Warehouse Security System based on Embedded System

Size: px
Start display at page:

Download "Warehouse Security System based on Embedded System"

Transcription

1 International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity m Jianmin Zhang Department of Electronic Engineering, Tianjin Univerity Minghua Niu Department of Electronic Engineering, Tianjin Univerity Yong Li Sichuan Univerity of Science & Engineering Sichuan , China m Abtract Thi paper deign a ecurity ytem for warehoue ecurity. Baed on linux and S3C2440, thi ytem peripheral device include enor, humidity enor, camera, web client, Android client, fan, and led. It ue the enor to monitor the and fire, ue camera to real-time monitor whether there are unafe factor. If the ytem detect that the room i too high or too low, it will automatically alarm the ecurity taff and automatically open the fan. Through the camera real-time monitoring, the ecurity taff might be upiciou peron or ha unexpected event in the warehoue. The video urveillance alo will capture real-time video data and tranfer data to Android client, then ecurity peronnel will control the ecurity information whenever and wherever if they need. If the warehoue break out of fire, thief, accident, and o on, thi ytem will take automatic protective meaure, capture video evidence, and warn the ecurity taff. Finally, if the warehoue ha an accident, the ytem will reduce the damage to the lowet. Keyword-Security ytem; Linux; Embedded; Remote control; Android I. INTRODUCTION After the ytem tart, firt, initialize the mutex lock and other global variable, and then open 4 thread: camera, erial port and Android. Camera thread drive camera module to initialize equipment, then capture the image and place it in the hared memory. Then it will judge the client if it ha a real-time monitoring command, if there i, it end ome word to the client through the network and tore the picture to the databae. Otherwie, it tore the picture to the databae and then put the picture in the hared memory; Serial thread initialize the M0 module, et the baud rate a , 8 data bit, 0 parity bit and 0 top bit. It read the value of enor and the humidity enor. Afterward, determine whether the and humidity i normal. If there i ome Abnormal, it will end a alarm meage to the uer mobile phone remotely through internet; Android thread drive Android module to initialize erver and monitor meage. It will judge if there ha a new connection or a new command, if there i, it will etablih a TCP link to receive command and tranfer data. Otherwie, it will till monitor ytem all time. II. THE DESIGN OF SYSTEM NODULES FUNCTION A. Camera module Thi module i ued to control the camera to read the image frame and tore the read-data into the hared memory. The main proce function get the data from the hared memory to proce for further tep. In thi ytem, the camera will monitor creen in real-timely. In Linux, the video device i the device file, and it can be acceed like ordinary file uch a reading and writing, the camera in the folder of /dev/video1. Video4Linux2 (V4L2) [1-3] i an application programming interface for audio and video image. Thi module ue Video4Linux2 application function and data organization to acquire the USB camera image under the Linux ytem. Firtly, the ytem open the camera equipment according to the name or number of device. Then it initialize the video equipment and et picture format ize, frame format, the camera capture mode and ditribute cache. Later, it realize the application and mapping of the Image frame buffer. Finally, the camera module capture the image and tranform YUYV format to RGB24 format, then tranform RGB24 format to BMP format. At lat, it The author - Publihed by Atlanti Pre 1229

2 hut down the equipment [4-6].Camera flow chart i hown in Fig. 1. Camera BMP main() format image V4L2 Drive YUYV image RGB24 format image Figure 1. Camera flow chart The note of V4L2 : Thi module ue V4L2 technology and USB interface; it need to configure the kernel driver. Configuration i hown below: cd linux faright/ make menuconfig Device Driver ---> <*> Multimedia upport ---> <*> Video For Linux [*] Enable Video For Linux API 1 (DEPRECATED) [*] Video capture adapter ---> [*] V4L USB device ---> <*> USB Video Cla (UVC) [*] UVC input event device upport make Zimage -j2 for Zimage. The V4L2 pecific procedure: 1. Open the equipment by the block way. 2. Obtain equipment capability, look at equipment function. 3. Set the tandard and the frame format, including PAL, NTSC. Frame format width and height. 4. Application cache for device. 5. Tranform the frame buffer to phyical addre, and mapping to uer pace, o that it can be operated directly collected frame, without having to copy. 6. Apply all frame buffer into the queue, o that tore the collected data. 7. Start the collection of video. 8. Remove frame buffer data which have been collected from the queue, acquire the original collection data. 9. Move the buffer to the end of queue again, o you can loop acquiition. 10. Stop the video collection. 11. Cloe the video equipment. B. The GPRS module When the S3C2440 receive the warning information, firtly, open the erial port equipment, et the baud rate erial port initialization, data bit, parity bit and top bit, and then end the control command and information to the GPRS module, and finally cloe the erial port. GPRS will end the alarm information to the mobile phone. C. M0 control module The M0 module acquire the and humidity information through a enor and humidity enor, and then change the data with data through the erial port. Furthermore, the M0 module can receive the control command from Android and PC, Store and end the and humidity data to the network. So the ytem can control the led and fan in the warehoue through the data in the network. The detailed tep are hown in Fig

3 Start To obtain Sent the and humidity to the Android in the mutual excluion In the mutual excluion condition: flag=flag_fan condition Temperature Too high In the mutual excluion condition: flag=flag_ave Clo e fan Internet Send the high data of! Open fan T Too low Internet Send the high data of! Sent the and humidity to the PC in the mutual excluion condition In the mutual excluion condition: flag=flag_led In the mutual excluion condition Flag=glag_real Cloe led! Open led! Figure 2. Flow chart of M0 control 1231

4 D. The network module Thi module i ued for ending video and and humidity to the databae, Android client and web client. The Android client and web client alo can ent command to thi module to control the fan and LED [7]. The detailed tep are hown in Fig. 3. Start Etablihed the elect-model to monitoring the client Old client meage New client meage Read head command Landing head command Monitor Fan Led Added new connection to ocket lit Return the login to client Open real time monitor Send the open fan to M0 Send the open led to M0 Figure 3. Flow chart of network module 1232

5 In above figure, after network module operate, firt etablih the elect-model to monitor the client. If thi i a new client link, it will be added new connection to ocket lit and return the elect model; if it i an old uer link, check whether the client end a meage, if end and thi module received information i read command head. To determine whether the login command, if it i the landing and will return the information to the elect model, or to judge whether the real-time monitoring; if it i a real-time monitoring of open real-time monitoring ign and return the elect model, or to determine whether the fan control command; if it i fan control command, end control command to the M0 fan and return to elect model otherwie, to determine whether the control command i led, then end the control command to the M0 to return led elect model, otherwie it return elect model. E. Web erver module Thi module i ued for Web Webpage repone from client requet, including Web page login and exit function, regitration or delete uer or modify paword, Web real-time monitoring, check the Web monitoring recording, control the witch of LED light and fan from Web page [8] [9]. The web erver work flow: firt initialize the data area and the erver, when a new requet or order the command paring, thi intruction ha five cae: A. Requet landing. B. Login error. C. Send a control command to the erver. D. Call the databae to obtain data interface (read the image,, humidity etc.). E, Store the interface by call the databae (ave picture,, humidity etc.). If there i login error, then are login. If the login i ucceful, to determine whether the root uer, if it i, then add, delete uer to modify the erver, other uer paword etc. If you're not a root uer, jut ordinary uer, you can only modify the correponding table and character egment the uer paword and update the databae [10]. F. The Android client Thi module i ued to diplay the, humidity data, control the monitoring, control the video, fan and led equipment, end and receive with the erver. It include four function: MainAct, MoinAct, ClientAct and RegAct [10-13]. The main interface (MainAct): When you open the Android client, firtly, it appear landing interface, then initialize get each view object intance, connect to the erver to get the ocket object, initialize the MyApplication get handler, then open thread, circulation receive from the erver information. Detection of landing button ha preed, if it ha, ent to the erver login information, if not, to detect whether the received handler login information i correct, incorrect information will continue to wait, if it i correct, the jump to the MoniActivity. The monitoring interface (MoinAct): After tart equipment, initialize each view intance, get a handler object, get ready to accept the meage, and refreh the imageview picture if meage i the picture, if meage i the, humidity,, humidity diplay information. Cutomer interface (ClientAct): Firt, read the 10 head byte of Command, then detect whether the login command, if it i, ending meage to mainacticity, ele detecting whether the login command head, if it i to end meage to MoniActivity, or to detect whether the image i of the head of the order, if it i to end meage to MoniActivity, detection of, humidity or whether it i the head of the order, then end a meage to the moinactivity. Regitration interface (RegAct): Firt, initialize each view, get intantiated object, receive input account and paword, then the two tet input paword i conitent, if conitent, end the account number and paword to the erver, or to re input. If the return i the end of the correct erver login regitration proce, or continue to enter the account paword. III. CONCLUSIONS Thi paper mainly complete a warehoue ecurity ytem baed on Linux Sytem. It contain enor, humidity enor, urveillance module, M0 control module, the web erver, the mater erver, the web client, and Android client. Thi ytem can help enterprie to adminitrate warehoue, make ure the afe of it by a variety of meaure, and can real-time operation remotely. It can automatically alarm the danger in time and control the video urveillance to end real-time video data to a web erver or Android client ued by ecurity peronnel. They can monitor and control warehoue related facilitie in order to protect the afety of the warehoue to the maximum extent. IV. REFERENCE [1] Michael H Schimek,Bill Dirk,Han Verkuli.Video for Linuxtwo API pecification [2] Dirk B.Video for Linux Two API Specification. [3] Samung Electronic.S3C2410A 200MHz&266MHz 32-bit RISC Microproceor USER S MANUAL Reviion [4] Dirk B.Video for Linux Two API Specification.. [5] Video4Linux Kernel API Reference. [6] WANG Fei,KONG Cong Realization of Linux camera driver baed on V4L2[J]. Electronic Science and technology. 2012(02) [7] Hinton G E,Salakhutdinov R R.Reducing the dimenionality of data with neural network[j].science,2006(5786): [8] ]XU Hong-hua,LIU Ke. Development and application of controller baed on embedded Sever Web Indutrial computer 2004/04 [9] Guan Mo;Gu Minghai Deign and implementation of an embedded web erver baed on ARM [10] Hammel M J Mongooe:an embeddable Web erver 2010(192) [11] ISO bae media file format[s/ol]. ISO/IEC [12] Shiddiqi A M,Pratama H,Ciptaningtya H T.A Video StreamingApplication Uing Mobile Media Application Programming Interface. Telkomnika [13] Gavala D,Economou D.Development Platform for Mobile Ap-plication:Statu and Trend. IEEE Software

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

TRID Technology Implementation

TRID Technology Implementation TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director

More information

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring. Digifort Enterprie The mot complete Digifort olution for camera and alarm monitoring. The Enterprie verion i the package which comprie all of the feature available in the Digifort Sytem, offering complete

More information

A Design of Video Acquisition and Transmission Based on ARM. Ziqiang Hao a, Hongzuo Li b

A Design of Video Acquisition and Transmission Based on ARM. Ziqiang Hao a, Hongzuo Li b A Design of Video Acquisition and Transmission Based on ARM Ziqiang Hao a, Hongzuo Li b Changchun University of Science & Technology, Changchun, Jilin, China a shuil47@163.com, b lihongzuo@sohu.com Keywords:video

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Production Management II. Product Life-Cycle Management II

Production Management II. Product Life-Cycle Management II Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo w.boo@wzl.rwth-aachen.de WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

Third Party Technical Guidelines

Third Party Technical Guidelines Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Products and Services

Products and Services Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

How To Control A Power Plant With A Power Control System

How To Control A Power Plant With A Power Control System OVERVIEW Demand-controlled ventilation Leading edge product for demand-controlled ventilation! www.wegon.com Demand-controlled ventilation offer great comfort and low operating cot When the room i in ue,

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way.

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way. Schmid Peoplemover Overpa and Revolution. The Dicovery of a New Way. A Company of ThyenKrupp Elevator ThyenKrupp Aufzüge TK Creating New Way Demand New Way of Thinking. The Schmid Peoplemover Remove the

More information

Encrypted TCP chat using RSA and AES algorithm

Encrypted TCP chat using RSA and AES algorithm Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

www.brindleytech.com Insurance Solutions

www.brindleytech.com Insurance Solutions Inurance Solution Agenda 1 2 3 4 5 Buine Value Solution Overview Capabilitie Cutomer Succe Storie Inurance Product in Nut Shell Buine Value Cutomer Buine Value Achieved through Winure Increae Efficiency

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)

MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems) Guide for Marine Health, Safety, Quality and vironmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Sytem) APRIL 2012

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Emergency, Standby and Backup Power Connection Solutions

Emergency, Standby and Backup Power Connection Solutions Emergency, Standby and Backup Power Connection Solution Don t be in the dark. Enuring that you are open for buine i within your power. Blackout, hurricane, lightning, flood, high wind. Power outage caued

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

A Novel Web-Based Student Academic Records Information System

A Novel Web-Based Student Academic Records Information System A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria nmajuobai@yahoo.com,

More information

GOLD COAST. presented by ASSOCIATION

GOLD COAST. presented by ASSOCIATION inp on i r at i in de t d tex n a ign ile GOLD COAST TM ctu e p o tor Pr i b i h x hip & E r o Spon GOLD COAST TM Platinum Gold Silver Sponor (1) Sponor (3) Sponor (5) $ By Tender $15,000 $10,000 promotional

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program Pediatric Nure Practitioner Program Pediatric Clinical Nure Specialit Program Dual Pediatric Nure Practitioner / Clinical Nure Specialit Program UCLA School of Nuring Overview: The Pediatric Nure Practitioner

More information

COX BUSINESS TV. Everything you need to know about Cox Business TV service.

COX BUSINESS TV. Everything you need to know about Cox Business TV service. COX BUSINESS TV Everything you need to know about Cox Buine TV ervice. Dear Cutomer: You made a great choice when you igned up for Cox Buine TV. With hundred of channel and incredible TV and muic programming,

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

APEC Environmental Goods and Services Work Program

APEC Environmental Goods and Services Work Program APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents:

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: 1. Software Installation... 2 2. Hardware Configuration... 12 3. System Dispatching... 14 3.1. Create dispatching objects... 14 3.2. Graphical

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

How To Control A Behringer Guitar Amp With A Behringer Fbb1010 With A Mii Controller

How To Control A Behringer Guitar Amp With A Behringer Fbb1010 With A Mii Controller Uer Manual Verion 1.4 March 2003 ENGLISH IMPORTANT SAFETY INSTRUCTIONS DETAILED SAFETY INSTRUCTIONS: 1) Read thee intruction. 2) Keep thee intruction. 3) Heed all warning. 4) Follow all intruction. CAUTION:

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

Please read the information that follows before beginning. Incomplete applications will delay the review and approval process.

Please read the information that follows before beginning. Incomplete applications will delay the review and approval process. Certified Manager Certification Application Intruction Completing the Application Congratulation on chooing to purue the Certified Manager (CM ) certification. The application i the tarting point toward

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.

Very special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible. Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

JVD Software Development

JVD Software Development Design pecification JU Online Library December 11, 2001 JVD Joel Frank, Project Manager (ections II and V) Hours Worked: ignature Valerie tanton, Engineer (ections III, IV, and V) Hours Worked: ignature

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Oracle Data Cloud Service Descriptions and Metrics March 1, 2016

Oracle Data Cloud Service Descriptions and Metrics March 1, 2016 Oracle Data Clud Service Decriptin and Metric March 1, 2016 Oracle Data Clud Service Decriptin and Metric v03012016 Page 1f 7 Service Decriptin... 5 BlueKai Marketplace... 5 BlueKai Marketplace Analytic

More information

Factoring Finite State Machines

Factoring Finite State Machines Chapter 17 Factoring Finite State Machine Factoring a tate machine i the proce of plitting the machine into two or more impler machine. Factoring can greatly implify the deign of a tate machine by eparating

More information

Opening for SAUDI ARAMCO Chair for Global Supply Chain Management

Opening for SAUDI ARAMCO Chair for Global Supply Chain Management Opening for SAUDI ARAMCO Chair for Global Supply Chain Management OBJECTIVES: The objective of etablihing the Global Supply Management, GSCM, Chair are lited below. All anticipated activitie and meaureable

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Adult/Gerontology Primary Care Nurse Practitioner Program at UCLA School of Nursing

Adult/Gerontology Primary Care Nurse Practitioner Program at UCLA School of Nursing Adult/Gerontology Primary Care Nure Practitioner Program at UCLA School of Nuring Overview: The Adult/Gerontology Primary Care Nure Practitioner (AGNP) i a Regitered Nure educated at the Mater level a

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Forest Lake Local Plan

Forest Lake Local Plan 1 Introduction Thi Local Plan contain pecific additional local planning requirement. Where it conflict with the requirement of the City Plan, thi Local Plan prevail. In uing thi Local Plan, reference hould

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA

UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA ISSN: 2222990 UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA Autin N. Noike The Granada Management Intitute, GranadaSpain Email: Autin_dac@yahoo.com Nkaiobi S. Oguzor ederal College

More information

Dataheet Sy tem Strateave Strateave 6.0 organized Backup Strateave Backup Software give you the tool for organized regular backup and imaging of your W indow W orktation, Server, or mall to medium ized

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Universidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.

Universidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016. Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.

More information

How To Use An Mp3.Com'S M39I (Gsi) With A Sim Sims 2.2.2 (Gsm) And Gsmi 2.3.2-2.3 (Gsp) (G

How To Use An Mp3.Com'S M39I (Gsi) With A Sim Sims 2.2.2 (Gsm) And Gsmi 2.3.2-2.3 (Gsp) (G MC39i Siemen Cellular Engine Verion: 01.02 DocID: MC39i_HD_V01.02 Document Name: MC39i Hardware Interface Decription Verion: 01.02 Date: November 12, 2003 DocId: Statu: MC39i_HD_V01.02 General Note Product

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages Prevention of Phihing Attack Baed on Dicriminative Key Point Feature of WebPage Mallikka Rajalingam School of Computer Science Univeriti Sain Malayia Pulau Penang,11800, Malayia Saleh Ali Alomari School

More information

Design and Realization of Internet of Things Based on Embedded System

Design and Realization of Internet of Things Based on Embedded System Design and Realization of Internet of Things Based on Embedded System Used in Intelligent Campus Department of Computer and Information Engineering, Heze University, Shandong,274015,China,kanghyhy@126.com

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

THE CARD DESIGN BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY.

THE CARD DESIGN BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY. THE CARD DESIGN ID BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY Preented by INTRODUCTION CREATING ID CARDS HAS NEVER BEEN EASIER Welcome

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information