scholarly journals Application of Internet of Things Sensor in Intelligent Art-Aided Design

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yihuai Xie ◽  
Wei Wang

As a new and popular technology, the IoT is deeply affecting the design method of art. It not only brings many benefits but also brings challenges to the field of information storage. The structure of intelligent art-aided design system based on IoT sensor is designed, and the traditional C/S is applied in the application structure. The IoT information storage center needs to design a suitable data storage scheme according to its data characteristics. On the basis of fully mastering the principles and concepts of decorative art and the basic process of art-aided design, according to the magnanimity and temporal and spatial correlation, the application of this data distribution method to art-aided design can significantly improve the efficiency of art design. Experiments show that compared with similar random and Bubba algorithms, this strategy has better performance in system in terms of DM and LBST index. Finally, using the results of the control group and the experimental group, this paper verifies that the art-aided design system of the Internet of things can improve users’ design enthusiasm; develop design potential and initiative; improve designers’ observation ability, thinking method, and expression ability; and significantly improve users’ design ability and design level.

2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2014 ◽  
Vol 614 ◽  
pp. 107-112
Author(s):  
Xiao Yu Yin ◽  
Xian Ping Xie ◽  
Zhen Li ◽  
Jian Gong Li ◽  
Ting Jun Wang ◽  
...  

Expert systems, or knowledge based systems, are programs in which the answer to a user-posed question is reached by logical or plausible inference rather than strictly by calculation, although calculation routines can form a major part of an expert system. Based on the integration of expert system technology and optimization technology, an intelligent computer aided design method for mine ventilation systems is proposed in this paper. Firstly, the structure and control algorithm of the intelligent design system are explored. Secondly, the knowledge types required for the mine ventilation expert system and the acquiring method of knowledge are discussed. Finally, the inference method of this expert system is put forward.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2013 ◽  
Vol 644 ◽  
pp. 374-377
Author(s):  
Xue Peng Liu ◽  
Dong Mei Zhao

By investigating the characteristics of mold design in mechanical engineering, a framework of computer aided design tool is designed. A standard part library based on Client/Server mode and management tools are designed. The system improves the intelligence by introducing case-based design method


2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh

2013 ◽  
Vol 690-693 ◽  
pp. 2643-2646
Author(s):  
Guo Chang Li

Welded pipe and special pipe get more and more applications; however, the difficulty of pass design method limits welded pipe manufacture. The paper discusses welded pipe roll pass design method based on CATIA, and roll CAD/CAPP computer aided design system based on AutoCAD, and gives roll virtual design methods which use roll CATIA, CAD/CAPP system.


2020 ◽  
Author(s):  
Jaimon T Kelly ◽  
Katrina L Campbell ◽  
Enying Gong ◽  
Paul Scuffham

UNSTRUCTURED The Internet of Things (IoT) is a system of wireless, interrelated, and connected digital devices that can collect, send, and store data over a network without requiring human-to-human or human-to-computer interaction. The IoT promises many benefits to streamlining and enhancing health care delivery to proactively predict health issues and diagnose, treat, and monitor patients both in and out of the hospital. Worldwide, government leaders and decision makers are implementing policies to deliver health care services using technology and more so in response to the novel COVID-19 pandemic. It is now becoming increasingly important to understand how established and emerging IoT technologies can support health systems to deliver safe and effective care. The aim of this viewpoint paper is to provide an overview of the current IoT technology in health care, outline how IoT devices are improving health service delivery, and outline how IoT technology can affect and disrupt global health care in the next decade. The potential of IoT-based health care is expanded upon to theorize how IoT can improve the accessibility of preventative public health services and transition our current secondary and tertiary health care to be a more proactive, continuous, and coordinated system. Finally, this paper will deal with the potential issues that IoT-based health care generates, barriers to market adoption from health care professionals and patients alike, confidence and acceptability, privacy and security, interoperability, standardization and remuneration, data storage, and control and ownership. Corresponding enablers of IoT in current health care will rely on policy support, cybersecurity-focused guidelines, careful strategic planning, and transparent policies within health care organizations. IoT-based health care has great potential to improve the efficiency of the health system and improve population health.


Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4483 ◽  
Author(s):  
Iago Sestrem Ochôa ◽  
Luis Augusto Silva ◽  
Gabriel de Mello ◽  
Bruno Alves da Silva ◽  
Juan Francisco de Paz ◽  
...  

With the popularization of the Internet-of-Things, various applications have emerged to make life easier. These applications generate a large amount of user data. Analyzing the data obtained from these applications, one can infer personal information about each user. Considering this, it is clear that ensuring privacy in this type of application is essential. To guarantee privacy various solutions exist, one of them is UbiPri middleware. This paper presents a decentralized implementation of UbiPri middleware using the Ethereum blockchain. Smart contracts were used in conjunction with a communication gateway and a distributed storage service to ensure users privacy. The results obtained show that the implementation of this work ensures privacy at different levels, data storage security, and performance regarding scalability in the Internet of Things environments.


1994 ◽  
Vol 10 (04) ◽  
pp. 217-222
Author(s):  
Kohji Honda ◽  
Noriyuki Tabushi

A VLCC (very large crude oil carrier) has approximately 1000 curved longitudinal beams, many of which have three-dimensional complicated curvatures. Due to the shortage of highly skilled workers and the need to keep costs down, production and structural designers have worked to reduce the number of such beams. In order to meet the requirements of production, the authors' company has attempted several design approaches for the longitudinal beam layout to reduce the number of beams that have complicated curvature. Recently, through the application of a computer-aided design system, which has been improved for shipbuilding based on the Calma's system, a new design method for the longitudinal beam layout has been successfully developed. A significant number of beams with a twisted configuration have been eliminated and replaced with beams of simpler, two-dimensional shapes. This paper shows the transition of these design approaches, and the application of the new design to building a VLCC.


Sign in / Sign up

Export Citation Format

Share Document