CINXE.COM
Search results for: access control model
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: access control model</title> <meta name="description" content="Search results for: access control model"> <meta name="keywords" content="access control model"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="access control model" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="access control model"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 27919</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: access control model</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27919</span> RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamil%20Ahmed">Jamil Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorization" title="authorization">authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20model" title=" access control model"> access control model</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20based%20access%20control" title=" role based access control"> role based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a> </p> <a href="https://publications.waset.org/abstracts/129022/rapdac-role-centric-attribute-based-policy-driven-access-control-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129022.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27918</span> Component Lifecycle and Concurrency Model in Usage Control (UCON) System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Ghann">P. Ghann</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Shiguang"> J. Shiguang</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Zhou"> C. Zhou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=concurrency" title=" concurrency"> concurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20container" title=" digital container"> digital container</a>, <a href="https://publications.waset.org/abstracts/search?q=usage%20control" title=" usage control"> usage control</a> </p> <a href="https://publications.waset.org/abstracts/3175/component-lifecycle-and-concurrency-model-in-usage-control-ucon-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27917</span> An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gang%20Liu">Gang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Huimin%20Song"> Huimin Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Can%20Wang"> Can Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Runnan%20Zhang"> Runnan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Lu%20Fang"> Lu Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=granting%20authorizations" title=" granting authorizations"> granting authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=privilege" title=" privilege"> privilege</a>, <a href="https://publications.waset.org/abstracts/search?q=revoking%20authorizations" title=" revoking authorizations"> revoking authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20security" title=" system security"> system security</a> </p> <a href="https://publications.waset.org/abstracts/65275/an-attribute-based-access-control-model-with-pol-module-for-dynamically-granting-and-revoking-authorizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65275.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27916</span> SPBAC: A Semantic Policy-Based Access Control for Database Query</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aaron%20Zhang">Aaron Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Alimire%20Kahaer"> Alimire Kahaer</a>, <a href="https://publications.waset.org/abstracts/search?q=Gerald%20Weber"> Gerald Weber</a>, <a href="https://publications.waset.org/abstracts/search?q=Nalin%20Arachchilage"> Nalin Arachchilage</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20policy-based%20access%20control" title=" semantic policy-based access control"> semantic policy-based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20link" title=" semantic link"> semantic link</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20model" title=" access control model"> access control model</a>, <a href="https://publications.waset.org/abstracts/search?q=instance%20policy" title=" instance policy"> instance policy</a>, <a href="https://publications.waset.org/abstracts/search?q=XACML" title=" XACML"> XACML</a> </p> <a href="https://publications.waset.org/abstracts/168587/spbac-a-semantic-policy-based-access-control-for-database-query" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27915</span> BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gang%20Liu">Gang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Can%20Wang"> Can Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Runnan%20Zhang"> Runnan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Quan%20Wang"> Quan Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Huimin%20Song"> Huimin Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaomin%20Ji"> Shaomin Ji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Biba%20model" title="Biba model">Biba model</a>, <a href="https://publications.waset.org/abstracts/search?q=break%20the%20glass" title=" break the glass"> break the glass</a>, <a href="https://publications.waset.org/abstracts/search?q=context" title=" context"> context</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-domain" title=" cross-domain"> cross-domain</a>, <a href="https://publications.waset.org/abstracts/search?q=fine-grained" title=" fine-grained"> fine-grained</a> </p> <a href="https://publications.waset.org/abstracts/65281/btg-biba-a-flexibility-enhanced-biba-model-using-btg-strategies-for-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65281.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">541</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27914</span> Access Control System for Big Data Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Winfred%20Okoe%20Addy">Winfred Okoe Addy</a>, <a href="https://publications.waset.org/abstracts/search?q=Jean%20Jacques%20Dominique%20Beraud"> Jean Jacques Dominique Beraud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=Big%20Data" title=" Big Data"> Big Data</a>, <a href="https://publications.waset.org/abstracts/search?q=domain" title=" domain"> domain</a> </p> <a href="https://publications.waset.org/abstracts/132951/access-control-system-for-big-data-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132951.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27913</span> Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peristera%20Baziana">Peristera Baziana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20algorithm" title="access algorithm">access algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=channels%20division" title=" channels division"> channels division</a>, <a href="https://publications.waset.org/abstracts/search?q=collisions%20avoidance" title=" collisions avoidance"> collisions avoidance</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelength%20division%20multiplexing" title=" wavelength division multiplexing"> wavelength division multiplexing</a> </p> <a href="https://publications.waset.org/abstracts/63025/channels-splitting-strategy-for-optical-local-area-networks-of-passive-star-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27912</span> Survey of Access Controls in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monirah%20Alkathiry">Monirah Alkathiry</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20Aljarwan"> Hanan Aljarwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20controls" title="access controls">access controls</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management" title=" identity and access management"> identity and access management</a> </p> <a href="https://publications.waset.org/abstracts/125048/survey-of-access-controls-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125048.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27911</span> Design of an Ensemble Learning Behavior Anomaly Detection Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdoulaye%20Diop">Abdoulaye Diop</a>, <a href="https://publications.waset.org/abstracts/search?q=Nahid%20Emad"> Nahid Emad</a>, <a href="https://publications.waset.org/abstracts/search?q=Thierry%20Winter"> Thierry Winter</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Hilia"> Mohamed Hilia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=insider%20threat" title=" insider threat"> insider threat</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20behavior%20analysis" title=" user behavior analysis"> user behavior analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ensemble%20learning" title=" ensemble learning"> ensemble learning</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20performance%20computing" title=" high performance computing"> high performance computing</a> </p> <a href="https://publications.waset.org/abstracts/109933/design-of-an-ensemble-learning-behavior-anomaly-detection-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109933.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27910</span> Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chuan-Ching%20Sue">Chuan-Ching Sue</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai-Chun%20Chuang"> Kai-Chun Chuang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer" title="peer-to-peer">peer-to-peer</a>, <a href="https://publications.waset.org/abstracts/search?q=live%20video%20streaming%20system" title=" live video streaming system"> live video streaming system</a>, <a href="https://publications.waset.org/abstracts/search?q=flash%20crowd" title=" flash crowd"> flash crowd</a>, <a href="https://publications.waset.org/abstracts/search?q=start-up%20delay" title=" start-up delay"> start-up delay</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a> </p> <a href="https://publications.waset.org/abstracts/24987/structured-access-control-mechanism-for-mesh-based-p2p-live-streaming-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24987.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27909</span> Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianjian%20Zong"> Jianjian Zong</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Li"> Li Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanxing%20Zheng"> Yanxing Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinrong%20Tong"> Jinrong Tong</a>, <a href="https://publications.waset.org/abstracts/search?q=Mao%20Zhan"> Mao Zhan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20sharing" title="data sharing">data sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-domain" title=" cross-domain"> cross-domain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20exchange" title=" data exchange"> data exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=publish-subscribe" title=" publish-subscribe"> publish-subscribe</a> </p> <a href="https://publications.waset.org/abstracts/138191/research-and-implementation-of-cross-domain-data-sharing-system-in-net-centric-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27908</span> Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A%3A%20Asmawi">A: Asmawi</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20S.%20Affendey"> L. S. Affendey</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20I.%20Udzir"> N. I. Udzir</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Mahmod"> R. Mahmod</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XML%20database" title="XML database">XML database</a>, <a href="https://publications.waset.org/abstracts/search?q=trust-based%20access%20control" title=" trust-based access control"> trust-based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=severity-aware" title=" severity-aware"> severity-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20values" title=" trust values"> trust values</a>, <a href="https://publications.waset.org/abstracts/search?q=log%20file" title=" log file"> log file</a> </p> <a href="https://publications.waset.org/abstracts/11637/enhance-security-in-xml-databases-xlog-file-for-severity-aware-trust-based-access-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">300</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27907</span> UML Model for Double-Loop Control Self-Adaptive Braking System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heung%20Sun%20Yoon">Heung Sun Yoon</a>, <a href="https://publications.waset.org/abstracts/search?q=Jong%20Tae%20Kim"> Jong Tae Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present an activity diagram model for double-loop control self-adaptive braking system. Since activity diagram helps to improve visibility of self-adaption, we can easily find where improvement is needed on double-loop control. Double-loop control is adopted since the design conditions and actual conditions can be different. The system is reconfigured in runtime by using double-loop control. We simulated to verify and validate our model by using MATLAB. We compared single-loop control model with double-loop control model. Simulation results show that double-loop control provides more consistent brake power control than single-loop control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=activity%20diagram" title="activity diagram">activity diagram</a>, <a href="https://publications.waset.org/abstracts/search?q=automotive" title=" automotive"> automotive</a>, <a href="https://publications.waset.org/abstracts/search?q=braking%20system" title=" braking system"> braking system</a>, <a href="https://publications.waset.org/abstracts/search?q=double-loop" title=" double-loop"> double-loop</a>, <a href="https://publications.waset.org/abstracts/search?q=self-adaptive" title=" self-adaptive"> self-adaptive</a>, <a href="https://publications.waset.org/abstracts/search?q=UML" title=" UML"> UML</a>, <a href="https://publications.waset.org/abstracts/search?q=vehicle" title=" vehicle"> vehicle</a> </p> <a href="https://publications.waset.org/abstracts/5691/uml-model-for-double-loop-control-self-adaptive-braking-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5691.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27906</span> Client Hacked Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagul%20Abhijeet">Bagul Abhijeet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hacking" title="Hacking">Hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Vulnerabilities" title=" Vulnerabilities"> Vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=Dummy%20request" title=" Dummy request"> Dummy request</a>, <a href="https://publications.waset.org/abstracts/search?q=Virus" title=" Virus"> Virus</a>, <a href="https://publications.waset.org/abstracts/search?q=Server%20monitoring" title=" Server monitoring"> Server monitoring</a> </p> <a href="https://publications.waset.org/abstracts/36777/client-hacked-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27905</span> The Role of Access Control Techniques in Creating a Safe Cyberspace for Children</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Muslat%20Alsahali">Sara Muslat Alsahali</a>, <a href="https://publications.waset.org/abstracts/search?q=Nout%20Mohammed%20Alqahtani"> Nout Mohammed Alqahtani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=kids" title=" kids"> kids</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20monitoring" title=" parental monitoring"> parental monitoring</a> </p> <a href="https://publications.waset.org/abstracts/125012/the-role-of-access-control-techniques-in-creating-a-safe-cyberspace-for-children" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125012.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27904</span> Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Enjia%20Zhang">Enjia Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=green%20design" title="green design">green design</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20control" title=" community control"> community control</a>, <a href="https://publications.waset.org/abstracts/search?q=prefabricated%20structure" title=" prefabricated structure"> prefabricated structure</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health%20emergency" title=" public health emergency"> public health emergency</a> </p> <a href="https://publications.waset.org/abstracts/130026/green-design-study-of-prefabricated-community-control-measures-in-response-to-public-health-emergencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130026.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27903</span> Model Predictive Control of Three Phase Inverter for PV Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Irtaza%20M.%20Syed">Irtaza M. Syed</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaamran%20Raahemifar"> Kaamran Raahemifar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a model predictive control (MPC) of a utility interactive three phase inverter (TPI) for a photovoltaic (PV) system at commercial level. The proposed model uses phase locked loop (PLL) to synchronize TPI with the power electric grid (PEG) and performs MPC control in a dq reference frame. TPI model consists of boost converter (BC), maximum power point tracking (MPPT) control, and a three leg voltage source inverter (VSI). Operational model of VSI is used to synthesize sinusoidal current and track the reference. Model is validated using a 35.7 kW PV system in Matlab/Simulink. Implementation and results show simplicity and accuracy, as well as reliability of the model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=model%20predictive%20control" title="model predictive control">model predictive control</a>, <a href="https://publications.waset.org/abstracts/search?q=three%20phase%20voltage%20source%20inverter" title=" three phase voltage source inverter"> three phase voltage source inverter</a>, <a href="https://publications.waset.org/abstracts/search?q=PV%20system" title=" PV system"> PV system</a>, <a href="https://publications.waset.org/abstracts/search?q=Matlab%2Fsimulink" title=" Matlab/simulink"> Matlab/simulink</a> </p> <a href="https://publications.waset.org/abstracts/40124/model-predictive-control-of-three-phase-inverter-for-pv-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">594</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27902</span> Model Reference Adaptive Control and LQR Control for Quadrotor with Parametric Uncertainties</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alia%20Abdul%20Ghaffar">Alia Abdul Ghaffar</a>, <a href="https://publications.waset.org/abstracts/search?q=Tom%20Richardson"> Tom Richardson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A model reference adaptive control and a fixed gain LQR control were implemented in the height controller of a quadrotor that has parametric uncertainties due to the act of picking up an object of unknown dimension and mass. It is shown that an adaptive control, unlike a fixed gain control, is capable of ensuring a stable tracking performance under such condition, although adaptive control suffers from several limitations. The combination of both adaptive and fixed gain control in the controller architecture results in an enhanced tracking performance in the presence of parametric uncertainties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV" title="UAV">UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=quadrotor" title=" quadrotor"> quadrotor</a>, <a href="https://publications.waset.org/abstracts/search?q=robotic%20arm%20augmentation" title=" robotic arm augmentation"> robotic arm augmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20reference%20adaptive%20control" title=" model reference adaptive control"> model reference adaptive control</a>, <a href="https://publications.waset.org/abstracts/search?q=LQR%20control" title=" LQR control"> LQR control</a> </p> <a href="https://publications.waset.org/abstracts/14946/model-reference-adaptive-control-and-lqr-control-for-quadrotor-with-parametric-uncertainties" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27901</span> Model Predictive Control Using Thermal Inputs for Crystal Growth Dynamics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Takashi%20Shimizu">Takashi Shimizu</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomoaki%20Hashimoto"> Tomoaki Hashimoto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, crystal growth technologies have made progress by the requirement for the high quality of crystal materials. To control the crystal growth dynamics actively by external forces is useuful for reducing composition non-uniformity. In this study, a control method based on model predictive control using thermal inputs is proposed for crystal growth dynamics of semiconductor materials. The control system of crystal growth dynamics considered here is governed by the continuity, momentum, energy, and mass transport equations. To establish the control method for such thermal fluid systems, we adopt model predictive control known as a kind of optimal feedback control in which the control performance over a finite future is optimized with a performance index that has a moving initial time and terminal time. The objective of this study is to establish a model predictive control method for crystal growth dynamics of semiconductor materials. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=model%20predictive%20control" title="model predictive control">model predictive control</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20control" title=" optimal control"> optimal control</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20control" title=" process control"> process control</a>, <a href="https://publications.waset.org/abstracts/search?q=crystal%20growth" title=" crystal growth"> crystal growth</a> </p> <a href="https://publications.waset.org/abstracts/88644/model-predictive-control-using-thermal-inputs-for-crystal-growth-dynamics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27900</span> Implicit Force Control of a Position Controlled Robot - A Comparison with Explicit Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Winkler">Alexander Winkler</a>, <a href="https://publications.waset.org/abstracts/search?q=Jozef%20Such%C3%BD"> Jozef Suchý</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates simple implicit force control algorithms realizable with industrial robots. A lot of approaches already published are difficult to implement in commercial robot controllers, because the access to the robot joint torques is necessary or the complete dynamic model of the manipulator is used. In the past we already deal with explicit force control of a position controlled robot. Well known schemes of implicit force control are stiffness control, damping control and impedance control. Using such algorithms the contact force cannot be set directly. It is further the result of controller impedance, environment impedance and the commanded robot motion/position. The relationships of these properties are worked out in this paper in detail for the chosen implicit approaches. They have been adapted to be implementable on a position controlled robot. The behaviors of stiffness control and damping control are verified by practical experiments. For this purpose a suitable test bed was configured. Using the full mechanical impedance within the controller structure will not be practical in the case when the robot is in physical contact with the environment. This fact will be verified by simulation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=robot%20force%20control" title="robot force control">robot force control</a>, <a href="https://publications.waset.org/abstracts/search?q=stiffness%20control" title=" stiffness control"> stiffness control</a>, <a href="https://publications.waset.org/abstracts/search?q=damping%20control" title=" damping control"> damping control</a>, <a href="https://publications.waset.org/abstracts/search?q=impedance%20control" title=" impedance control"> impedance control</a>, <a href="https://publications.waset.org/abstracts/search?q=stability" title=" stability"> stability</a> </p> <a href="https://publications.waset.org/abstracts/22644/implicit-force-control-of-a-position-controlled-robot-a-comparison-with-explicit-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">520</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27899</span> Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Mwangi">Samuel Mwangi</a>, <a href="https://publications.waset.org/abstracts/search?q=Josephine%20K.%20Mule"> Josephine K. Mule</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title="facial recognition">facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a> </p> <a href="https://publications.waset.org/abstracts/127591/facial-recognition-technology-in-institutions-of-higher-learning-exploring-the-use-in-kenya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27898</span> Design of Lead-Lag Based Internal Model Controller for Binary Distillation Column</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rakesh%20Kumar%20Mishra">Rakesh Kumar Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarun%20Kumar%20Dan"> Tarun Kumar Dan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lead-Lag based Internal Model Control method is proposed based on Internal Model Control (IMC) strategy. In this paper, we have designed the Lead-Lag based Internal Model Control for binary distillation column for SISO process (considering only bottom product). The transfer function has been taken from Wood and Berry model. We have find the composition control and disturbance rejection using Lead-Lag based IMC and comparing with the response of simple Internal Model Controller. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SISO" title="SISO">SISO</a>, <a href="https://publications.waset.org/abstracts/search?q=lead-lag" title=" lead-lag"> lead-lag</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20model%20control" title=" internal model control"> internal model control</a>, <a href="https://publications.waset.org/abstracts/search?q=wood%20and%20berry" title=" wood and berry"> wood and berry</a>, <a href="https://publications.waset.org/abstracts/search?q=distillation%20column" title=" distillation column "> distillation column </a> </p> <a href="https://publications.waset.org/abstracts/20701/design-of-lead-lag-based-internal-model-controller-for-binary-distillation-column" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">646</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27897</span> Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Babatunde%20Olumide%20Olawale">Babatunde Olumide Olawale</a>, <a href="https://publications.waset.org/abstracts/search?q=Oyebode%20Olumide%20Oyediran"> Oyebode Olumide Oyediran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=multimodal%20biometrics" title=" multimodal biometrics"> multimodal biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20safe" title=" security safe"> security safe</a> </p> <a href="https://publications.waset.org/abstracts/73150/development-of-a-sequential-multimodal-biometric-system-for-web-based-physical-access-control-into-a-security-safe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73150.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27896</span> Application of Model Free Adaptive Control in Main Steam Temperature System of Thermal Power Plant</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khaing%20Yadana%20Swe">Khaing Yadana Swe</a>, <a href="https://publications.waset.org/abstracts/search?q=Lillie%20Dewan"> Lillie Dewan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> At present, the cascade PID control is widely used to control the super-heating temperature (main steam temperature). As the main steam temperature has the characteristics of large inertia, large time-delay, and time varying, etc., conventional PID control strategy can not achieve good control performance. In order to overcome the bad performance and deficiencies of main steam temperature control system, Model Free Adaptive Control (MFAC) P cascade control system is proposed in this paper. By substituting MFAC in PID of the main control loop of the main steam temperature control, it can overcome time delays, non-linearity, disturbance and time variation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=model-free%20adaptive%20control" title="model-free adaptive control">model-free adaptive control</a>, <a href="https://publications.waset.org/abstracts/search?q=cascade%20control" title=" cascade control"> cascade control</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20control" title=" adaptive control"> adaptive control</a>, <a href="https://publications.waset.org/abstracts/search?q=PID" title=" PID"> PID</a> </p> <a href="https://publications.waset.org/abstracts/19926/application-of-model-free-adaptive-control-in-main-steam-temperature-system-of-thermal-power-plant" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">603</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27895</span> Towards a Secure Storage in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Elkholy">Mohamed Elkholy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Elfatatry"> Ahmed Elfatatry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20confidentiality" title=" data confidentiality"> data confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=Kerberos%20authentication" title=" Kerberos authentication"> Kerberos authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title=" cloud security"> cloud security</a> </p> <a href="https://publications.waset.org/abstracts/48494/towards-a-secure-storage-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27894</span> Space Vector PWM and Model Predictive Control for Voltage Source Inverter Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Irtaza%20M.%20Syed">Irtaza M. Syed</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaamran%20Raahemifar"> Kaamran Raahemifar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a comparative assessment of Space Vector Pulse Width Modulation (SVPWM) and Model Predictive Control (MPC) for two-level three phase (2L-3P) Voltage Source Inverter (VSI). VSI with associated system is subjected to both control techniques and the results are compared. Matlab/Simulink was used to model, simulate and validate the control schemes. Findings of this study show that MPC is superior to SVPWM in terms of total harmonic distortion (THD) and implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=voltage%20source%20inverter" title="voltage source inverter">voltage source inverter</a>, <a href="https://publications.waset.org/abstracts/search?q=space%20vector%20pulse%20width%20modulation" title=" space vector pulse width modulation"> space vector pulse width modulation</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20predictive%20control" title=" model predictive control"> model predictive control</a>, <a href="https://publications.waset.org/abstracts/search?q=comparison" title=" comparison"> comparison</a> </p> <a href="https://publications.waset.org/abstracts/16220/space-vector-pwm-and-model-predictive-control-for-voltage-source-inverter-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16220.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">508</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27893</span> Investigation of Different Control Stratgies for UPFC Decoupled Model and the Impact of Location on Control Parameters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20A.%20Al-Qallaf">S. A. Al-Qallaf</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20A.%20Al-Mawsawi"> S. A. Al-Mawsawi</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Haider"> A. Haider</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to evaluate the performance of a unified power flow controller (UPFC), mathematical models for steady state and dynamic analysis are to be developed. The steady state model is mainly concerned with the incorporation of the UPFC in load flow studies. Several load flow models for UPFC have been introduced in literature, and one of the most reliable models is the decoupled UPFC model. In spite of UPFC decoupled load flow model simplicity, it is more robust compared to other UPFC load flow models and it contains unique capabilities. Some shortcoming such as additional set of nonlinear equations are to be solved separately after the load flow solution is obtained. The aim of this study is to investigate the different control strategies that can be realized in the decoupled load flow model (individual control and combined control), and the impact of the location of the UPFC in the network on its control parameters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UPFC" title="UPFC">UPFC</a>, <a href="https://publications.waset.org/abstracts/search?q=decoupled%20model" title=" decoupled model"> decoupled model</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20flow" title=" load flow"> load flow</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20parameters" title=" control parameters"> control parameters</a> </p> <a href="https://publications.waset.org/abstracts/12911/investigation-of-different-control-stratgies-for-upfc-decoupled-model-and-the-impact-of-location-on-control-parameters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">554</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27892</span> Enacting Educational Technology Affordances as Mechanisms Responsible for Gaining Epistemological Access: A Case of Underprivileged Students at Higher Institutions in Northern Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bukhari%20Badamasi">Bukhari Badamasi</a>, <a href="https://publications.waset.org/abstracts/search?q=Chidi%20G.%20Ononiwu"> Chidi G. Ononiwu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Globally, educational technology (EdTech) has become a known catalyst for gaining access to education, job creation, and national development of a nation. Howbeit, it is common understanding that higher institutions continue to deploy digital technologies, to help provide access to education, but in most case, it is somehow institutional access not epistemological access especially in sub Saharan African higher institutions. Some scholars, however, lament the fact that studies on educational technology affordances are mostly fragmented because they focus on specific theme or sub aspect of access (i.e., institutional access). Thus, drawing from the Archer Morphogenetic approach, and Gibson Affordance theory, and applying critical realist based Danermark model for explanatory research, the study seeks to conduct a realist case study on underprivileged students in Higher institutions on how they gain epistemological access by enacting educational technology (EdTech) affordances. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=affordance" title="affordance">affordance</a>, <a href="https://publications.waset.org/abstracts/search?q=epistemological%20access" title=" epistemological access"> epistemological access</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20technology" title=" educational technology"> educational technology</a>, <a href="https://publications.waset.org/abstracts/search?q=underprivileged%20students" title=" underprivileged students"> underprivileged students</a> </p> <a href="https://publications.waset.org/abstracts/159682/enacting-educational-technology-affordances-as-mechanisms-responsible-for-gaining-epistemological-access-a-case-of-underprivileged-students-at-higher-institutions-in-northern-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159682.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27891</span> Active Flutter Suppression of Sports Aircraft Tailplane by Supplementary Control Surface</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ale%C5%A1%20Kratochv%C3%ADl">Aleš Kratochvíl</a>, <a href="https://publications.waset.org/abstracts/search?q=Svatom%C3%ADr%20Slav%C3%ADk"> Svatomír Slavík</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper presents an aircraft flutter suppression by active damping of supplementary control surface at trailing edge. The mathematical model of thin oscillation airfoil with control surface driven by pilot is developed. The supplementary control surface driven by control law is added. Active damping of flutter by several control law is present. The structural model of tailplane with an aerodynamic strip theory based on the airfoil model is developed by a finite element method. The optimization process of stiffens parameters is carried out to match the structural model with results from a ground vibration test of a small sport airplane. The implementation of supplementary control surface driven by control law is present. The active damping of tailplane model is shown. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20damping" title="active damping">active damping</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20method" title=" finite element method"> finite element method</a>, <a href="https://publications.waset.org/abstracts/search?q=flutter" title=" flutter"> flutter</a>, <a href="https://publications.waset.org/abstracts/search?q=tailplane%20model" title=" tailplane model"> tailplane model</a> </p> <a href="https://publications.waset.org/abstracts/72572/active-flutter-suppression-of-sports-aircraft-tailplane-by-supplementary-control-surface" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27890</span> A New Approach towards the Development of Next Generation CNC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yusri%20Yusof">Yusri Yusof</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamran%20Latif"> Kamran Latif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer Numeric Control (CNC) machine has been widely used in the industries since its inception. Currently, in CNC technology has been used for various operations like milling, drilling, packing and welding etc. with the rapid growth in the manufacturing world the demand of flexibility in the CNC machines has rapidly increased. Previously, the commercial CNC failed to provide flexibility because its structure was of closed nature that does not provide access to the inner features of CNC. Also CNC’s operating ISO data interface model was found to be limited. Therefore, to overcome that problem, Open Architecture Control (OAC) technology and STEP-NC data interface model are introduced. At present the Personal Computer (PC) has been the best platform for the development of open-CNC systems. In this paper, both ISO data interface model interpretation, its verification and execution has been highlighted with the introduction of the new techniques. The proposed is composed of ISO data interpretation, 3D simulation and machine motion control modules. The system is tested on an old 3 axis CNC milling machine. The results are found to be satisfactory in performance. This implementation has successfully enabled sustainable manufacturing environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CNC" title="CNC">CNC</a>, <a href="https://publications.waset.org/abstracts/search?q=ISO%206983" title=" ISO 6983"> ISO 6983</a>, <a href="https://publications.waset.org/abstracts/search?q=ISO%2014649" title=" ISO 14649"> ISO 14649</a>, <a href="https://publications.waset.org/abstracts/search?q=LabVIEW" title=" LabVIEW"> LabVIEW</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20architecture%20control" title=" open architecture control"> open architecture control</a>, <a href="https://publications.waset.org/abstracts/search?q=reconfigurable%20manufacturing%20systems" title=" reconfigurable manufacturing systems"> reconfigurable manufacturing systems</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20manufacturing" title=" sustainable manufacturing"> sustainable manufacturing</a>, <a href="https://publications.waset.org/abstracts/search?q=Soft-CNC" title=" Soft-CNC"> Soft-CNC</a> </p> <a href="https://publications.waset.org/abstracts/28745/a-new-approach-towards-the-development-of-next-generation-cnc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=930">930</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=931">931</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20control%20model&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>