Search results for: soft computing approach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14783

Search results for: soft computing approach

14513 A Real-Time Bayesian Decision-Support System for Predicting Suspect Vehicle’s Intended Target Using a Sparse Camera Network

Authors: Payam Mousavi, Andrew L. Stewart, Huiwen You, Aryeh F. G. Fayerman

Abstract:

We present a decision-support tool to assist an operator in the detection and tracking of a suspect vehicle traveling to an unknown target destination. Multiple data sources, such as traffic cameras, traffic information, weather, etc., are integrated and processed in real-time to infer a suspect’s intended destination chosen from a list of pre-determined high-value targets. Previously, we presented our work in the detection and tracking of vehicles using traffic and airborne cameras. Here, we focus on the fusion and processing of that information to predict a suspect’s behavior. The network of cameras is represented by a directional graph, where the edges correspond to direct road connections between the nodes and the edge weights are proportional to the average time it takes to travel from one node to another. For our experiments, we construct our graph based on the greater Los Angeles subset of the Caltrans’s “Performance Measurement System” (PeMS) dataset. We propose a Bayesian approach where a posterior probability for each target is continuously updated based on detections of the suspect in the live video feeds. Additionally, we introduce the concept of ‘soft interventions’, inspired by the field of Causal Inference. Soft interventions are herein defined as interventions that do not immediately interfere with the suspect’s movements; rather, a soft intervention may induce the suspect into making a new decision, ultimately making their intent more transparent. For example, a soft intervention could be temporarily closing a road a few blocks from the suspect’s current location, which may require the suspect to change their current course. The objective of these interventions is to gain the maximum amount of information about the suspect’s intent in the shortest possible time. Our system currently operates in a human-on-the-loop mode where at each step, a set of recommendations are presented to the operator to aid in decision-making. In principle, the system could operate autonomously, only prompting the operator for critical decisions, allowing the system to significantly scale up to larger areas and multiple suspects. Once the intended target is identified with sufficient confidence, the vehicle is reported to the authorities to take further action. Other recommendations include a selection of road closures, i.e., soft interventions, or to continue monitoring. We evaluate the performance of the proposed system using simulated scenarios where the suspect, starting at random locations, takes a noisy shortest path to their intended target. In all scenarios, the suspect’s intended target is unknown to our system. The decision thresholds are selected to maximize the chances of determining the suspect’s intended target in the minimum amount of time and with the smallest number of interventions. We conclude by discussing the limitations of our current approach to motivate a machine learning approach, based on reinforcement learning in order to relax some of the current limiting assumptions.

Keywords: autonomous surveillance, Bayesian reasoning, decision support, interventions, patterns of life, predictive analytics, predictive insights

Procedia PDF Downloads 94
14512 The Challenges of Cloud Computing Adoption in Nigeria

Authors: Chapman Eze Nnadozie

Abstract:

Cloud computing, a technology that is made possible through virtualization within networks represents a shift from the traditional ownership of infrastructure and other resources by distinct organization to a more scalable pattern in which computer resources are rented online to organizations on either as a pay-as-you-use basis or by subscription. In other words, cloud computing entails the renting of computing resources (such as storage space, memory, servers, applications, networks, etc.) by a third party to its clients on a pay-as-go basis. It is a new innovative technology that is globally embraced because of its renowned benefits, profound of which is its cost effectiveness on the part of organizations engaged with its services. In Nigeria, the services are provided either directly to companies mostly by the key IT players such as Microsoft, IBM, and Google; or in partnership with some other players such as Infoware, Descasio, and Sunnet. This action enables organizations to rent IT resources on a pay-as-you-go basis thereby salvaging them from wastages accruable on acquisition and maintenance of IT resources such as ownership of a separate data centre. This paper intends to appraise the challenges of cloud computing adoption in Nigeria, bearing in mind the country’s peculiarities’ in terms of infrastructural development. The methodologies used in this paper include the use of research questionnaires, formulated hypothesis, and the testing of the formulated hypothesis. The major findings of this paper include the fact that there are some addressable challenges to the adoption of cloud computing in Nigeria. Furthermore, the country will gain significantly if the challenges especially in the area of infrastructural development are well addressed. This is because the research established the fact that there are significant gains derivable by the adoption of cloud computing by organizations in Nigeria. However, these challenges can be overturned by concerted efforts in the part of government and other stakeholders.

Keywords: cloud computing, data centre, infrastructure, it resources, virtualization

Procedia PDF Downloads 329
14511 Participatory Culture and Value Perception Amongst the Korean and Chinese Drama International Fandom

Authors: Patricia P. M. C. Lourenco, Javier Bringué Sala, Anaisa D. A. de Sena

Abstract:

Almost everyone in Dramaland knows the names of big Korean stars that grace their computer screens on a roll through social media and video streaming platforms that enable awareness of Korean dramas and lifestyle at a click. A surface culture instilled with notions of belonging has redefined the meaning of friendship and challenged deep inner values. Not everyone, however, knows Chinese Dramas or their stars, which is a consequence of Dramaland's focus on Korean dramas and promoting the Korean experience. Despite a parity in terms of production quality, star power, scripts and compelling visual settings, Chinese Dramas have been playing catch up to their famous counterparts. While they might have a strong competitive soft power for international drama fans, the soft power of Korean dramas is imbued with substantial societal values that they want to share with others. Those values are portrayed in an artistic way that connects with audiences who experience loneliness in the non-virtual world contrary to the way Chinese Dramas are perceived.

Keywords: Chinese dramas, fandom, Korean dramas, participatory culture, value perception, soft power, surface culture

Procedia PDF Downloads 140
14510 Reconstruction of Performace-Based Budgeting in Indonesian Local Government: Application of Soft Systems Methodology in Producing Guideline for Policy Implementation

Authors: Deddi Nordiawan

Abstract:

Effective public policy creation required a strong budget system, both in terms of design and implementation. Performance-based Budget is an evolutionary approach with two substantial characteristics; first, the strong integration between budgeting and planning, and second, its existence as guidance so that all activities and expenditures refer to measurable performance targets. There are four processes in the government that should be followed in order to make the budget become performance-based. These four processes consist of the preparation of a vision according to the bold aspiration, the formulation of outcome, the determination of output based on the analysis of organizational resources, and the formulation of Value Creation Map that contains a series of programs and activities. This is consistent with the concept of logic model which revealed that the budget performance should be placed within a relational framework of resources, activities, outputs, outcomes and impacts. Through the issuance of Law 17/2003 regarding State Finance, local governments in Indonesia have to implement performance-based budget. Central Government then issued Government Regulation 58/2005 which contains the detail guidelines how to prepare local governments budget. After a decade, implementation of performance budgeting in local government is still not fully meet expectations, though the guidance is completed, socialization routinely performed, and trainings have also been carried out at all levels. Accordingly, this study views the practice of performance-based budget at local governments as a problematic situation. This condition must be approached with a system approach that allows the solutions from many point of views. Based on the fact that the infrastructure of budgeting has already settled, the study then considering the situation as complexity. Therefore, the intervention needs to be done in the area of human activity system. Using Soft Systems Methodology, this research will reconstruct the process of performance-based budget at local governments is area of human activity system. Through conceptual models, this study will invite all actors (central government, local government, and the parliament) for dialogue and formulate interventions in human activity systems that systematically desirable and culturally feasible. The result will direct central government in revise the guidance to local government budgeting process as well as a reference to build the capacity building strategy.

Keywords: soft systems methodology, performance-based budgeting, Indonesia, public policy

Procedia PDF Downloads 218
14509 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 217
14508 Knowledge and Skills Requirements for Software Developer Students

Authors: J. Liebenberg, M. Huisman, E. Mentz

Abstract:

It is widely acknowledged that there is a shortage of software developers, not only in South Africa, but also worldwide. Despite reports on a gap between industry needs and software education, the gap has mostly been explored in quantitative studies. This paper reports on the qualitative data of a mixed method study of the perceptions of professional software developers regarding what topics they learned from their formal education and the importance of these topics to their actual work. The analysis suggests that there is a gap between industry’s needs and software development education and the following recommendations are made: 1) Real-life projects must be included in students’ education; 2) Soft skills and business skills must be included in curricula; 3) Universities must keep the curriculum up to date; 4) Software development education must be made accessible to a diverse range of students.

Keywords: software development education, software industry, IT workforce, computing curricula

Procedia PDF Downloads 439
14507 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 295
14506 Run-Time Customisation of Soft-Core CPUs on Field Programmable Gate Array

Authors: Rehab Abdullah Shendi

Abstract:

The use of customised soft-core processors in which instructions can be integrated into a system in application hardware is increasing in the Field Programmable Gate Array (FPGA) field. Specifically, the partial run-time reconfiguration of FPGAs in specialised processors for a particular domain can be very beneficial. In this report, the design and implementation for the customisation of a soft-core MIPS processor using an FPGA and partial reconfiguration (PR) of FPGA technology will be addressed to achieve efficient resource use. This can be achieved using a PR design flow that helps the design fit into a smaller device. Moreover, the impact of static power consumption could be reduced due to runtime reconfiguration. This will be done by configurable custom instructions implemented in the hardware as an extension on the MIPS CPU. The aim of this project is to investigate the PR of FPGAs for run-time adaptations of the instruction set of a soft-core CPU, including the integration of custom instructions and the exploration of the potential to use the MultiBoot feature available in Xilinx FPGAs to carry out the PR process. The system will be evaluated and tested on a Nexus 3 development board featuring a Xilinx Spartran-6 FPGA. The system will be able to load reconfigurable custom instructions dynamically into user programs with the help of the trap handler when the custom instruction is called by the MIPS CPU. The results of this experiment demonstrate that custom instructions in hardware can speed up a certain function and many instructions can be saved when compared to a software implementation of the same function. Implementing custom instructions in hardware is perfectly possible and worth exploring.

Keywords: customisation, FPGA, MIPS, partial reconfiguration, PR

Procedia PDF Downloads 242
14505 Protecting Physicochemical Properties of Black Cumin Seed (Nigella sativa) Oil and Developing Value Added Products

Authors: Zeliha Ustun, Mustafa Ersoz

Abstract:

In the study, a traditional herbal supplement black cumin seed (Nigella sativa) oil properties has been studied to protect the main quality parameters by a new supplement application. Black cumin seed and its oil is used as a dietary supplement and preferred traditional remedy in Africa, Asia and Middle East for centuries. Now it has been consuming by millions of people in America and Europe as natural supplements and/or phytotherapeutic agents to support immune system, asthma, allergic rinnitis etc. by the scientists’ advices. With the study, it is aimed to prove that soft gelatin capsules are a new and more practical way of usage for Nigella sativa oil that has a longer stability. With the study soft gelatin capsules formulation has been developed to protect cold pressed black cumin seed oil physicochemical properties for a longer period. The product design has been developed in laboratory and implemented in pilot scale soft gelatin capsule manufacturing. Physicochemical properties (peroxide value, free fatty acids, fatty acid composition, refractive index, iodine value, saponification value, unsaponifiable matters) of Nigella sativa oil soft gelatin capsules and Nigella sativa oil in liquid form in amber glass bottles have been compared and followed for 8 months. The main parameters for capsules and liquid form found that for free fatty acids 2.29±0.03, 3.92±0.11 % oleic acid, peroxide 23.11±1.18, 27.85±2.50 meqO2/kg, refractive index at 20 0C 1.4738±0.00, 1.4737±0.00, soap 0 ppm, moisture and volatility 0.32±0.01, 0.36±0.01 %, iodine value 123.00±0.00, 122.00±0.00 wijs, saponification value 196.25±0.46, 194.13±0.35 mg KOH/g and unsaponifiable matter 7.72±0.13, 6.88±0.36 g/kg respectively. The main fatty acids are found that linoleic acid 56.17%, oleic acid 24.64%, palmitic acid 11,94 %. As a result, it is found that cold pressed Nigella sativa oil soft gelatin capsules physicochemical properties are more stable than the Nigella sativa oil stored in glass bottles.

Keywords: black cumin seed (Nigella sativa) oil, cold press, nutritional supplements, soft gelatin capsule

Procedia PDF Downloads 343
14504 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network

Authors: Ziying Wu, Danfeng Yan

Abstract:

Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.

Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network

Procedia PDF Downloads 83
14503 Comparative Study of the Effect of Three Fungicides: Tilt and Artea Amistarxtra about Growing Wheat, Hard, and Soft and Their Impact on Grain Yield and Its Components in the Semi-Arid Zone of Setif

Authors: Cheniti Khalissa, Dekhili Mohamed

Abstract:

Several fungal diseases may infect hard and soft wheat, which directly affect the yield and thus the economy of the homeland. So, a treatment fungicide is one of means of diseases control. In this context, we studied two varieties of wheat; Waha for soft wheat and Hidhab for hard wheat, at the level of the Technical Institute of crops (ITGC) in the wilaya of Setif under semi-arid conditions. This study consists of a successive application of three fungicides (Tilt, Artea, and Armistarxtra) according to three treatments (T1, T2, and T3) in addition to the witness (T0) at different stages of plant development (respectively, Montaison, earing and after flowering) whose purpose is to test and determine the effectiveness of these products used sequentially. The study showed good efficacy when we use the sum of these pesticides The comparison between these different treatments indicates that the T3 treatment reduced yield losses significantly; which is evident in the main yield components such as fertility, grain yield and weight of 1000 grains. The various components of yield and final yield are all parameters to be taken into account in such a study. In general, the fungal treatment is an effective way of improving profitability. In general, the fungal treatment is an effective way of improving profitability and positioning interventions in time is one of the requirements for an appreciable efficiency.

Keywords: hard wheat, soft wheat, diseases, fungicide treatment, fertility, 1000-grain weight, semi-arid zone

Procedia PDF Downloads 378
14502 Virtualizing Attendance and Reducing Impacts on the Environment with a Mobile Application

Authors: Paulo R. M. Andrade, Adriano B. Albuquerque, Otávio F. Frota, Robson V. Silveira, Fátima A. da Silva

Abstract:

Information technology has been gaining more and more space whether in industry, commerce or even for personal use, but the misuse of it brings harm to the environment and human health as a result. Contribute to the sustainability of the planet is to compensate the environment, all or part of what withdraws it. The green computing also came to propose practical for use in IT in an environmentally correct way in aid of strategic management and communication. This work focuses on showing how a mobile application can help businesses reduce costs and reduced environmental impacts caused by its processes, through a case study of a public company in Brazil.

Keywords: green computing, information technology, e-government, sustainable development, mobile computing

Procedia PDF Downloads 391
14501 Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet

Authors: Gurkirat Kaur, Manoj Kumar, Manju Bala

Abstract:

Ethernet is the most influential and widely used technology in the world. With the growing demand of low latency and high throughput technologies like InfiniBand and RoCE, unique features viz. RDMA (Remote Direct Memory Access) have evolved. RDMA is an effective technology which is used for reducing system load and improving performance. InfiniBand is a well known technology which provides high-bandwidth and low-latency and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy protocol to the Ethernet a new networking technology is evolved, called RDMA over Converged Ethernet (RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand’s efficient transport to provide the platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast interconnects i.e. gigabit Ethernet and Soft RoCE. This paper presents the heterogeneous Linux cluster configuration and evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is performing better than Ethernet in various performance metrics like bandwidth, latency and throughput.

Keywords: ethernet, InfiniBand, RoCE, RDMA, MPI, Soft RoCE

Procedia PDF Downloads 437
14500 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 339
14499 Soft Skills: Expectations and Needs in Tourism

Authors: Susana Silva, Dora Martins

Abstract:

The recent political, economic, social technological and employment changes significantly affect the tourism organizations and consequently the changing nature of the employment experience of the tourism workforce. Such scene leads several researchers and labor analysts to reflect about what kinds of jobs, knowledge and competences are need to ensure the success to teach, to learning and to work on this sector. In recent years the competency-based approach in high education level has become of significant interest. On the one hand, this approach could leads to the forming of the key students’ competences which contribute their better preparation to the professional future and on the other hand could answer better to practical demands from tourism job market. The goals of this paper are (1) to understand the expectations of university tourism students in relation to the present and future tourism competences demands, (2) to identify the importance put on the soft skills, (3) to know the importance of high qualification to their future professional activity and (4) to explore the students perception about present and future tourist sector specificities. To this proposal, a questionnaire was designed and distributed to every students who participate on classes of Hospitality Management under degree and master from one public Portuguese university. All participants were invited, during December 2014 and September 2015, to answer the questionnaire at the moment and on presence of one researcher of this study. Fulfilled the questionnaire 202 students (72, 35,6% male and 130, 64.4% female), the mean age was 21,64 (SD=5,27), 91% (n=86) were undergraduate and 18 (9%) were master students. 80% (n=162) of our participants refers as a possibility to look for a job outside the country.42% (n=85) prefers to work in a medium-sized tourism units (with 50-249 employees). According to our participants the most valued skills in tourism are the domain of foreign languages (87.6%, n=177), the ability to work as a team (85%), the personal persistence (83%, n=168), the knowledge of the product/services provided (73.8%, n=149), and assertiveness (66.3%, n=134). 65% (n=131) refers the availability to look for a job in a home distance of 1000 kilometers and 59% (n=119) do not consider the possibility to work in another area than tourism. From the results of this study we are in the position of confirming the need for universities to maintain a better link with the professional tourism companies and to rethink some competences into their learning course model. Based on our results students, universities and companies could understand more deeply the motivations, expectations and competences need to build the future career who study and work on the tourism sector.

Keywords: human capital, employability, students’ competencies perceptions, soft skills, tourism

Procedia PDF Downloads 238
14498 The Curvature of Bending Analysis and Motion of Soft Robotic Fingers by Full 3D Printing with MC-Cells Technique for Hand Rehabilitation

Authors: Chaiyawat Musikapan, Ratchatin Chancharoen, Saknan Bongsebandhu-Phubhakdi

Abstract:

For many recent years, soft robotic fingers were used for supporting the patients who had survived the neurological diseases that resulted in muscular disorders and neural network damages, such as stroke and Parkinson’s disease, and inflammatory symptoms such as De Quervain and trigger finger. Generally, the major hand function is significant to manipulate objects in activities of daily living (ADL). In this work, we proposed the model of soft actuator that manufactured by full 3D printing without the molding process and one material for use. Furthermore, we designed the model with a technique of multi cavitation cells (MC-Cells). Then, we demonstrated the curvature bending, fluidic pressure and force that generated to the model for assistive finger flexor and hand grasping. Also, the soft actuators were characterized in mathematics solving by the length of chord and arc length. In addition, we used an adaptive push-button switch machine to measure the force in our experiment. Consequently, we evaluated biomechanics efficiency by the range of motion (ROM) that affected to metacarpophalangeal joint (MCP), proximal interphalangeal joint (PIP) and distal interphalangeal joint (DIP). Finally, the model achieved to exhibit the corresponding fluidic pressure with force and ROM to assist the finger flexor and hand grasping.

Keywords: biomechanics efficiency, curvature bending, hand functional assistance, multi cavitation cells (MC-Cells), range of motion (ROM)

Procedia PDF Downloads 210
14497 Identification and Characterization of Enterobacter cloacae, New Soft Rot Causing Pathogen of Radish in India

Authors: B. S. Chandrashekar, M. K. Prasannakumar, P. Buela Parivallal, Sahana N. Banakar, Swathi S. Patil, H. B. Mahesh, D. Pramesh

Abstract:

Bacterial soft rot is one of the most often seen diseases in many plant species globally, resulting in considerable yield loss. Radish roots with dark water-soaked lesions, maceration of tissue, and a foul odour were collected in the Kolar region, India. Two isolates were obtained from rotted samples that demonstrated morphologically unpigmented, white mucoid convex colonies on nutrient agar medium. The isolated bacteria (RDH1 and RDH3) were gram-negative, rod-shaped bacteria with biochemically distinct characteristics similar to the type culture of Enterobacter cloacae ATCC13047 and Bergy's handbook of determinative bacteriology. The 16s rRNA gene was used to identify Enterobacter species. On carrot, potato, tomato, chilli, bell pepper, knolkhol, cauliflower, cabbage, and cucumber slices, the Koch′s postulates were fulfilled, and the pathogen was also pathogenic on radish, cauliflower, and cabbage seedlings were grown in a glasshouse. After 36 hours, both isolates exhibited a hypersensitive sensitivity to Nicotianatabacum. Semi-quantitative analysis revealed that cell wall degrading enzymes (CWDEs) such as pectin lyase, polygalacturonase, and cellulase (p=1.4e09) contributed to pathogenicity, whereas isolates produced biofilms (p=4.3e-11) that help in host adhesion. This is the first report in India of radish soft rot caused by E. cloacae.

Keywords: soft rot, enterobacter cloacae, 16S rRNA, nicotiana tabacum, and pathogenicity

Procedia PDF Downloads 101
14496 Implementing a Neural Network on a Low-Power and Mobile Cluster to Aide Drivers with Predictive AI for Traffic Behavior

Authors: Christopher Lama, Alix Rieser, Aleksandra Molchanova, Charles Thangaraj

Abstract:

New technologies like Tesla’s Dojo have made high-performance embedded computing more available. Although automobile computing has developed and benefited enormously from these more recent technologies, the costs are still high, prohibitively high in some cases for broader adaptation, particularly for the after-market and enthusiast markets. This project aims to implement a Raspberry Pi-based low-power (under one hundred Watts) highly mobile computing cluster for a neural network. The computing cluster built from off-the-shelf components is more affordable and, therefore, makes wider adoption possible. The paper describes the design of the neural network, Raspberry Pi-based cluster, and applications the cluster will run. The neural network will use input data from sensors and cameras to project a live view of the road state as the user drives. The neural network will be trained to predict traffic behavior and generate warnings when potentially dangerous situations are predicted. The significant outcomes of this study will be two folds, firstly, to implement and test the low-cost cluster, and secondly, to ascertain the effectiveness of the predictive AI implemented on the cluster.

Keywords: CS pedagogy, student research, cluster computing, machine learning

Procedia PDF Downloads 68
14495 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 129
14494 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 395
14493 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures

Authors: Silvina Caíno-Lores, Jesús Carretero

Abstract:

Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.

Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing

Procedia PDF Downloads 233
14492 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model

Procedia PDF Downloads 139
14491 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 164
14490 Utilizing Grid Computing to Enhance Power Systems Performance

Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima

Abstract:

Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.

Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting

Procedia PDF Downloads 450
14489 Control of Indoor Carbon through Soft Approaches in Himachal Pradesh, India

Authors: Kopal Verma, Umesh C. Kulshrestha

Abstract:

The mountainous regions are very crucial for a country because of their importance for weather, water supply, forests, and various other socio-economic benefits. But the increasing population and its demand for energy and infrastructure have contributed very high loadings of air pollution. Various activities such as cooking, heating, manufacturing, transport, etc. contribute various particulate and gaseous pollutants in the atmosphere. This study was focused upon indoor air pollution and was carried out in four rural households of the Baggi village located in the Hamirpur District of the Himachal Pradesh state. The residents of Baggi village use biomass as fuel for cooking on traditional stove (Chullah). The biomass types include wood (mainly Beul, Grewia Optiva), crop residue and dung cakes. This study aimed to determine the organic carbon (OC), elemental carbon (EC), major cations and anions in the indoor air of each household. During non-cooking hours, it was found that the indoor air contained OC and EC as low as 21µg/m³ and 17µg/m³ respectively. But during cooking hours (with biomass burning), the levels of OC and EC were raised significantly by 91.2% and 85.4% respectively. Then the residents were advised to switch over as per our soft approach options. In the first approach change, they were asked to prepare the meal partially on Chullah using biomass and partially with liquefied petroleum gas (LPG). By doing this change, a considerable reduction in OC (53.1%) and in EC (41.8%) was noticed. The second change of approach included the cooking of entire meal by using LPG. This resulted in the reduction of OC (84.1%) and EC (73.3%) as compared to the values obtained during cooking entirely with biomass. The carbonaceous aerosol levels were higher in the morning hours than in the evening hours because of more biomass burning activity in the morning. According to a general survey done with the residents, the study provided them an awareness about the air pollution and the harmful effects of biomass burning. Some of them correlated their ailments like weakened eyesight, fatigue and respiratory problems with indoor air pollution. This study demonstrated that by replacing biomass with clean fuel such as LPG, the indoor concentrations of EC and OC can be reduced substantially.

Keywords: biomass burning, carbonaceous aerosol, elemental carbon, organic carbon, LPG

Procedia PDF Downloads 99
14488 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 311
14487 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 382
14486 A New Prediction Model for Soil Compression Index

Authors: D. Mohammadzadeh S., J. Bolouri Bazaz

Abstract:

This paper presents a new prediction model for compression index of fine-grained soils using multi-gene genetic programming (MGGP) technique. The proposed model relates the soil compression index to its liquid limit, plastic limit and void ratio. Several laboratory test results for fine-grained were used to develop the models. Various criteria were considered to check the validity of the model. The parametric and sensitivity analyses were performed and discussed. The MGGP method was found to be very effective for predicting the soil compression index. A comparative study was further performed to prove the superiority of the MGGP model to the existing soft computing and traditional empirical equations.

Keywords: new prediction model, compression index soil, multi-gene genetic programming, MGGP

Procedia PDF Downloads 344
14485 Comprehensive Study of X-Ray Emission by APF Plasma Focus Device

Authors: M. Habibi

Abstract:

The time-resolved studies of soft and hard X-ray were carried out over a wide range of argon pressures by employing an array of eight filtered photo PIN diodes and a scintillation detector, simultaneously. In 50% of the discharges, the soft X-ray is seen to be emitted in short multiple pulses corresponding to different compression, whereas it is a single pulse for hard X-rays corresponding to only the first strong compression. It should be stated that multiple compressions dominantly occur at low pressures and high pressures are mostly in the single compression regime. In 43% of the discharges, at all pressures except for optimum pressure, the first period is characterized by two or more sharp peaks.The X–ray signal intensity during the second and subsequent compressions is much smaller than the first compression.

Keywords: plasma focus device, SXR, HXR, Pin-diode, argon plasma

Procedia PDF Downloads 384
14484 Deflection Behaviour of Retaining Wall with Pile for Pipeline on Slope of Soft Soil

Authors: Mutadi

Abstract:

Pipes laying on an unstable slope of soft soil are prone to movement. Pipelines that are buried in unstable slope areas will move due to lateral loads from soil movement, which can cause damage to the pipeline. A small-scale laboratory model of the reinforcement system of piles supported by retaining walls was conducted to investigate the effect of lateral load on the reinforcement. In this experiment, the lateral forces of 0.3 kN, 0.35 kN, and 0.4 kN and vertical force of 0.05 kN, 0.1 kN, and 0.15 kN were used. Lateral load from the electric jack is equipped with load cell and vertical load using the cement-steel box. To validate the experimental result, a finite element program named 2-D Plaxis was used. The experimental results showed that with an increase in lateral loading, the displacement of the reinforcement system increased. For a Vertical Load, 0.1 kN and versus a lateral load of 0.3 kN causes a horizontal displacement of 0.35 mm and an increase of 2.94% for loading of 0.35 kN and an increase of 8.82% for loading 0.4 kN. The pattern is the same in the finite element method analysis, where there was a 6.52% increase for 0.35 kN loading and an increase to 23.91 % for 0.4 kN loading. In the same Load, the Reinforcement System is reliable, as shown in Safety Factor on dry conditions were 3.3, 2.824 and 2.474, and on wet conditions were 2.98, 2.522 and 2.235.

Keywords: soft soil, deflection, wall, pipeline

Procedia PDF Downloads 138