scholarly journals Holistic Ontology-Based Assistance System for Efficient Process Model Parameter Identification

2015 ◽  
Vol 2015 ◽  
pp. 1-14 ◽  
Author(s):  
Burkhard Hensel ◽  
Thomas Wagner ◽  
André Gellrich ◽  
Klaus Kabitzsch ◽  
Bernd Kauschinger

Accurate models of technical systems are the basis for many tasks like system analysis, predictions, or controller design. Usually, the values of several important parameters cannot be determined by theoretical analysis only; instead, process identification is necessary. For several applications, the efficiency of the identification procedure is very important, for example, for the creation of thermal models of machine tools, because of the large time constants and the expensive machine time. The goal of the authors is the support of this task as far as possible by software. This paper contributes to that goal twofold: on the one hand, it provides a collection of influences which have to be considered for supporting the identification procedure. On the other hand, concepts for computer-based support are presented—ontologies and automatic design methods based on evolutionary algorithms.

Author(s):  
Federico Cheli ◽  
Paolo Dellacha` ◽  
Andrea Zorzutti

The potentialities shown by controlled differentials are making the automotive industry to explore this field. While VDC systems can only guarantee a safe behaviour at limit, a controlled differential can also increase the handling performance. The system derives from a rear wheel drive architecture with a semi-active differential, to which has been added a controlled wet clutch that directly connects the front axle and the engine crankshaft. This device allows distributing the drive torque between the two axles, according to the constraints due to kinematics and thermal problems. It can be easily understood that in this device the torque distribution doesn’t depend only from the central clutch action, but also from the engaged gear. Because of that the central clutch controller has to consider the gear position too. The control algorithms development was carried on using a vehicle model which can precisely simulate the handling response, the powertrain dynamic and the actuation system behaviour. A right powertrain response required the development of a customize library in Simulink. The approach chosen to carry on this research was the one used in automotive industry nowadays: an intensive simulation campaign was executed to realize an initial controller design and tuning.


10.17158/514 ◽  
2016 ◽  
Vol 19 (2) ◽  
Author(s):  
Jovelyn M. Durango ◽  
Carlito P. Yurango

<p>The advent of technology has improved the way statistics is taught and learned. It is claimed that the use of computer-based instructional tools can actively explore the meaning of statistical concepts among the students, as well as enhance their learning experiences. This study aimed to compare three methods of statistical analysis namely, the traditional technique (use of the calculator), Microsoft Excel and Statistical Package for Social Sciences (SPSS) software. This investigation utilized the experimental design, specifically the One-Group Pretest – Posttest Design. There were six education students who self-assessed their attitude before and after the introduction of the use of various computation techniques and performed the statistical analysis considering also the completion time required for each process. Results of the study revealed an increase in the level of attitude among the respondents form the pretest to the posttest. Also, the cognitive level regardless of the approach was very high. However, the t-test failed to establish a significant difference in the attitude among the respondents. On the other hand, there were significant differences in both the test scores and completion time of the respondents in the three methods in favor of SPSS.</p><p> </p><p><strong>Keywords: </strong>Information technology, statistics, traditional technique, Microsoft excel, SPSS, comparative analysis, experimental research design, Davao City, Philippines. </p>


Objectives: The main aim of this study was to investigate the factors that influence students’, academicians’, clients’, as well as developer’s preferences in choosing their preferred approach in system development, namely structured analysis design (SAD) or object-oriented analysis and design (OOAD). Methods: The research design was based on a survey methodology and a case study. For the survey, questionnaires were administered to 30 students and 38 academicians, who were randomly selected from several Malaysian universities. For the case study, the requirements of the information system were modeled and presented to several clients to elicit their feedback. The survey data were analyzed using SPSS Findings: The result shows that students preferred the use of OOAD approach, which clearly outnumbered those who preferred the SAD approach, which stood at 33%. Interestingly, the majority (53%) of academicians preferred the use of a mixture of both approaches. Likewise, the clients shared a similar view with the academicians, whereas the developer preferred the OOAD approach. Application/Improvements: Clearly, the findings suggest that both approaches are essential, but the one that is widely used by developers and preferred by students is OOAD, and thus should be given priority when it comes to structured analysis and design. As such, curriculum designers and institutions of higher learning, particularly those offering system analysis and design and related courses, should make the necessary changes to the existing curriculum such that the academic programs offered will be able to produce highly competent and skilled analysts and designers as required by the industry.


2018 ◽  
Vol 31 (1) ◽  
pp. 84-110
Author(s):  
J.-B. BURIE ◽  
R. DJIDJOU-DEMASSE ◽  
A. DUCROT

This work is devoted to the study of an integro-differential system of equations modelling the genetic adaptation of a pathogen by taking into account both mutation and selection processes. First, we study the asymptotic behaviour of the system and prove that it eventually converges to a stationary state. Next, we more closely investigate the behaviour of the system in the presence of multiple EAs. Under suitable assumptions and based on a small mutation variance asymptotic, we describe the existence of a long transient regime during which the pathogen population remains far from its asymptotic behaviour and highly concentrated around some phenotypic value that is different from the one described by its asymptotic behaviour. In that setting, the time needed for the system to reach its large time configuration is very long and multiple evolutionary attractors may act as a barrier of evolution that can be very long to bypass.


Author(s):  
Irina A. Gerasimova ◽  

The article combines historical, cultural and systematic approaches to the analysis of digital transformations of society and man. Digital technologies play a crucial role in the transformation of economy, politics and society at the new stage of technologization. Developments and strategic projects for the introduction of arti­ficial intelligence, robotics, augmented and hybrid realities are implemented not only in the areas of dangerous, labor-intensive and routine work (i.e. in military affairs, industry, financial and economic operations), but also in the intellectual and creative spheres. The global time of change requires a global-system analysis. The invention of high information technologies and the interest of big business in the one-sided technologization of society disrupted the balanced co-evolution of computer technology and society. The author offers a noo-eco-geosystem ap­proach to the analysis of the crisis of technogenic civilization and the search for ways out of it. The complex grid of coordinates of the analysis includes planetary-physical, geo-ecological, geopolitical, geo-economical, geo-social, national socio-cultural, ethical and anthropological dimensions. The noo-eco-geosystem ap­proach makes it possible to reveal the catastrophic risks of digital economy and society strategies. The author considers energy and information and communica­tion technologies as catalysts for the accelerated transformation of society and the individual. These catalysts allow us to identify both the negative and positive as­pects of the global processes of evolution, as well as the “positive in the nega­tive”. The system analysis of digital transformations of society and man assumes consideration of methodological aspects of opportunities and limitations of tech­nologies. The destructive and purifying character of the transformations of nature and society is considered as a self-organizing process of the formation of the global world order, the future picture of the world and the qualitative transforma­tions of the mind on the basis of the values of noospheric ethics and geosociality


Author(s):  
Muthu Ramachandran ◽  
Zaigham Mahmood

Internet security is paramount in today’s networked systems, especially when they provide wireless application access and enable personal and confidential data to be transmitted across the networks. Numerous tools and technologies are available to ensure system security, however, external threats to computer systems and applications are also becoming more and more sophisticated. This chapter presents a framework that consists of two components: (1) an assessment model to look at the existing security infrastructure of an organisation to determine its security maturity level; and (2) a process improvement maturity model to suggest an improvement mechanism for the organisation to progress from one maturity level to the next higher level. The intention is to provide a framework to improve the organisation’s Internet and network security so that it becomes more efficient and effective than before. The improvement process model is a 5-stage framework, which has the potential to be established as a standard maturity model for assessing and improving security levels in a manner similar to other software process improvement framework such as CMMI. Preliminary results, based on looking at the existing security measures of one particular organisation, reveal that there is indeed a need for an appropriate model such as the one being proposed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document