Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Science and Technology Studies

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari Apr 2015

Key Characteristics-Based Sensor Distribution In Multi-Station Assembly Processes, Nagesh Shukla, Darek Ceglarek, Manoj K. Tiwari

Nagesh Shukla

This paper presents a novel approach for optimal key characteristics-based sensor distribution in a multi-station assembly process, for the purpose of diagnosing variation sources responsible for product quality defects in a timely manner. Current approaches for sensor distribution are based on the assumption that measurement points can be allocated at arbitrary locations on the part or subassembly. This not only presents challenges in the implementation of these approaches but additionally does not allow required product assurance and quality control standards to be integrated with them, due to lack of explicit relations between measured features and geometric dimensioning and tolerancing (GD&T). …


Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari Apr 2015

Algorithm Portfolios For Logistics Optimization Considering Stochastic Demands And Mobility Allowance, N Shukla, A K. Choudhary, P Prakash, K J. Fernandes, M K. Tiwari

Nagesh Shukla

The vehicle routing problem with stochastic demand (VRPSD) is a well known NP-hard problem. The uncharacteristic behaviour associated with the problem enhances the computational efforts required to obtain a feasible and near-optimal solution. This paper proposes an algorithm portfolio methodology based on evolutionary algorithms, which takes into account the stochastic nature of customer demand to solve this computationally complex problem. These problems are well known to have computationally complex objective functions, which make their solutions hard to find, particularly when problem instances of large dimensions are considered. Of particular importance in such situations is the timeliness of the solution. For …


Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu Mar 2014

Identity-Based Data Storage In Cloud Computing, Jinguang Han, Willy Susilo, Yi Mu

Professor Willy Susilo

Identity-based proxy re-encryption schemes have been proposed to shift the burden of managing numerous files from the owner to a proxy server. Nevertheless, the existing solutions suffer from several drawbacks. First, the access permission is determined by the central authority, which makes the scheme impractical. Second, they are insecure against collusion attacks. Finally, only queries from the same domain (intra-domain) are considered. We note that one of the main applications of identity-based proxy re-encryption schemes is in the cloud computing scenario. Nevertheless, in this scenario, users in different domains can share files with each other. Therefore, the existing solutions do …


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang Mar 2014

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fentong Wen, Willy Susilo, Guomin Yang

Professor Willy Susilo

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.'s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou Mar 2014

Efficient Linkable And/Or Threshold Ring Signature Without Random Oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou

Professor Willy Susilo

Linkable ring signatures have found many attractive applications. One of the recent important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately, the existing LTRS schemes are only secure in the random oracle model (ROM). In this paper, we make the following contributions. First, we construct the first LTRS scheme that is secure without requiring the ROM. Further, we enhance the security of a threshold ring signature (for both linkable or non-linkable) by providing a stronger definition of anonymity. This strengthened notion makes threshold ring signature schemes more suitable in real life. Finally, we provide efficient schemes that outperform …


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Mar 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson Jan 2014

Gestural Interface Technology In Early Childhood Education: A Framework For Fully Engaged Communication, Holly Tootell, Melinda Plumb, Colin D. Hadfield, Linda Dawson

Associate Professor Linda Dawson

Gestural Interface Technology (GIT) has changed the way technology is adopted in classrooms for all ages. The accessibility of control through touch means that technology such as Apple's iPad can be used in early childhood education. In this paper, we introduce a framework for fully-engaged communication, developed from educational pedagogy and critical engagement in information systems. The intersection of these dimensions creates a view of a GIT lifeworld approach which allows it to be used to understand multiple layers of engagement that exist within an early childhood education environment.


Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta Jan 2014

Social Implications Of Technology: The Past, The Present, And The Future, Karl Stephan, Katina Michael, M. G. Michael, Laura Jacob, Emily Anesta

M. G. Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Order-4 Quasi-Orthogonal Cooperative Communication In Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei, Tadeusz A. Wysocki Jun 2013

Order-4 Quasi-Orthogonal Cooperative Communication In Stfc Mb-Ofdm Uwb, Zixuan Lin, Le Chung Tran, Farzad Safaei, Tadeusz A. Wysocki

Professor Farzad Safaei

Recently, cooperative communication and Space-Time-Frequency-Codes (STFCs) have been introduced into the Multiband OFDM Ultra-Wideband (MB-OFDM UWB) to improve the reliability, data rate and system capacity. This paper proposes a cooperative communication scheme for a four source node MB-OFDM UWB system using Quasi-Orthogonal STFCs, which is referred to as order-4 Quasi-Orthogonal Cooperative Communication Scheme (4-QOCCS). Simulation results show that the proposed 4-QOCCS provides significantly better error performance over the conventional MB-OFDM UWB and our order-2 Orthogonal Cooperative Communication Scheme (2-OCCS) using the Alamouti STFCs, and even better than the order-4 Orthogonal Cooperative Communication Scheme (4-OCCS), which we have been recently proposed, …


Integrated Seat And Suspension Control For A Quarter Car With Driver Model, Haiping Du, Weihua Li, Nong Zhang Feb 2013

Integrated Seat And Suspension Control For A Quarter Car With Driver Model, Haiping Du, Weihua Li, Nong Zhang

Professor Weihua Li

In this paper, an integrated vehicle seat and sus pension control strategy for a quarter car with driver model is proposed to improve suspension performance on driver ride comfort. An integrated seat and suspension model that includes a quarter-car suspension, a seat suspension, and a 4-degree-of freedom (DOM) driver body model is presented first. This in1 tegrated model provides a platform to evaluate ride comfort 1performance in terms of driver head acceleration responses under typical road disturbances and to develop an integrated control of seat and car suspensions. Based on the integrated model, an H∞ state feedback controller is designed …