We now ask if the device is indeed connected via USB (has the interface been negotiated
satisfactorily?), and wait for a prescribed number of milliseconds if not. If no problems occurred, we collect and
display the properties of the connected device. A for-loop follows which sets the properties for each servo
dynamic response, and chose at this point to actually engage the servo into action. This last step can be inserted
anywhere appropriate for our needs.
A user-terminated while-loop appears next, prompting the user to enter an 'm' to move a servo, or a 'q'
to quit. The switch statement uses the ASCII equivalent of these characters. If we do elect to quit, we invoke a
pair of API calls to close the board from communication and delete the memory allocated for it. The "main"
that follows is the actual entry point for a C program.
V. Results
The practical result of this project is the implementation of a simple, low-cost demonstration board for
the educator and first-time user of customized USB devices. Figure 5 depicts a 5 x 8 inch platform upon which
has been attached the two USB interface boards mentioned above. Also included are a pair of infra-red (IR)
distance measuring units and a pair of R/C servo units. The InterfaceKit 1018 also has a pair of LED's attached
to two of its eight digital output ports. Not shown are the USB cables that attach to the host PC and the small
power supply needed to power the 1061 board servos.
The intellectual result of this project is the understanding of the user-designed and written software
which works through the "encapsulated" codes of the maker of the boards and the authors of an OS and C
compiler for a PC. We have shown how to establish communication with USB-powered interface boards of
differing functions with a few fundamental programming ideas. We also illustrate the use of a function-defined
structure for designing the code at a high level before committing to writing at the level of the compiler. In this
way, the sections can be examined by all stakeholders and agreement reached before the debugging process
begins.
VI. Conclusion
This article has endeavored to provide implementation transparency for the developer and user of low-
quantity, often unique interfaces without the need for specialists in "information technology" and computer
networking. We look forward to the application of this work to industrial automation classroom activities, at
least, and to implementations within the research communities far removed from "computer science". We have
found that one hardware and software system worked very well, and could work across many platforms, but
caution that many others exist and that we make no recommendations or endorsements of a particular vendors
product.
We also recommend carefully exploring the API provided by the maker before choosing a USB
interface board for your own purposes. Your choice of language may not be C, but the API you select must be
compilable from your language of choice.
6. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 53
APPENDIX: Annotated Software for the Interface Kit and the Servo
Figure 1. A User's High Level View of the USB Information Chain
Figure 2. A Generic Function Diagram (After [14])
7. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 54
Figure 3. Function Diagram for the Interface Kit Software
8. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 55
Figure 4. Function Diagram for the Servo Software
9. Real-World Automation Control through the USB Interface
www.ijeijournal.com Page | 56
Figure 5. Instructional Board for the Interface Kit and the Servo
References
[1] Bergsman, P., 1994, Controlling the World with Your PC, Newness Press, ISBN-10: 1-878707-15-9
[2] Negroponte, N., 1995, Being Digital, Vintage Publishing, ISBN-10: 0-679762-90-6
[3] Gleik, J., 2000, Faster, Vintage Publishing, ISBN-10: 0-679775-48-X
[4] Podgórski, A., Nedwidek, R., Pochmara, M., 2003, "Implementation of the USB Interface in the Instrumentation for Sound and
Vibration Measurements and Analysis", IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing
Systems: Technology and Applications, 8-10 September 2003, Lviv, Ukraine, pp 159-163.
[5] Horton, I., 2008, Beginning Visual C++ 2008, Wiley Publishing (Wrox imprint), ISBN: 978-0-470-22590-5, pp 358-366.
[6] www.ftdichip.com, 3 November 2011
[7] www.usb.org/home, Universal Serial Bus Specification, Revision 1.1, Jan 1998
[8] www.ni.com/labview/, 3 November 2011
[9] www.rockwellautomation.com/rockwellsoftware/design/rslogix5/, 3 November 2011
[10] Bishop, R., 2001, Learning with LabVIEW 6i, Prentice Hall, ISBN-10: 0130325597
[11] Zheng, L., 2010, Ontology-based Knowledge Representation and Decision Support for Managing Product Obsolescence, Ph.D.
Dissertation, Virginia Polytechnic Institute and State University, May 13
[12] Fowler T. C., 1990, Value Analysis in Design, Van Nostrand Reinhold, ISBN-10: 0-442-23710-3
[13] Sturges, R.H., O’Shaughnessy, K., & Reed R. G., 1993. “A Systematic Approach to Conceptual Design Based on Function Logic”
Int’l Journ. of Concurrent Engineering: Research & Applications (CERA), Vol. 1, No. 2, June 1993, pp 93-106.
[14] Ruggles, W.F., 1971, “FAST - A Management Planning Tool”, SAVE Encyclopedia of Value, Vol. 6, p. 301.