To see the other types of publications on this topic, follow the link: Machiya.

Dissertations / Theses on the topic 'Machiya'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Machiya.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Linam, John E. Jr. "Machiya." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/36318.

Full text
Abstract:
The historical, vernacular, residential forms and processes of urban Japan are to be explored as a potential source of power with regards to the concept of developmental vernacular architecture. This theory is a relatively new and vaguely defined approach to a combined method of conservation and progressive growth; balanced elements of a "smart growth" strategy. Therefore, a clarification of the term, along with an initial analysis of the definitions and values of vernacular architectures, is needed. Secondly, The Japanese machiya type will be explored as a unique vernacular form, indicating its diversity over time and similarity over distance. The essential controls and stimulus of its formal evolution and common characteristics will be examined. Machiya, a Japanese term, translates roughly to townhouse, in English. It is typically a city dwelling which also includes a small shop or metting space that fronts the street. This is the typical dwelling of the urban merchant class. The long of history of its development and its many transformations will be discussed. These analyses ultimately lead to the design exercise which investigates the machiya type as an intelligent base for a developmental vernacular process within the context of the Japanese urban environment. Therefore, the conclusion is to present, or to infer, the merits of incorporating such a program into a wider extent of the current built environment; poor and affluent, urban and rural.
Master of Architecture
APA, Harvard, Vancouver, ISO, and other styles
2

Jander, Fabian. "Culturally Friendly Design Method based on Machiya System of Kyoto." 京都大学 (Kyoto University), 2013. http://hdl.handle.net/2433/174916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moore, James Robert Finn. "Interpreting territorial structure : the machiya of Kyoto and the rowhouses of Boston's South End." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/68715.

Full text
Abstract:
Thesis (M. Arch.)--Massachusetts Institute of Technology, Dept. of Architecture, 1988.
Bibliography: p. 82-84.
This thesis focuses on the structure of territory, and how a sense of physical and psychological retreat can be achieved by manipulating territorial principles as one moves through layers of space in an urban context. The machiya or rowhouses of Kyoto are a sophisticated example of a building type which successfully creates a sense of privacy and contemplative retreat within a dense urban context. Through a study of the principles of spatial manipulation and architectural design of the machiya in Japan, some generic techniques are identified which can be applied to other types of rowhouses to add complexity and depth to the experience of space within a confined area. The principles which are gleaned from the Japanese examples are then applied to a local rowhouse type, in the South End in Boston, to explore the implications of increased spatial complexity and layering in the American urban context. The thesis is divided into two parts: first, a discussion of generic issues of territory, and observations of the territorial structure of Kyoto and the South End; then, the development and application of a thematic system for exploring territorial interpretations at the level of the dwelling, cluster of dwellings, and the urban tissue.
by James Robert Finn Moore.
M.Arch
APA, Harvard, Vancouver, ISO, and other styles
4

Monteiro, Raquel Nascimento. "Revitalizar a partir da memória de uma cidade canal." Master's thesis, Universidade de Lisboa, Faculdade de Arquitetura, 2019. http://hdl.handle.net/10400.5/18334.

Full text
Abstract:
Dissertação de Mestrado Integrado em Arquitetura, com a especialização em Arquitetura apresentada na Faculdade de Arquitetura da Universidade de Lisboa para obtenção do grau de Mestre.
Uma cidade que outrora foi considerada a “Veneza de Oriente”, hoje encontra-se de costas voltada para a água. “Revitalizar a partir da Memória de uma Cidade Canal”, centra-se na reinvenção de antigos canais como estimuladores de revitalização urbana e incentivo para outros exemplos no território. As frentes de água, mais do que um lugar de lazer público, são um espaço com um grande potencial para habitação e comércio. Nesse sentido, o trabalho desenvolvido defende a fusão de espaços de habitação e espaços de comércio, através da criação de um Quarteirão Habitacional Híbrido, com o objetivo de desenvolver a frente de água no Bairro de Tsukiji, em Tóquio, e fazer deste lugar mais do que um lugar turístico.
ABSTRACT: In a city that was once considered the "Venice of the East", today it is facing away from the water. Revitalizar a partir da Memória de uma Cidade Canal, focuses on the reinvention of old canals as stimulators of urban regeneration and encouragement for other examples scattered over the territory. Waterfronts, more than a place for public leisure, are a place with great potential for housing and commerce. Therefore, the developed project, defends the fusion of housing and retail spaces, through the creation of a Hybrid Housing Block, in order to develop Tsukiji’s waterfront, in Tokyo, and making this place more than a tourist point.
N/A
APA, Harvard, Vancouver, ISO, and other styles
5

Poni, Luca. "La casa giapponese: Il suo rapporto con la misura, lo standard, lo spazio." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7372/.

Full text
Abstract:
L’analisi compiuta in questa tesi di laurea è motivata da una passione che fin dall’infanzia ho coltivato: quella per il Giappone. Con il passare degli anni gli aspetti del Giappone che mi hanno stimolato e incuriosito sono evoluti, come la volontà di approfondire una conoscenza sempre più completa di questo popolo e della loro cultura – facendo anche tesoro dell’esperienza di viaggio fatta nel 2012, visitando Tokyo e Kyoto.
 Notai nel mio breve soggiorno a Tokyo un qualcosa che qua non trovavo negli edifici: un eterno conflitto con lo spazio. Sono rimasto sorpreso dagli spazi angusti, dalle dimensioni lillipuziane delle case, spesso caratterizzate da standard qualitativi intollerabili per un occidentale, ma allo stesso tempo mi ha impressionato la tecnologia disponibile per la vita di tutti i giorni, che permetteva di sopperire a queste mancanze o deficit. Kyoto mi ha invece colpito per la tradizione, per la storia, per le sue architetture lignee – una città capace di fare convivere in armonia il passato col presente nel pieno rispetto della natura. I suoi colori, i suoi paesaggi bucolici non li dimenticherò facilmente... Il percorso di analisi che si svolgerà in questa sede includerà, partendo dalla tradizione fino ad arrivare al presente, le tematiche di cui si è appena parlato: casa giapponese, misura, standard, spazio. Si è partiti dall’analisi descrittiva e dalle splendide illustrazioni del zoologo americano Edward Morse, analizzando il suo volume “Japanese Homes and Their Surroundings” pubblicato alla fine del 1800 e divenuto un libro di culto per gli architetti moderni, per poi arricchire l’analisi con le tantissime informazioni e tavole tecniche fornite da Heinrich Engel con il libro “The Japanese House – A tradition for contemporary architecture”, un testo veramente formativo e altamente specifico per l’architettura vernacolare giapponese. Si arricchisce la discussione con Paper e pubblicazioni di professori giapponesi, racconti di narrativa e guide sul Giappone, per poi concludere l’analisi con libri di architettura moderna giapponese come il volume di Naomi Pollock “Modern Japanese House” e riviste quali JA (Japan Architects) per fornire esempi contemporanei di costruzioni residenziali odierne.
APA, Harvard, Vancouver, ISO, and other styles
6

Pincumbe, Nicholas James. "Deus ex machina the God machine /." Thesis, [Tuscaloosa, Ala. : University of Alabama Libraries], 2009. http://purl.lib.ua.edu/20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferguson, Sean. "Vox Machina." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=69656.

Full text
Abstract:
Vox Machina, for soprano, chamber ensemble, real-time digital signal processing and digital sounds, deals with the historical relationship between humanity and machines. The text uses excerpts drawn from a variety of sources, all in the public domain, as well as material written especially for the piece by the composer. The instrumental ensemble consists of 8 performers: flute, b-flat clarinet, horn, violin, viola, cello, guitar and percussion. A conductor is required, as well as a technician to control a mixing board and the performance of computer-generated sections of music. Digital sounds may be performed directly from computer, or may be played from DAT cassette.
APA, Harvard, Vancouver, ISO, and other styles
8

Stemme, Anja. "Deus et machina." Diss., lmu, 2008. http://nbn-resolving.de/urn:nbn:de:bvb:19-94131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stefani, Italo Giovani Abdanur. "Método de refinamento machina." Universidade Federal de Minas Gerais, 2007. http://hdl.handle.net/1843/RVMR-794P7N.

Full text
Abstract:
The Abstract State Machine (ASM) has been used as language for formal specification to various systems due to the high level of abstraction and the mathematical rigor. It facilitates to understand the modeled system and to formally verify properties. Using an ASM language, is possible to make a high level specification, called Ground Model, to be transformed, based on The ASM Refinement Method, in an executable code, validated and verified.The main goal of The Machina Refinement Method is to propose a high level specification method that represents aspects of ASM with the possibility to validate and to verify the builded model independent of the implementation. The refinement process automatically generates the executable Machina code and to carry through the verification using the NuSMV tool. Thus, the implementation can be automatically verified in accordance with the specification.
O modelo de Máquina de Estado Abstrata (ASM - Abstract State Machine) vem sendo amplamente utilizado para especificação formal de diversos tipos de sistemas devido ao seu alto grau de abstração e rigor matemático, o que facilita compreender o sistema modelado e verificar formalmente suas propriedades. Pode-se utilizar uma linguagem baseada no modelo ASM para escrever uma especificação em alto nível, conhecida como Modelo Básico, e posteriormente submetê-la a um processo de transformação baseado no Método de Refinamento ASM para obter a implementação validada e verificada.O principal objetivo do trabalho Método de Refinamento Machina (MRM) é propor um método de especificação em alto nível que represente aspectos de ASM e com a possibilidade de validar e verificar o modelo construído independente da implementação. O processo de refinamento permite obter, automaticamente, o código executável em Machina e realizar a verificação utilizando a ferramenta NuSMV. Assim, pode-se verificar automaticamente a implementação de acordo com a especificação.
APA, Harvard, Vancouver, ISO, and other styles
10

El, Fawal Ahmad Hani. "Machine-to-machine communication congestion mechanism." Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2018. http://www.theses.fr/2018ENTA0010/document.

Full text
Abstract:
Nos travaux s’orientent vers les problèmes de réseaux sans fil liés à la coexistence des communications machine-to-machine (M2M) et humain-humain (H2H). On souhaite souligner l'impact mutuel entre les trafics M2M et H2H dans un contexte d’Internet des objets (IoT : Internet Of Things) en particulier lors des catastrophes. Les communications M2M, qui devraient connaître une roissance exponentielle dans un avenir proche, constitueront un facteur important pour affecter tous les réseaux mobiles. On prévoit un grand nombre d'appareils M2M qui entraînera inévitablement des problèmes de saturation et aura des impacts remarquables sur les trafics, les services et les applications M2M et H2H. Pour étudier les influences mutuelles M2M et H2H, nous développons un nouveau modèle markovien à temps continu (CTMC) pour simuler, analyser et mesurer les différentes stratégies d'accès aux réseaux sans fil. Notre modèle nous a permis de contourner certaines limitations des simulateurs professionnels de LTE-A (Long Term Evolution-Advanced) comme SimuLTE en terme d’un nombre massif d'appareils M2M, une flexibilité de certains paramètres ou pour élaborer plus des outils statistiques. Lors d’un sinistre et suite à un énorme nombre de M2M souhaitant accéder aux réseaux sans-fil, nous avons constaté un épuisement rapide de la bande passante allouée dans les réseaux LTE-M (Long Term Evolution for Machines) ou Narrow Band for IoT (NB-IoT). Pour résoudre ce problème, nous proposons une nouvelle approche appelée Adaptive eNodeB (A-eNB) pour les réseaux LTE-M et NB-IoT. Selon nos simulations, l’A-eNB peut résoudre progressivement le problème de surcharge tout en assurant une satisfaisante qualité de service (QoS) pour le trafic H2H. Avec le concept d’A-eNB, un réseau LTE-M pourra adapter ses ressources pour faire face à une augmentation progressive du nombre de connexions M2M accédant au réseau LTE-M / NB-IoT et en même temps réduire l'impact sur le trafic H2H
This Ph.D. work aims to study the Machine-to-Machine (M2M) congestion overload problem and the mutual impact among M2M and Human-to-Human (H2H) traffics in IoT (Internet of Things) environments specifically during disaster events. M2M devices with their expected exponential booming in the near future, will be one of the significant factors to influence all mobile networks. Inevitably, the expected huge number of M2M devices causes saturation problems, and leads to remarkable impacts on both M2M and H2H traffics, services and applications. To study the M2M and H2H mutual influences, we create a new platform model based on Continuous-Time Markov Chain (CTMC) to simulate, analyze and measure radio access strategies due to the limitations of existing Long Term Evolution-Advanced (LTE-A) simulators (i.e, SimuLTE) in term of massive M2M devices, parameter flexibility and statistical tools. Additionally, during disaster events, a fast bandwidth depletion of the limited bandwidth assigned to M2M devices in Long Term Evolution for Machines (LTE-M) and Narrow Band for IoT (NB-IoT) networks is expected due to the high arrival request of M2M device network access. To address this problem, we propose a new approach named Adaptive eNodeB (A-eNB) for both LTE-M and NB-IoT networks. The A-eNB can solve gradually the overload problem, while keeping the H2H traffic Quality of Service (QoS) not to be affected badly. The network adaptation is provided through a dynamic LTE-M resource reservation aiming to increase the number of M2M connections accessing the LTE-M/NB-IoT network and to decrease the impact on H2H traffic
APA, Harvard, Vancouver, ISO, and other styles
11

Wright, David N. "Machine." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ47767.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hack, Byron Wallis John 1963. "Man to machine, machine to machine and machine to instrument interfaces for teleoperation of a fluid handling laboratory." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276764.

Full text
Abstract:
The purpose of this thesis is the design of the software necessary for teleoperation of a fluid handling laboratory. It does not include the implementation of this software. The laboratory for which it is designed is being developed at the University of Arizona, and is a model of the fluid handling laboratory aboard Space Station. The software includes man/machine, machine/machine, and machine/instrument interfaces. The man/machine interface is menu driven and consists of high level commands which are independent of the devices in the laboratory. The machine/machine interface is also device independent. It consists of intermediary commands and maps the commands of the man/machine interface into the low level, device dependent, commands and programs of the machine/instrument interface. Although the software is primarily designed for the model laboratory, the needs of a remotely operated fluid handling laboratory aboard Space Station have been considered.
APA, Harvard, Vancouver, ISO, and other styles
13

Cardamone, Dario. "Support Vector Machine a Machine Learning Algorithm." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
Nella presente tesi di laurea viene preso in considerazione l’algoritmo di classificazione Support Vector Machine. Piu` in particolare si considera la sua formulazione come problema di ottimizazione Mixed Integer Program per la classificazione binaria super- visionata di un set di dati.
APA, Harvard, Vancouver, ISO, and other styles
14

Aijaz, Adnan. "Protocol design for machine-to-machine networks." Thesis, King's College London (University of London), 2014. https://kclpure.kcl.ac.uk/portal/en/theses/protocol-design-for-machinetomachine-networks(afa66e02-39e0-47fc-b496-e5e7bd86f74c).html.

Full text
Abstract:
Machine-to-Machine (M2M) communications is an emerging communication paradigm that provides ubiquitous connectivity between devices along with an ability to communicate autonomously without human intervention. M2M communications acts as an enabling technology for the practical realization of Internet-of-Things (IoT). However, M2M communications differs from conventional Human-to-Human (H2H) communications due to its unique features such as massive number of connected devices, small data transmissions, little or no mobility, requirements of high energy efficiency and reliability, etc. These features create various challenges for existing communication networks which are primarily optimized for H2H communications. Therefore, novel solutions are required to meet the key requirements of M2M communications. In addition, enhancements are required at different layers of the protocol stack to support co-existence of M2M devices and H2H users. The main objective of this research is to investigate the challenges of M2M communications in two broad types of M2M networks; capillary M2M and cellular M2M networks. The primary focus is on developing novel solutions, algorithms, and protocol enhancements for successfully enabling M2M communications. Since cognitive radio technology is very promising for M2M communications, special emphasis is on capillary M2M networks with cognitive radio based Physical layer. Besides, the focus is also on exploring new frontiers in M2M communications. This thesis covers different aspects of M2M communications. Considering the motivation for cognitive M2M and service requirements of M2M devices, two cognitive MAC protocols have been proposed. The first protocol is centralized in nature and utilizes a specialized frame structure for co-existence with the primary network as well as handling different Quality-of-Service (QoS) requirements of M2M devices. The second protocol is a distributed cognitive MAC protocol, which is specially designed to provide high energy efficiency and reliability for M2M devices operating in challenging wireless environments. Both protocols explicitly account for the peculiarities of cognitive radio environments. The protocols have been evaluated using analytical modeling and simulation studies. Recently IETF has standardized a specially designed routing protocol for capillary M2M networks, known as RPL (Routing for Low Power and Lossy Networks). RPL is emerging as the de facto routing protocol for many M2M applications including the smart grid. On the other hand, the application of cognitive radio for smart grid communication is under active investigation in the research community. Hence, it is important to investigate the applicability and adaptation of RPL in cognitive radio environments. In this regard, an enhanced RPL based routing protocol has been proposed for cognitive radio enabled smart grid networks. The enhanced protocol provides novel modifications to RPL for protecting the primary users along with meeting the utility requirements of the secondary network. An important challenge in LTE-based cellular networks with M2M communications is the uplink radio resource management as available resources are shared between M2M devices and H2H users, having different and often conflicting QoS requirements. Apart from this, energy efficiency requirements become critically important. Further, the specific constraints of Single Carrier Frequency Division Multiple Access (SC-FDMA) complicate the resource allocation problem. In this respect, an energy efficient resource allocation algorithm for the uplink of LTE networks with M2M/H2H co-existence under statistical QoS guarantees has been developed, that is based on canonical duality theory. The proposed algorithm outperforms classical algorithms in terms of energy efficiency while satisfying the QoS requirements of M2M devices and H2H users. A new frontier in M2M communications is the nano-M2M communications, which is envisioned to create the Internet-of-Nano-Things (IoNT). Molecular communication (MC) is a promising communication technique for nano-M2M communications. In literature, no model for error performance of MC exists. Therefore, an error performance model has been developed that explicitly accounts for noise and interference effects. Since relaying and network coding based solutions are gaining popularity for nano-M2M networks, the error performance of a network coded molecular nano-M2M network has been evaluated as well. Finally, the thesis is concluded based on the overall picture of the research conducted. In addition, some directions for future work are included as well.
APA, Harvard, Vancouver, ISO, and other styles
15

Lam, Tiago Miguel Gameiro. "Machine-to-Machine (M2M) in ubiquitous computing." Master's thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12710.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
Although the area of Machine-to-Machine communications and, consequently, the Internet of Things, have undergone a great improvement regarding interoperability, there is still no ’de facto’ solution proposal to achieve large scale, even global, interoperability. As a first step, this work provides a theoretical analysis of proposals relevant to the area, mainly analysing how they achieve some essential requirements for the Internet of Things, such as scalability, heterogeneity and management. Later, focusing in ETSI’s M2M standard, is first given a high-level description of its vision, approach and architecture, and then, finally, from a more practical point of view, is also presented and tested a functional implementation of an ETSI M2M compliant gateway, which provides an empirical evaluation of the standard.
Apesar de a área das comunicações Máquina-a-Máquina e, consequentemente, a Internet das Coisas, terem sofrido uma grande melhoria relativamente à interoperabilidade, ainda não existe nenhuma solução considerada "dominante" que permita atingir uma interoperabilidade em larga escala, até mesmo global. Desta forma, numa primeira instância este trabalho visa fornecer uma análise teórica de propostas relevantes para a área, onde se analisa maioritariamente como é que essas propostas atingem alguns requisitos essenciais para a Internet das Coisas, como a escalabilidade, heterogeneidade e gestão. Posteriormente, focando-se no standard ETSI M2M, é dado em primeiro lugar uma descrição de alto nível da sua visão, abordagem e arquitectura, e depois, finalmente, de um ponto de vista prático, é ainda apresentada e testada uma implementação funcional de uma gateway condescendente com o standard, o que fornece uma avaliação mais empírica do mesmo.
APA, Harvard, Vancouver, ISO, and other styles
16

Andersson, Viktor. "Machine Learning in Logistics: Machine Learning Algorithms : Data Preprocessing and Machine Learning Algorithms." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64721.

Full text
Abstract:
Data Ductus is a Swedish IT-consultant company, their customer base ranging from small startups to large scale cooperations. The company has steadily grown since the 80s and has established offices in both Sweden and the US. With the help of machine learning, this project will present a possible solution to the errors caused by the human factor in the logistic business.A way of preprocessing data before applying it to a machine learning algorithm, as well as a couple of algorithms to use will be presented.
Data Ductus är ett svenskt IT-konsultbolag, deras kundbas sträcker sig från små startups till stora redan etablerade företag. Företaget har stadigt växt sedan 80-talet och har etablerat kontor både i Sverige och i USA. Med hjälp av maskininlärning kommer detta projket att presentera en möjlig lösning på de fel som kan uppstå inom logistikverksamheten, orsakade av den mänskliga faktorn.Ett sätt att förbehandla data innan den tillämpas på en maskininlärning algoritm, liksom ett par algoritmer för användning kommer att presenteras.
APA, Harvard, Vancouver, ISO, and other styles
17

Garsten, Sofia, and Miriam Nilsson. "Deus Ex Machina : en kvalitativ studie i skildringen av feminin artificiell intelligens i filmen Ex. Machina." Thesis, Stockholms universitet, JMK, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-125584.

Full text
Abstract:
With this study, the authors wish to highlight the way artificial intelligence, as a new form of media technology, seems to be ascribed gender, both in fiction and reality. These, by humans artificially developed beings, would not need to be gendered, but still are. Given these beings are human made and new phenomenas, an opportunity of preventing boundaries considering gender, class and etnicity to be reproduced would be possible and in favour. By analysing the Alex Garland 2015 film Ex Machina, the authors wish to discuss how and why the artificial intelligence becomes gendered, particularly feminised, and what this means from a wider perspective concerning the way we look at this new technlology not yet fully introduced in real life. By using post- and transhuman theory mixed with feminist theories such as Judith Butlers theory of perfomativity, Donna Haraways posthuman feminist theory and Laura Mulveys theory of The Male Gaze, this study results in a qualitative text analysis. The methodic tools used in this study contains elements from visual text methods and therefor also semiotics.   The authors reach to the conclusion that the depiction of artificial intelligence in the film Ex Machina (2015) reproduces stereotypic feminine gender acts and even intensifies these. When these ways of presenting new and futuristic technology seems to appear in ficiton, an assumption can be made that they origin from existing and deep gender acts in the western society. Researchers, such as Donna Haraway, wishes for these strong boundaries in gender, class and etnicity to not be reproduced in new technology, but in the fictional case of the film Ex Machina (2015), this wish has unfortunately not been fullfilled. If society would be able to rethink the sharp boundaries between nature and technology and succeed with this ontological change in the way we look at humanity, it would hopefully be easier to approach the new technology with an open mind. Perhaps then the reproduction of gender stereotypes in this new technology would cease in fiction, but also in reality.
APA, Harvard, Vancouver, ISO, and other styles
18

Vázquez, Gallego Francisco. "Towards zero-power wireless machine-to-machine networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/398406.

Full text
Abstract:
This thesis aims at contributing to overcome two of the main challenges for the deployment of M2M networks in data collection scenarios for the Internet of Things: the management of massive numbers of end-devices that attempt to get access to the channel; and the need to extend the network lifetime. In order to solve these challenges, two complementary strategies are considered. Firstly, the thesis focuses on the design, analysis and performance evaluation of MAC protocols that can handle abrupt transitions in the traffic load and minimize the energy consumption devoted to communications. And secondly, the use of energy harvesting (EH) is considered in order to provide the network with unlimited lifetime. To this end, the second part of the thesis focuses on the design and analysis of EH-aware MAC protocols. While the Frame Slotted-ALOHA (FSA) protocol has been traditionally adopted in star topology networks for data collection, results show that FSA-based protocols lack of scalability and present synchronization problems as the network density increases. Indeed, the frame length of FSA must be adjusted to the number of contenders, which may be complex to attain in dense networks with large and dynamic number of end-devices. In order to overcome these issues, a tree splitting-based random access protocol, referred to as Low Power Contention Tree-based Access (LP-CTA), is proposed in the first part of this thesis. In LP-CTA, the frame length can be very short and fixed, which facilitates synchronization and provides better network scalability than FSA. While LP-CTA uses data slots for contention, it is possible to use short access requests in minislots, where collisions are resolved using tree splitting, and avoid the contention in data. Since these minislots can be much shorter than the duration of a data packet, the performance can be improved. The Low Power Distributed Queuing (LP-DQ) protocol proposed in this thesis is based on this idea. LP-DQ combines tree splitting with the logic of two distributed queues that manage the contention resolution and the collision-free data transmission. Results show that LP-DQ outperforms LP-CTA and FSA in terms of delay and energy efficiency, and it relaxes the need to know the size of the network and adapts smoothly to any change in the number of end-devices. The approach of LP-DQ is convenient when the messages transmitted by each end-device fit in one single slot, however, if the end-devices generate long messages that have to be fragmented, it is better to add a reservation mechanism in order to boost the performance. In this sense, the LPR-DQ protocol is proposed as an extension of LP-DQ where the concept of reservation is integrated to allow the end-devices reserve as many collision-free slots as needed. The second part of the thesis is devoted to the integration of the MAC layer with the use of energy harvesting. The variability and fluctuations of the harvested energy is considered for the design of EH-aware MAC protocols and three performance metrics are proposed: the probability of delivery, the data delivery ratio and the time efficiency. Previous works on data collection networks with EH focus on DFSA. In this thesis, the EH-CTA protocol is proposed as an adaptation of LP-CTA that takes the energy harvesting process into account. Results show that EH-CTA outperforms DFSA if the energy threshold for an end-device to become active is properly configured. In addition, while DFSA needs to adapt the frame length dynamically, EH-CTA uses a fixed frame length, thus facilitating scalability and synchronization. Finally, the EH-RDFSA and EH-DQ protocols are proposed for scenarios where data must be fragmented. EH-RDFSA is a combination of RFSA and DFSA, and EH-DQ is an extension of LPR-DQ.
Esta tesis contribuye a resolver dos de los retos para el despliegue de redes M2M en escenarios de recolección de datos para el Internet de las Cosas: la gestión del acceso al canal de un número masivo de dispositivos; y la necesidad de extender la vida de la red. Para resolverlos se consideran dos estrategias complementarias. En primer lugar, se centra en el diseño, el análisis y la evaluación de protocolos MAC que pueden manejar transiciones abruptas de tráfico y reducen el consumo de energía. Y en segundo lugar, se considera el uso de mecanismos de captura de energía (Energy Harvesters, EH) para ofrecer un tiempo de vida ilimitado de la red. Con este fin, la segunda parte de la tesis se centra en el diseño y el análisis de protocolos MAC de tipo "EH-aware". Mientras que Frame Slotted-ALOHA (FSA) ha sido tradicionalmente adoptado en aplicaciones de recolección de datos, los resultados muestran que FSA presenta problemas de escalabilidad y sincronización cuando aumenta la densidad de la red. De hecho, la longitud de trama de FSA se debe ajustar según sea el número de dispositivos, lo cual puede ser difícil de estimar en redes con un número elevado y dinámico de dispositivos. Para superar estos problemas, en esta tesis se propone un protocolo de acceso aleatorio basado en "tree-splitting" denominado Low Power Contention Tree-based Access (LP-CTA). En LP-CTA, la longitud de trama puede ser corta y constante, lo cual facilita la sincronización y proporciona mejor escalabilidad. Mientras que LP-CTA utiliza paquetes de datos para la contienda, es posible utilizar solicitudes de acceso en mini-slots, donde las colisiones se resuelven utilizando "tree-splitting", y evitar la contención en los datos. Dado que estos mini-slots pueden ser mucho más cortos que la duración de un slot de datos, el rendimiento de LP-CTA puede ser mejorado. El protocolo Low Power Distributed Queuing (LP-DQ) propuesto en esta tesis se basa en esta idea. LP-DQ combina "tree-splitting" con la lógica de dos colas distribuidas que gestionan la resolución de la contienda en la solicitud de acceso y la transmisión de datos libre de colisiones. Los resultados demuestran que LP-DQ mejora LP-CTA y FSA en términos de retardo y eficiencia energética, LP-DQ no requiere conocer el tamaño de la red y se adapta sin problemas a cualquier cambio en el número de dispositivos. LP-DQ es conveniente cuando los mensajes transmitidos por cada dispositivo caben en un único slot de datos, sin embargo, si los dispositivos generan mensajes largos que requieren fragmentación, es mejor añadir un mecanismo de reserva para aumentar el rendimiento. En este sentido, el protocolo LPR-DQ se propone como una extensión de LP-DQ que incluye un mecanismo de reserva para permitir que cada dispositivo reserve el número de slots de datos según sea el número de fragmentos por mensaje. La segunda parte de la tesis está dedicada a la integración de la capa MAC con el uso de "Energy Harvesters". La variabilidad y las fluctuaciones de la energía capturada se consideran para el diseño de protocolos MAC de tipo "EH-aware" y se proponen tres métricas de rendimiento: la probabilidad de entrega, el "Data Delivery Ratio" y la eficiencia temporal. Los trabajos previos en redes de recolección de datos con EH se centran principalmente en DFSA. En esta tesis, el protocolo EH-CTA se propone como una adaptación de LP-CTA que tiene en cuenta el proceso de captura de energía. Los resultados muestran que EH-CTA supera DFSA si el umbral de energía para que un dispositivo se active está configurado correctamente. Además, mientras que en DFSA se necesita adaptar la longitud de trama de forma dinámica, EH-CTA utiliza una longitud de trama fija, facilitando así la escalabilidad y la sincronización. Por último, se proponen los protocolos EH-RDFSA y EH-DQ para escenarios en los que los datos deben ser fragmentados. EH-RDFSA es una combinación de RFSA y DFSA, y EH-DQ es una extensión de LPR-DQ.
Aquesta tesi contribueix a resoldre dos dels reptes per al desplegament de xarxes M2M en escenaris de recol·lecció de dades per a l'Internet de les Coses: la gestió de l'accés al canal d'un nombre massiu de dispositius; i la necessitat d'extendre la vida de la xarxa. Per resoldre'ls es consideren dues estratègies complementàries. En primer lloc, es centra en el disseny, l'anàlisi i l'avaluació de protocols MAC que poden manegar transicions abruptes de trànsit i redueixen el consum d'energia. I en segon lloc, es considera l'ús de mecanismes de captura d'energia (Energy Harvesters, EH) per a oferir un temps de vida il·limitat de la xarxa. Amb aquesta finalitat, la segona part de la tesi es centra en el disseny i l'anàlisi de protocols MAC de tipus "EH-aware".Mentre que Frame Slotted-ALOHA (FSA) ha estat tradicionalment adoptat en aplicacions de recol·lecció de dades, els resultats mostren que FSA presenta problemes d'escalabilitat i sincronització quan augmenta la densitat de la xarxa. De fet, la longitud de trama de FSA s'ha d'ajustar segons sigui el nombre de dispositius, la qual cosa pot ser difícil d'estimar en xarxes amb un nombre elevat i dinàmic de dispositius. Per superar aquests problemes, en aquesta tesi es proposa un protocol d'accés aleatori basat en "tree-splitting" denominat Low Power Contention Tree-based Access (LP-CTA). En LP-CTA, la longitud de trama pot ser curta i constant, la qual cosa facilita la sincronització i proporciona millor escalabilitat.Mentre que LP-CTA utilitza paquets de dades per a la contenció, és possible utilitzar sol·licituds d'accés a mini-slots, on les col·lisions es resolen utilitzant "tree-splitting", i evitar la contenció a les dades. Atès que aquests mini-slots poden ser molt més curts que la durada d'un slot de dades, el rendiment de LP-CTA pot ser millorat. El protocol Low Power Distributed Queuing (LP-DQ) proposat en aquesta tesi es basa en aquesta idea. LP-DQ combina "tree-splitting" amb la lògica de dues cues distribuïdes que gestionen la resolució de la contenció en la sol·licitud d'accés i la transmissió de dades lliure de col·lisions. Els resultats demostren que LP-DQ millora LP-CTA i FSA en termes de retard i eficiència energètica, LP-DQ no requereix conèixer la mida de la xarxa i s'adapta sense problemes a qualsevol canvi en el nombre de dispositius.LP-DQ és convenient quan els missatges transmesos per cada dispositiu caben en un únic slot de dades, però, si els dispositius generen missatges llargs que requereixen fragmentació, és millor afegir un mecanisme de reserva per augmentar el rendiment. En aquest sentit, el protocol LPR-DQ es proposa com una extensió de LP-DQ que inclou un mecanisme de reserva per a permetre que cada dispositiu reservi el nombre de slots de dades segons sigui el nombre de fragments per missatge.La segona part de la tesi està dedicada a la integració de la capa MAC amb l'ús de "Energy Harvesters". La variabilitat i les fluctuacions de l'energia capturada es consideren per al disseny de protocols MAC de tipus "EH-aware" i es proposen tres mètriques de rendiment: la probabilitat d'entrega, el "Data Delivery Ratio" i l'eficiència temporal.Els treballs previs en xarxes de recol·lecció de dades amb EH se centren principalment en DFSA. En aquesta tesi, el protocol EH-CTA es proposa com una adaptació de LP-CTA que té en compte el procés de captura d'energia. Els resultats mostren que EH-CTA supera DFSA si el llindar d'energia perquè un dispositiu s'activi s'ajusta correctament. A més, mentre que a DFSA es necessita adaptar la longitud de trama de forma dinàmica, EH-CTA utilitza una longitud de trama fixa, facilitant així l'escalabilitat i la sincronització. Finalment, es proposen els protocols EH-RDFSA i EH-DQ per a escenaris en els quals les dades han de ser fragmentades. EH-RDFSA és una combinació de RFSA i DFSA, i EH-DQ és una extensió de LPR-DQ.
APA, Harvard, Vancouver, ISO, and other styles
19

Bartoli, Andrea. "Security protocols suite for machine-to-machine systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129622.

Full text
Abstract:
Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Schiefelbein, Jon M. "Prototype development of machine-to-machine operational nephanalysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FSchiefelbein.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mwebesa, Abraham. "Improving CNC machine utilization by Robotic machine tending." Thesis, KTH, Tillämpad maskinteknik (KTH Södertälje), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Penman, Scott (Scott David). "Ludus ex machina : toward computational play." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/115628.

Full text
Abstract:
Thesis: S.M. in Architecture Studies, Massachusetts Institute of Technology, Department of Architecture, 2018.
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 101-104).
The day is not far off when autonomous, artificially intelligent computational subjects will be employed in creative industries such as architecture and design. Artificial intelligence is rapidly becoming ubiquitous, and it has absorbed many capabilities once thought beyond its reach. As such, it is critical that we reflect on AI's ability to design, and on whether we are affording our creative computational counterparts the full range of tools and freedoms utilized by designers. Design is often tasked with pushing the envelope in the quest for novel meaning and experience. Designers can't always rely upon existing models to judge their work. Operating like this requires a curious and open mind, a willingness to eschew reward and occasionally break the rules, and a desire to explore for the sake of exploring. These behaviors fly in the face of traditional implementations of computation, and raise difficult questions about the autonomy and subjectivity of artificially intelligent machines. This thesis proposes computational play as a field of research covering how and why designers roam as freely as they do, what the creative potential is of such exploration, and how such techniques might responsibly be implemented in computational machines. The work argues that autotelism, defined as internal motivation, is an essential aspect of play and outlines how it can be incorporated in a computational framework. The thesis also demonstrates a proof-of-concept of computational play in the form of an autonomous drawing machine that is able to plot a drawing, view the drawing, and make decisions based on what it sees, bringing computational vision and computational drawing together into a cyclical process that permits the use of autotelic play behavior.
by Scott Penman.
S.M. in Architecture Studies
S.M.
APA, Harvard, Vancouver, ISO, and other styles
23

Hannig, Donovan. "Living / machine." This title; PDF viewer required. Home page for entire collection, 2010. http://archives.udmercy.edu:8080/dspace/handle/10429/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Guo, Hao. "Living machine." Connect to thesis, 2009. http://repository.unimelb.edu.au/10187/3651.

Full text
Abstract:
"In terms of what they are capable of, it seems to me, when you have the distance narrowing between humans and machines in the sense that if we are becoming more machine-like, it's easier to see the machine as more human-like. I don't want to be overly dramatic about it, but I think more and more people wonder, is this living or are we just going through the motions? What's happening? Is everything being leached out of life? Are the whole texture and values and everything kind of draining away? Well, that would take many other lectures, but it's not so much the actual advance of the technology: If machines can be human, humans can be machines. The truly scary point is the narrowing of the distance between the two".In John Zerza’s talk ‘Against Technology’ at Stanford University, he observed that when you have the distance between humans and machines narrowing then in a sense we are becoming more machine-like, and it’s easier to see the machine as more human like. These views are similar to the views I have been considering for some time in my art practice.My research paper attempts to chart the relationship between my art practice and personal and global circumstances as an international student from Beijing studying at an art school in Melbourne.Living Machines also finds expressions of these ideas in the theories of Michel Focault, Gilles Deleuze, Jacques Lacan and Harold Pinter. The artists I have been investigating include Marcel Duchamp, Ai WeiWei, Ang Lee, Tom Friedman and A Constructed World .The informal nature of the writing attempts to articulate my philosophical stance taken in the studio-based research. My studio research practice comprises collaboration and installations where I construct objects from found materials, and use video, animation, and performance to explore material and spatial equivalences to the concept of body as machine.
APA, Harvard, Vancouver, ISO, and other styles
25

Dobson, Kelly E. (Kelly Elizabeth) 1970. "Machine therapy." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/44329.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2007.
Includes bibliographical references (p. [137]-146).
Machine Therapy is a new practice combining art, design, psychoanalysis, and engineering work in ways that access and reveal the vital, though often unnoticed, relevance of people's interactions and relationships with machines. Machine Therapy will be illustrated through the construction of several systems including re-appropriated domestic devices such as Blendie, wearble apparatuses such as ScreamBody, and body-signal-based companion machines - Umo, Amo, and Omo - that function through visceral interactions including breathing and non-verbal sounds. These systems will be used to explore themes of human-machine relations in terms of visceral, cathartic, and reflexive expressions and communications. This work incorporates elements from my technical research in digital signal processing, machine learning, mechanical engineering, and sensor design. Combining these areas of research and practice, I have been able to help manifest new objects and relationships that are unique in some aspects while maintaining quotidian familiarity in other aspects. These apparatuses enable unusual explorations of what we interact with when we interact with machines. I hypothesize that the answer will turn out to be much more than the machine itself, and will include our sense of self, agency in the interpersonal and political world, and our shared psychological, emotional, cultural, and perceptual approaches to the world. The importance of the parapractic elements and also the therapeutic properties of the Machine Therapy machines will be evaluated in studies of participants' interactive engagements with the machines as well as their affective responses to the machines.
Kelly Dobson.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
26

Spett, Max Viktor. "Machine Architecture." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229870.

Full text
Abstract:
Recent developments in AI is changing our world. It already governs our digital life. In my thesis I take the position that AI involvement in the field of architecture is inevitable, and indeed already here. AI is neither something we can simply accept, nor wholly ignore. Rather, we should try to understand and work with it. These algorithms should not be seen as mere tools with predictable, repeatable outcomes, they are something more complex. I’ve explored the world of AI by means of teaching a machine to design diverse, typologically similar objects: residential doorways from Stockholm. By instructing the machine to read and recreate these objects it has learned to design objects similar to them. While the machine does not know what it has designed, it has nevertheless reinterpreted the residential gate, thus offering an opportunity to glimpse into to the “mind” of AI, a world equally as unknown as omnipresent.
APA, Harvard, Vancouver, ISO, and other styles
27

Whitby, Bess. "Ghost Machine." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc822764/.

Full text
Abstract:
This thesis consists of a collection of poems. By virtue of its content and arrangement, the collection ruminates on and attempts to work through the problem of corporeality and bodily experience: the anxieties surrounding illness, mortality, and the physicality of contemporary life. This collection explores the tension inherent in the mind/body duality and, rather than prescribing solutions, offers multiple avenues and perspectives through which to view bodily experience, as well as how that experience affects an individual’s identity, agency, and sense of self.
APA, Harvard, Vancouver, ISO, and other styles
28

Кириченко, Олена Анатоліївна, Елена Анатольевна Кириченко, Olena Anatoliivna Kyrychenko, and Y. V. Kalashnyk. "Machine translation." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/12977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mertz, Katelyn M. "Simple Machine." University of Akron / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=akron1427710920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

HALLGREN, ROSE. "Machine Dreaming." Thesis, KTH, Arkitektur, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298504.

Full text
Abstract:
Can I create my own design companion? My own design AI? How far do I go using the machine? What are the poetics of machine learning? This thesis is about exploring art and artificial intelligence, specifically machine learning which is the study of computer algorithms that improve through experience. The core thing of what machine learning does is to find patterns in data to then use those patterns to in some way predict the future.  I define a machine which works and generates images according to the given rules. The rules are set in time and in data. The decision, however, as in all creative processes, is up to the creator (in this the architect) so it is as much a part of the creation as the setting up of the data. The method is a mix of my own personality and imagination and the impersonal machine (my computer).  With me during the process, I found inspiration from other creators working with machines in different experimental ways that diverge from the original purpose of their machine/tool. The project is an investigation of contemporary technologies where I try to understand my tool through a series of experiments.
APA, Harvard, Vancouver, ISO, and other styles
31

Ramirez, Reid. "Teller Machine." VCU Scholars Compass, 2012. http://scholarscompass.vcu.edu/etd/2769.

Full text
Abstract:
This document examines the work in my MFA thesis exhibition. The objects in that installation address specific socio-aesthetic sites of class and power. The personal and cultural narratives examined here further explain the objects’ symbolic potential.
APA, Harvard, Vancouver, ISO, and other styles
32

Pamulaparthy, Kiran Reddy. "PIPPIN MACHINE." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/436.

Full text
Abstract:
The PIPPIN machine describes two simulations which are intended to help students understand the compile and execute process of a simple computer. The first simulator takes a simple mathematical expression as input and then translates it into an assembly language. The second simulator will execute an assembly language program.
APA, Harvard, Vancouver, ISO, and other styles
33

Mendonca, Costa Javier. "Context-Aware Machine to Machine Communications in Cellular Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143180.

Full text
Abstract:
Cellular network based Machine-to-Machine (M2M) communications have been growing rapidly in recent years, being used in a wide range of services such as security, metering, health, remote control, tracking and so on. A critical issue that needs to be considered in M2M communications is the energy efficiency, typically the machines are powered by batteries of low capacity and it is important to optimize the way the power is consumed. In search of better M2M systems, we propose a context-aware framework for M2M communications so the machine type communication (MTC) devices dynamically adapt their settings depending on a series of characteristics such as data reporting mode and quality of service (QoS) features so higher energy efficient is achieved, extending the operating lifetime of the M2M network. Simulations were performed with four commonly used M2M applications:home security, telehealth, climate and smart metering, achieving considerable energy savings and operating lifetime extension on the network. Thus, it is shown that contexts play an important role on the energy efficiency of a M2M system.
APA, Harvard, Vancouver, ISO, and other styles
34

Demblewski, Michael. "Security Frameworks for Machine-to-Machine Devices and Networks." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/68.

Full text
Abstract:
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the “functions and capabilities” of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
35

Wu, Anjian M. B. A. Sloan School of Management. "Performance modeling of human-machine interfaces using machine learning." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122599.

Full text
Abstract:
Thesis: M.B.A., Massachusetts Institute of Technology, Sloan School of Management, 2019, In conjunction with the Leaders for Global Operations Program at MIT
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019, In conjunction with the Leaders for Global Operations Program at MIT
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 70-71).
As the popularity of online retail expands, world-class electronic commerce (e-commerce) businesses are increasingly adopting collaborative robotics and Internet of Things (IoT) technologies to enhance fulfillment efficiency and operational advantage. E-commerce giants like Alibaba and Amazon are known to have smart warehouses staffed by both machines and human operators. The robotics systems specialize in transporting and maneuvering heavy shelves of goods to and from operators. Operators are left to higher-level cognitive tasks needed to process goods such as identification and complex manipulation of individual objects. Achieving high system throughput in these systems require harmonized interaction between humans and machines. The robotics systems must minimize time that operators are waiting for new work (idle time) and operators need to minimize time processing items (takt time). Over time, these systems will naturally generate extensive amounts of data. Our research provides insights into both using this data to design a machine-learning (ML) model of takt time, as well as exploring methods of interpreting insights from such a model. We start by presenting our iterative approach to developing a ML model that predicts the average takt of a group of operators at hourly intervals. Our final XGBoost model reached an out-of-sample performance of 4.01% mean absolute percent error (MAPE) using over 250,000 hours of historic data across multiple warehouses around the world. Our research will share methods to cross-examine and interpret the relationships learned by the model for business value. This can allow organizations to effectively quantify system trade-offs as well as identify root-causes of takt performance deviations. Finally, we will discuss the implications of our empirical findings.
by Anjian Wu.
M.B.A.
S.M.
M.B.A. Massachusetts Institute of Technology, Sloan School of Management
S.M. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
36

Moré, i. López Joaquim. "Machine Translationness: a Concept for Machine Translation Evaluation and Detection." Doctoral thesis, Universitat Oberta de Catalunya, 2015. http://hdl.handle.net/10803/305494.

Full text
Abstract:
La tradautomaticitat és el fenomen lingüístic que fa que les traduccions automàtiques sonin a màquina. Aquesta tesi introdueix el concepte de tradautomaticitat com un objecte de recerca i presenta un mètode d'avaluació que consisteix en determinar si la traducció és pròpia d'una màquina en comptes de determinar la seva semblança amb una traducció humana, com en els mètodes d'avaluació actuals. El mètode avalua la qualitat d'una traducció amb una mètrica, la MTS (Machine Translationness Score). Aquesta mètrica és conseqüent amb la percepció de la tradautomaticitat de la gent corrent. La MTS correlaciona bé amb les valoracions de qualitat dels avaluadors humans. A més, la nostra proposta permet realitzar avaluacions de baix cost perquè no necessiten de recursos que són cars d'obtenir (traduccions de referència, corpus d'entrenament, etc.). El criteri de tradautomaticitat té aplicacions que van més enllà de l'avaluació de traduccions automàtiques (detecció de plagi, detecció de publicacions no supervisades a Internet, etc.).
La tradautomacidad es el fenómeno lingüístico que hace que las traducciones automáticas suenen a máquina. Esta tesis introduce el concepto de tradautomaticidad como un objeto de investigación y presenta un método de evaluación que consiste en determinar si la traducción es propia de una máquina en vez de determinar su parecido a una traducción humana, como en los métodos de evaluación actuales. El método evalúa la calidad de una traducción con una métrica, la MTS (Machine Translationness Score). Esta métrica es consecuente con la percepción de la tradautomaticidad de la gente corriente. La MTS correlaciona bien con las valoraciones de calidad de evaluadores humanos. Además, nuestra propuesta permite realizar evaluaciones de bajo coste porque no requieren de recursos que son caros de obtener (traducciones de referencia, corpus de entrenamiento, etc.). El criterio de tradautomaticidad tiene aplicaciones que van más allá de la evaluación de traducciones automáticas (detección de plagio, detección de publicaciones no supervisadas en Internet, etc.).
Machine translationness (MTness) is the linguistic phenomena that make machine translations distinguishable from human translations. This thesis introduces MTness as a research object and presents an MT evaluation method based on determining whether the translation is machinelike instead of determining its humanlikeness as in current evaluation approaches. The method rates the MTness of a translation with a metric, the MTS (Machine Translationness Score). The MTS calculation is in accordance with the results of an experimental study on machine translation perception by common people. MTS proved to correlate well with human ratings on translation quality. Besides, our approach allows the performance of cheap evaluations since expensive resources (e.g. reference translations, training corpora) are not needed. Machine translationness ratings can be applied for other uses beyond machine translation evaluation (plagiarism and other forms of cheating, detection of unsupervised MT documents published on the Web, etc.).
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Been. "Interactive and interpretable machine learning models for human machine collaboration." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/98680.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 135-143).
I envision a system that enables successful collaborations between humans and machine learning models by harnessing the relative strength to accomplish what neither can do alone. Machine learning techniques and humans have skills that complement each other - machine learning techniques are good at computation on data at the lowest level of granularity, whereas people are better at abstracting knowledge from their experience, and transferring the knowledge across domains. The goal of this thesis is to develop a framework for human-in-the-loop machine learning that enables people to interact effectively with machine learning models to make better decisions, without requiring in-depth knowledge about machine learning techniques. Many of us interact with machine learning systems everyday. Systems that mine data for product recommendations, for example, are ubiquitous. However these systems compute their output without end-user involvement, and there are typically no life or death consequences in the case the machine learning result is not acceptable to the user. In contrast, domains where decisions can have serious consequences (e.g., emergency response panning, medical decision-making), require the incorporation of human experts' domain knowledge. These systems also must be transparent to earn experts' trust and be adopted in their workflow. The challenge addressed in this thesis is that traditional machine learning systems are not designed to extract domain experts' knowledge from natural workflow, or to provide pathways for the human domain expert to directly interact with the algorithm to interject their knowledge or to better understand the system output. For machine learning systems to make a real-world impact in these important domains, these systems must be able to communicate with highly skilled human experts to leverage their judgment and expertise, and share useful information or patterns from the data. In this thesis, I bridge this gap by building human-in-the-loop machine learning models and systems that compute and communicate machine learning results in ways that are compatible with the human decision-making process, and that can readily incorporate human experts' domain knowledge. I start by building a machine learning model that infers human teams' planning decisions from the structured form of natural language of team meetings. I show that the model can infer a human teams' final plan with 86% accuracy on average. I then design an interpretable machine learning model then "makes sense to humans" by exploring and communicating patterns and structure in data to support human decision-making. Through human subject experiments, I show that this interpretable machine learning model offers statistically significant quantitative improvements in interpretability while preserving clustering performance. Finally, I design a machine learning model that supports transparent interaction with humans without requiring that a user has expert knowledge of machine learning technique. I build a human-in-the-loop machine learning system that incorporates human feedback and communicates its internal states to humans, using an intuitive medium for interaction with the machine learning model. I demonstrate the application of this model for an educational domain in which teachers cluster programming assignments to streamline the grading process.
by Been Kim.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
38

Hao, Jinping. "Sparse modelling for machine to machine applications in smart grid." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.688348.

Full text
Abstract:
Since the traditional power grid has been showing incapability of meeting the requirements of modern society, the development and implementation of the smart grid (SG) have been a common consensus among policymakers, business leaders, and other stakeholders. The SG is expected to have pervasive control and provide reliable services by utilizing modern information and communications technologies (ICTs). With the advent of smart grid, a number of technical and procedural challenges has emerged and developing efficient algorithms and effective solutions is increasingly urgent. In smart grid, the machine-to-machine (M2M) communication is regarded as one of the key techniques that allow pervasive control and monitoring. In this thesis, various challenges in M2M applications in SG are investigated. ~Thile sparsity plays an instrumental role in signal processing techniques, which enables the theory of compressive sensing (CS) , this thesis explores the sparse properties in M2M networks and exploits the sparsity in various M2M applications in smart grid.
APA, Harvard, Vancouver, ISO, and other styles
39

Arouk, Osama. "Cellular-based machine-to-machine : congestion control and power management." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S112/document.

Full text
Abstract:
Les réseaux actuels et la prochaine génération des réseaux sans fil cellulaires (5G) doivent garantir, non seulement, les communications entre les gens (aussi connu sous le nom d'humain à humain - H2H), mais aussi à un déploiement massif de communication de type machine (MTC). MTC, ou encore Machine à Machine (M2M), peut être considérée comme des appareils qui peuvent établir des communications avec d’autres appareils sans aucune intervention humaine. M2M est aussi vue comme la pierre angulaire de la vision des objets connectés (IoT). Elle attire beaucoup d'attention, car elle peut être considérée comme une nouvelle opportunité pour les opérateurs de réseau et service IoT. Il existe aujourd’hui plusieurs types d’applications se basant sur MTC couvrant plusieurs domaines. On peut citer comme exemples les applications suivantes: la santé, les systèmes de transport intelligents (ITS), les compteurs intelligents et les réseaux intelligents, et la sécurité publique (PS). Le déploiement de ce type d'applications dans les réseaux mobiles cellulaires actuels, particulièrement Long Term Evolution (LTE) et LTE-Advanced (LTE-A) , ne peut être effectif sans surmonter les challenges posés par le déploiement d’un grand nombre d’équipement MTC dans la même cellule. En effet, le déploiement d'une myriade d'appareils MTC causera une congestion et une surcharge du système des réseaux d'accès radio (RAN) et du cœur de réseau (CN). Comme les appareils MTC sont équipés d'une batterie non rechargeable, la consommation d'énergie est aussi un défi. Dans cette thèse, nous allons étudier les problèmes de congestion et de consommation d'énergie dans le contexte des réseaux LTE et LTE-A en présence des appareils M2M. En ce qui concerne la congestion et la surcharge de système, nous nous concentrons sur la partie RAN, puisqu'elle peut être considérée comme la première ligne de défense pour le réseau cellulaire. Les contributions de cette thèse sont organisées sous les axes suivants: 1) Proposition d'un algorithme générique pour prédire le trafic entrant, de sorte que la congestion dans le réseau peut être facilement résolue, 2) Étude et proposition d'un modèle analytique générique de la procédure d'accès aléatoire au canal (RACH). Le modèle a pour but l’évaluation des méthodes de contrôle de congestion ciblant la partie RAN, 3) Approfondissement et proposition des méthodes permettant d'améliorer la méthode Pagination de Groupe (GP) approuvée par le 3GPP pour contrôler la congestion
The current and next generation wireless cellular networks (5G) have to deal with not only communications between people (known as Human-to-Human - H2H), but also with a massive deployment of Machine-Type-Communication (MTC). MTC, or alternatively Machine-to-Machine (M2M), can be viewed as devices connected among them without any human intervention. M2M can be considered as the cornerstone of Internet-of-Things (IoT) vision. It attracts a lot of attention, since it can be considered as a new opportunity and business market. Nowadays, there is a vast number of MTC applications, covering a large number of fields. Some of these applications are Healthcare, Intelligent Transport System (ITS), smart metering and smart grids, public safety (PS), forming the so-called smart city. Deploying this type of applications in the current cellular mobile networks, especially Long Term Evolution (LTE) and LTE-Advanced (LTE-A), cannot be achieved before overcoming the accompanied challenges. Indeed, caused by the existence of a myriad of MTC devices, Radio Access Network (RAN) and Core Network (CN) congestion and system overload is one of these challenging issues. As the MTC devices are using non-rechargeable batteries, power consumption is also a challenge. In this thesis, we study the congestion and power consumption problems in the context of LTE and LTE-A networks featuring M2M communications. Regarding the congestion and system overload, the focus will be on the RAN part since it can be considered as the first defense line on the network. The contributions of the thesis are organized on the following axes: 1) Propose a general algorithm to predict the incoming traffic, so that the congestion in the network can be easily remedied, 2) Study and propose a general analytical model of the Random Access Channel (RACH) procedure. The model can help to evaluate the congestion control methods targeting the RAN part, 3) Depth study and propose methods improving the performance of Group Paging (GP) method, one of the methods approved by 3GPP to control the congestion
APA, Harvard, Vancouver, ISO, and other styles
40

Sainudiin, R. "Machine Interval Experiments." Thesis, University of Canterbury. Mathematics and Statistics, 2005. http://hdl.handle.net/10092/2833.

Full text
Abstract:
A statistical experiment is a mathematical object that provides a framework for statistical inference, including hypothesis testing and parameter estimation, from observations of an empirical phenomenon. When observations in the continuum of real numbers are not empirically measurable to infinite precision and when conventional floating-point computations used in the inference procedure are not exact, the statistical experiment can become epistemologically invalid. The family of measures of the conventional statistical experiment indexed by a compact finite dimensional continuum is extended to the complete metric space of all compact subsets (of a certain form) of the index set. This is accomplished by the natural interval extension of the likelihood function. The extended experiment allows a statistical decision made with the aid of a computer to be equivalent to a numerical proof of its global optimality. Three open problems in computational statistics were solved using the extended experiment: (1) parametric bootstraps of likelihood ratio test statistics for finite mixture models, (2) rigorous maximum likelihood estimates of the branch lengths of a phylogenetic tree with a fixed topology or shape and (3) Monte Carlo sampling from a multi-modal target density with sharp peaks or witches’ hats.
APA, Harvard, Vancouver, ISO, and other styles
41

Hillis, William Daniel. "The connection machine." Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/14719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Collazo, Santiago Bryan Omar. "Machine learning blocks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100301.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references.
This work presents MLBlocks, a machine learning system that lets data scientists explore the space of modeling techniques in a very easy and efficient manner. We show how the system is very general in the sense that virtually any problem and dataset can be casted to use MLBlocks, and how it supports the exploration of Discriminative Modeling, Generative Modeling and the use of synthetic features to boost performance. MLBlocks is highly parameterizable, and some of its powerful features include the ease of formulating lead and lag experiments for time series data, its simple interface for automation, and its extensibility to additional modeling techniques. We show how we used MLBlocks to quickly get results for two very different realworld data science problems. In the first, we used time series data from Massive Open Online Courses to cast many lead and lag formulations of predicting student dropout. In the second, we used MLBlocks' Discriminative Modeling functionality to find the best-performing model for predicting the destination of a car given its past trajectories. This later functionality is self-optimizing and will find the best model by exploring a space of 11 classification algorithms with a combination of Multi-Armed Bandit strategies and Gaussian Process optimizations, all in a distributed fashion in the cloud.
by Bryan Omar Collazo Santiago.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
43

Lebedeva, A., and D. Vikulova. "Perpetual motion machine." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/45454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

McDonnell, David. "An Uncertain Machine." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1337949908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Quernheim, Daniel. "Bimorphism Machine Translation." Doctoral thesis, Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-223667.

Full text
Abstract:
The field of statistical machine translation has made tremendous progress due to the rise of statistical methods, making it possible to obtain a translation system automatically from a bilingual collection of text. Some approaches do not even need any kind of linguistic annotation, and can infer translation rules from raw, unannotated data. However, most state-of-the art systems do linguistic structure little justice, and moreover many approaches that have been put forward use ad-hoc formalisms and algorithms. This inevitably leads to duplication of effort, and a separation between theoretical researchers and practitioners. In order to remedy the lack of motivation and rigor, the contributions of this dissertation are threefold: 1. After laying out the historical background and context, as well as the mathematical and linguistic foundations, a rigorous algebraic model of machine translation is put forward. We use regular tree grammars and bimorphisms as the backbone, introducing a modular architecture that allows different input and output formalisms. 2. The challenges of implementing this bimorphism-based model in a machine translation toolkit are then described, explaining in detail the algorithms used for the core components. 3. Finally, experiments where the toolkit is applied on real-world data and used for diagnostic purposes are described. We discuss how we use exact decoding to reason about search errors and model errors in a popular machine translation toolkit, and we compare output formalisms of different generative capacity.
APA, Harvard, Vancouver, ISO, and other styles
46

Karlsson, Viktor, and Erik Rosvall. "Extreme Kernel Machine." Thesis, KTH, Skolan för teknikvetenskap (SCI), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211566.

Full text
Abstract:
The purpose of this report is to examine the combination of an Extreme Learning Machine (ELM) with the Kernel Method . Kernels lies at the core of Support Vector Machines success in classifying non-linearly separable datasets. The hypothesis is that by combining ELM with a kernel we will utilize features in the ELM-space otherwise unused. The report is intended as a proof of concept for the idea of using kernel methods in an ELM setting. This will be done by running the new algorithm against five image datasets for a classification accuracy and time complexity analysis. Results show that our extended ELM algorithm, which we have named Extreme Kernel Machine (EKM), improve classification accuracy for some datasets compared to the regularised ELM, in the best scenarios around three percentage points. We found that the choice of kernel type and parameter values had great effect on the classification performance. The implementation of the kernel does however add computational complexity, but where that is not a concern EKM does have an advantage. This tradeoff might give EKM a place between other neural networks and regular ELMs.
APA, Harvard, Vancouver, ISO, and other styles
47

Decourbey, Eric. "Machine de vision." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37604335t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Laird, Jodie. "Lolly machine upgrade." Thesis, Laird, Jodie (2015) Lolly machine upgrade. Honours thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/29867/.

Full text
Abstract:
The Lolly Machine was originally constructed and programmed in 1996 at Murdoch University’s Rockingham Campus by Graeme Cole and John Boulton [1], [2]. The machine sorts lollies by colour and dispenses the user-selected amount of each colour [1], [2]. The primary purpose of the machine is to demonstrate the practical engineering degree provided by Murdoch University during public events [1]. Demonstrations support the “keeping it real” motto of the Think Murdoch 2015 Campaign [3]. The secondary purpose is to expose Industrial Computer Systems Engineering students to more complex projects and industrial components, for example the colour sorting function is applicable in the food, manufacturing and ore processing industries [4], [5]. The Lolly Machine Upgrade Honours Thesis was undertaken to fulfil the requirements of the Bachelor of Engineering Honours Degree at Murdoch University. The main objective of the project was to return the Lolly Machine to an operational state for future public demonstrations by upgrading the control and communication of the machine environment. The required tasks were divided into five main objectives: two relating to developing the software and hardware to an operational state, two to extending the machine functionality, aesthetic appeal and user interaction and one to improving the limited documentation to ease future works. Overall four of the five objectives were achieved. The lolly machine is in an operational state, capable of stand-alone operation. The functionality and robustness were optimised by replacing faulty components and addressing hardware extensions. A DotStar, an individually addressable light emitting diode strip, was installed to extend the machine’s aesthetic appeal and user-interaction, optimising the machine effectiveness during public demonstrations. Multiple documents were created and updated, significantly improving the machine documentation. Due to the unforeseen extension of the first objective, one of the machine extension objectives was not completed. The purpose of this report is to present the information pertaining to each objective, including the design and approach, works completed, reasoning for decisions, problems encountered and solutions determined. To summarise the thesis, the final outcome and direction for future works are detailed.
APA, Harvard, Vancouver, ISO, and other styles
49

Pomering, Amy. "Tattoo machine ergonomics." Thesis, KTH, Maskinkonstruktion (Inst.), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172131.

Full text
Abstract:
Detta projekt gick ut på att undersöka ergonomiska problem med tatueringsmaskiner som finns på marknaden idag, att generera koncept om hur att förbättra problemen, och att sedan utveckla de koncepten i form av ritningar, CAD modeller och fysiska modeller. Processen börjades med att framföra en grundlig marknadsundersökning. Det som ingick i marknadsundersökningen var en infosökning, en kundundersökning i form av en enkät som skickades till tatuerare, och ett självtest av två olika tatueringsmaskiner. Resultaten som togs fram från marknadsundersökningen var att de största ergonomiska problemen var ljudnivå, vibrationsnivå, maskinvikt och balans, problem med grepp, och sladdkontroll. Områdena delades upp i tre olika problemgrupper vars fokus blev: tatueringsmaskin (apropå ljud, vibration och maskinvikt), greppet, och sladdkontroll. Genom en konceptgenereringsprocess togs fram tre nya produkter: en tatueringsmaskin som reducerar ljud- och vibrationsnivån och är enkelt att rengöra, ett silikon grepp som dämpar vibration och ger tatuerare ett bekvämt och återanvändningsbart alternativ, och ett silikon armband som reducerar viktpåverkan på handleden och eliminerar frustrationer om sladdkontroll. De tre koncepten blev utvalda på grund av att de presenterade de bästa lösningarna till ergonomiska problemen som kom fram via marknadsundersökning och dessa försäljningsmöjligheter. De slutliga koncepten presenterades sedan i form av en presentation och fysiska modeller på KEXPO utställningen.
This project was based on completion of an analysis of ergonomical problems with tattoo machines that exist on the market today, the generation of concepts to improve the situation, and the development of new concepts in the form of sketches, CAD models and physical models. The process began by completing a thorough market analysis. This was done via an information study, a customer survey in the form of a questionnaire that was sent to several tattoo artists, and a self-test in which two different tattoo machines were studied. The result of this analysis showed that the major ergonomic problems had to do with noise level, vibration level, machine weight and balance, poor grip ergonomics, and problems with cord control. These issues were then divided into problem focus areas, that is: tattoo machines (as to problems with noise, vibration and weight), grip, and cord control.Through an extensive concept-generation process, three different solutions were developed: a light-weight tattoo machine which decreases noise- and vibration-levels and made sanitization simple, a silicone grip which dampens vibrations and presents a comfortable and reusable alternative, and a silicone bracelet which reduces poor ergonomic effects on the wrist and eliminates frustration due to poor cord control. These three concepts were chosen due to the fact that they represented the best possible solutions to the ergonomic problems that were found during market research and because of their sales potential. They were then shown in the form of a presentation and physical model at the KEXPO exhibit.
APA, Harvard, Vancouver, ISO, and other styles
50

Melano, Timothy. "Insect-Machine Interfacing." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/145388.

Full text
Abstract:
A terrestrial robotic electrophysiology platform has been developed that can hold a moth (Manduca sexta), record signals from its brain or muscles, and use these signals to control the rotation of the robot. All signal processing (electrophysiology, spike detection, and robotic control) was performed onboard the robot with custom designed electronic circuits. Wireless telemetry allowed remote communication with the robot. In this study, we interfaced directionally-sensitive visual neurons and pleurodorsal steering muscles of the mesothorax with the robot and used the spike rate of these signals to control its rotation, thereby emulating the classical optomotor response known from studies of the fly visual system. The interfacing of insect and machine can contribute to our understanding of the neurobiological processes underlying behavior and also suggest promising advancements in biosensors and human brain-machine interfaces.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography