Search results for: soft computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1910

Search results for: soft computing

1610 Assessment of Different Industrial Wastewater Quality in the Most Common Industries in Kuwait

Authors: Mariam Aljumaa

Abstract:

Industrial wastewater has been increased rapidly in the last decades, however, the generated wastewater is not treated properly on site before transfer it to the treatment plant. In this study, the most common industries (dairy, soft drinks, detergent, and petrochemical) has been studied in term of wastewater quality. The main aim of this study is to characterize and evaluate the quality of the most common industrial wastewater in Kuwait. Industrial wastewater samples were collected from detergents, dairy, beverage, and petrochemical factories. The collected wastewater samples were analyzed for temperature, EC, pH, DO, BOD, COD, TOC, TS, TSS, volatile suspended solids (VSS), total volatile solids (TVS), NO2, NO3, NH3, N, P, K, CaCO3, heavy metals, Total coliform, Fecal coliform, and E.coli bacteria. The results showed that petrochemical industry has the highest concentration of organic and nutrients, followed by detergents wastewater, then dairy, and finally, soft drink wastewater. Regarding the heavy metals, the results showed that dairy wastewater had the highest concentration, specifically in Zinc, Arsenic, and Cadmium. In term of biological analysis, the dairy industry had the highest concentration of total coliform, followed by soft drinks industry, then shampoo industry, and finally petrochemical industry.

Keywords: industrial wastewater, characterization, heavy metals, wastewater quality

Procedia PDF Downloads 86
1609 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 540
1608 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 539
1607 On the Factors Affecting Computing Students’ Awareness of the Latest ICTs

Authors: O. D. Adegbehingbe, S. D. Eyono Obono

Abstract:

The education sector is constantly faced with rapid changes in technologies in terms of ensuring that the curriculum is up to date and in terms of making sure that students are aware of these technological changes. This challenge can be seen as the motivation for this study, which is to examine the factors affecting computing students’ awareness of the latest Information Technologies (ICTs). The aim of this study is divided into two sub-objectives which are: the selection of relevant theories and the design of a conceptual model to support it as well as the empirical testing of the designed model. The first objective is achieved by a review of existing literature on technology adoption theories and models. The second objective is achieved using a survey of computing students in the four universities of the KwaZulu-Natal province of South Africa. Data collected from this survey is analyzed using Statistical package for the Social Science (SPSS) using descriptive statistics, ANOVA and Pearson correlations. The main hypothesis of this study is that there is a relationship between the demographics and the prior conditions of the computing students and their awareness of general ICT trends and of Digital Switch Over (DSO) a new technology which involves the change from analog to digital television broadcasting in order to achieve improved spectrum efficiency. The prior conditions of the computing students that were considered in this study are students’ perceived exposure to career guidance and students’ perceived curriculum currency. The results of this study confirm that gender, ethnicity, and high school computing course affect students’ perceived curriculum currency while high school location affects students’ awareness of DSO. The results of this study also confirm that there is a relationship between students prior conditions and their awareness of general ICT trends and DSO in particular.

Keywords: education, information technologies, IDT, awareness

Procedia PDF Downloads 353
1606 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

Authors: Hyun-Ho Lee, Kee-Won Kim

Abstract:

The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.

Keywords: finite field, Montgomery multiplication, systolic array, cryptography

Procedia PDF Downloads 289
1605 Proposed Solutions Based on Affective Computing

Authors: Diego Adrian Cardenas Jorge, Gerardo Mirando Guisado, Alfredo Barrientos Padilla

Abstract:

A system based on Affective Computing can detect and interpret human information like voice, facial expressions and body movement to detect emotions and execute a corresponding response. This data is important due to the fact that a person can communicate more effectively with emotions than can be possible with words. This information can be processed through technological components like Facial Recognition, Gait Recognition or Gesture Recognition. As of now, solutions proposed using this technology only consider one component at a given moment. This research investigation proposes two solutions based on Affective Computing taking into account more than one component for emotion detection. The proposals reflect the levels of dependency between hardware devices and software, as well as the interaction process between the system and the user which implies the development of scenarios where both proposals will be put to the test in a live environment. Both solutions are to be developed in code by software engineers to prove the feasibility. To validate the impact on society and business interest, interviews with stakeholders are conducted with an investment mind set where each solution is labeled on a scale of 1 through 5, being one a minimum possible investment and 5 the maximum.

Keywords: affective computing, emotions, emotion detection, face recognition, gait recognition

Procedia PDF Downloads 362
1604 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 442
1603 The Effectiveness of Prefabricated Vertical Drains for Accelerating Consolidation of Tunis Soft Soil

Authors: Marwa Ben Khalifa, Zeineb Ben Salem, Wissem Frikha

Abstract:

The purpose of the present work is to study the consolidation behavior of highly compressible Tunis soft soil “TSS” by means of prefabricated vertical drains (PVD’s) associated to preloading based on laboratory and field investigations. In the first hand, the field performance of PVD’s on the layer of Tunis soft soil was analysed based on the case study of the construction of embankments of “Radès la Goulette” bridge project. PVD’s Geosynthetics drains types were installed with triangular grid pattern until 10 m depth associated with step-by-step surcharge. The monitoring of the soil settlement during preloading stage for Radès La Goulette Bridge project was provided by an instrumentation composed by various type of tassometer installed in the soil. The distribution of water pressure was monitored through piezocone penetration. In the second hand, a laboratory reduced tests are performed on TSS subjected also to preloading and improved with PVD's Mebradrain 88 (Mb88) type. A specific test apparatus was designed and manufactured to study the consolidation. Two series of consolidation tests were performed on TSS specimens. The first series included consolidation tests for soil improved by one central drain. In thesecond series, a triangular mesh of three geodrains was used. The evolution of degree of consolidation and measured settlements versus time derived from laboratory tests and field data were presented and discussed. The obtained results have shown that PVD’s have considerably accelerated the consolidation of Tunis soft soil by shortening the drainage path. The model with mesh of three drains gives results more comparative to field one. A longer consolidation time is observed for the cell improved by a single central drain. A comparison with theoretical analysis, basically that of Barron (1948) and Carillo (1942), was presented. It’s found that these theories overestimate the degree of consolidation in the presence of PVD.

Keywords: tunis soft soil, prefabricated vertical drains, acceleration of consolidation, dissipation of excess pore water pressures, radès bridge project, barron and carillo’s theories

Procedia PDF Downloads 120
1602 Vitamin D and Prevention of Rickets in Children

Authors: Mousa Saleh Daoud

Abstract:

Rickets is a condition that affects the development of bones in children. It causes soft bones, which can become bowed or curved, this bending and curvature is evident in the age of Walking. The most common cause of rickets is dietary deficiency of vitamin D or Lack of exposure to sunlight or both together. The link between vitamin D and rickets has been known for many years and is well understood by doctors and scientists. If a child does not get enough of the vitamin D, the bones cannot form hard outer shells. This is why they become soft and weak. This study was conducted on children who reviewed by our medical clinic between the years 2011-2013. The study included 400 children, aged between one and six years. 11 children had clear clinical manifestations of rickets of varying degrees and all of them due to lack of vitamin D except for one case of rickets resistant to vitamin D. 389 cases ranged between natural and deficiency in vitamin D without clinical manifestations of Rickets.

Keywords: rickts, bone metabolic diseases, vitamin D, child

Procedia PDF Downloads 405
1601 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 185
1600 Determination of Activation Energy for Thermal Decomposition of Selected Soft Tissues Components

Authors: M. Ekiert, T. Uhl, A. Mlyniec

Abstract:

Tendons are the biological soft tissue structures composed of collagen, proteoglycan, glycoproteins, water and cells of extracellular matrix (ECM). Tendons, which primary function is to transfer force generated by the muscles to the bones causing joints movement, are exposed to many micro and macro damages. In fact, tendons and ligaments trauma are one of the most numerous injuries of human musculoskeletal system, causing for many people (particularly for athletes and physically active people), recurring disorders, chronic pain or even inability of movement. The number of tendons reconstruction and transplantation procedures is increasing every year. Therefore, studies on soft tissues storage conditions (influencing i.e. tissue aging) seem to be an extremely important issue. In this study, an atomic-scale investigation on the kinetics of decomposition of two selected tendon components – collagen type I (which forms a 60-85% of a tendon dry mass) and elastin protein (which combine with ECM creates elastic fibers of connective tissues) is presented. A molecular model of collagen and elastin was developed based on crystal structure of triple-helical collagen-like 1QSU peptide and P15502 human elastin protein, respectively. Each model employed 4 linear strands collagen/elastin strands per unit cell, distributed in 2x2 matrix arrangement, placed in simulation box filled with water molecules. A decomposition phenomena was simulated with molecular dynamics (MD) method using ReaxFF force field and periodic boundary conditions. A set of NVT-MD runs was performed for 1000K temperature range in order to obtained temperature-depended rate of production of decomposition by-products. Based on calculated reaction rates activation energies and pre-exponential factors, required to formulate Arrhenius equations describing kinetics of decomposition of tested soft tissue components, were calculated. Moreover, by adjusting a model developed for collagen, system scalability and correct implementation of the periodic boundary conditions were evaluated. An obtained results provide a deeper insight into decomposition of selected tendon components. A developed methodology may also be easily transferred to other connective tissue elements and therefore might be used for further studies on soft tissues aging.

Keywords: decomposition, molecular dynamics, soft tissue, tendons

Procedia PDF Downloads 206
1599 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 276
1598 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 386
1597 Analysis and Performance of Handover in Universal Mobile Telecommunications System (UMTS) Network Using OPNET Modeller

Authors: Latif Adnane, Benaatou Wafa, Pla Vicent

Abstract:

Handover is of great significance to achieve seamless connectivity in wireless networks. This paper gives an impression of the main factors which are being affected by the soft and the hard handovers techniques. To know and understand the handover process in The Universal Mobile Telecommunications System (UMTS) network, different statistics are calculated. This paper focuses on the quality of service (QoS) of soft and hard handover in UMTS network, which includes the analysis of received power, signal to noise radio, throughput, delay traffic, traffic received, delay, total transmit load, end to end delay and upload response time using OPNET simulator.

Keywords: handover, UMTS, mobility, simulation, OPNET modeler

Procedia PDF Downloads 312
1596 A Performance Analysis Study for Cloud Based ERP Systems

Authors: Burak Erkayman

Abstract:

The manufacturing and service organizations are in the need of using ERP systems to integrate many functions from purchasing to storage, production planning to calculation of costs. Using ERP systems by the integration in the level of information provides companies remarkable advantages in terms of profitability, productivity and efficiency in processes. Cloud computing is one of the most significant changes in information and communication technology. The developments in Cloud Computing attract business world to take advantage of this field. Cloud Computing means much more storage area, more cost saving and faster data transfer rate. In addition to these, it presents new business models, new field of study and practicable solutions for anyone’s use. These developments make inevitable the implementation of ERP systems to cloud environment. In this study, the performance of ERP systems in cloud environment is analyzed through various performance criteria and a comparison between traditional and cloud-ERP systems is presented. At the end of study the transformation and the future of ERP systems is discussed.

Keywords: cloud-ERP, ERP system performance, information system transformation

Procedia PDF Downloads 525
1595 Fragility Analysis of a Soft First-Story Building in Mexico City

Authors: Rene Jimenez, Sonia E. Ruiz, Miguel A. Orellana

Abstract:

On 09/19/2017, a Mw = 7.1 intraslab earthquake occurred in Mexico causing the collapse of about 40 buildings. Many of these were 5- or 6-story buildings with soft first story; so, it is desirable to perform a structural fragility analysis of typical structures representative of those buildings and to propose a reliable structural solution. Here, a typical 5-story building constituted by regular R/C moment-resisting frames in the first story and confined masonry walls in the upper levels, similar to the collapsed structures on the 09/19/2017 Mexico earthquake, is analyzed. Three different structural solutions of the 5-story building are considered: S1) it is designed in accordance with the Mexico City Building Code-2004; S2) then, the column dimensions of the first story corresponding to S1 are reduced, and S3) viscous dampers are added at the first story of solution S2. A number of dynamic incremental analyses are performed for each structural solution, using a 3D structural model. The hysteretic behavior model of the masonry was calibrated with experiments performed at the Laboratory of Structures at UNAM. Ten seismic ground motions are used to excite the structures; they correspond to ground motions recorded in intermediate soil of Mexico City with a dominant period around 1s, where the structures are located. The fragility curves of the buildings are obtained for different values of the maximum inter-story drift demands. Results show that solutions S1 and S3 give place to similar probabilities of exceedance of a given value of inter-story drift for the same seismic intensity, and that solution S2 presents a higher probability of exceedance for the same seismic intensity and inter-story drift demand. Therefore, it is concluded that solution S3 (which corresponds to the building with soft first story and energy dissipation devices) can be a reliable solution from the structural point of view.

Keywords: demand hazard analysis, fragility curves, incremental dynamic analyzes, soft-first story, structural capacity

Procedia PDF Downloads 171
1594 Reconfigurable Ubiquitous Computing Infrastructure for Load Balancing

Authors: Khaled Sellami, Lynda Sellami, Pierre F. Tiako

Abstract:

Ubiquitous computing helps make data and services available to users anytime and anywhere. This makes the cooperation of devices a crucial need. In return, such cooperation causes an overload of the devices and/or networks, resulting in network malfunction and suspension of its activities. Our goal in this paper is to propose an approach of devices reconfiguration in order to help to reduce the energy consumption in ubiquitous environments. The idea is that when high-energy consumption is detected, we proceed to a change in component distribution on the devices to reduce and/or balance the energy consumption. We also investigate the possibility to detect high-energy consumption of devices/network based on devices abilities. As a result, our idea realizes a reconfiguration of devices aimed at reducing the consumption of energy and/or load balancing in ubiquitous environments.

Keywords: ubiquitous computing, load balancing, device energy consumption, reconfiguration

Procedia PDF Downloads 269
1593 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 420
1592 Biomechanical Prediction of Veins and Soft Tissues beneath Compression Stockings Using Fluid-Solid Interaction Model

Authors: Chongyang Ye, Rong Liu

Abstract:

Elastic compression stockings (ECSs) have been widely applied in prophylaxis and treatment of chronic venous insufficiency of lower extremities. The medical function of ECS is to improve venous return and increase muscular pumping action to facilitate blood circulation, which is largely determined by the complex interaction between the ECS and lower limb tissues. Understanding the mechanical transmission of ECS along the skin surface, deeper tissues, and vascular system is essential to assess the effectiveness of the ECSs. In this study, a three-dimensional (3D) finite element (FE) model of the leg-ECS system integrated with a 3D fluid-solid interaction (FSI) model of the leg-vein system was constructed to analyze the biomechanical properties of veins and soft tissues under different ECS compression. The Magnetic Resonance Imaging (MRI) of the human leg was divided into three regions, including soft tissues, bones (tibia and fibula) and veins (peroneal vein, great saphenous vein, and small saphenous vein). The ECSs with pressure ranges from 15 to 26 mmHg (Classes I and II) were adopted in the developed FE-FSI model. The soft tissue was assumed as a Neo-Hookean hyperelastic model with the fixed bones, and the ECSs were regarded as an orthotropic elastic shell. The interfacial pressure and stress transmission were simulated by the FE model, and venous hemodynamics properties were simulated by the FSI model. The experimental validation indicated that the simulated interfacial pressure distributions were in accordance with the pressure measurement results. The developed model can be used to predict interfacial pressure, stress transmission, and venous hemodynamics exerted by ECSs and optimize the structure and materials properties of ECSs design, thus improving the efficiency of compression therapy.

Keywords: elastic compression stockings, fluid-solid interaction, tissue and vein properties, prediction

Procedia PDF Downloads 110
1591 Isolation, Characterization and Application of Bacteriophages on the Biocontrol of Listeria monocytogenes in Soft Cheese

Authors: Vinicius Buccelli Ribeiro, Maria Teresa Destro, Mariza Landgraf

Abstract:

Bacteriophages are one of the most abundant replicating entities on Earth and can be found everywhere in which their hosts live and there are reports regarding isolation from different niches such as soil and foods. Since studies are moving forward with regard to biotechnology area, different research projects are being performed focusing on the phage technology and its use by the food industry. This study aimed to evaluate a cocktail (LP501) of phages isolated in Brazil for its lytic potential against Listeria monocytogenes. Three bacteriophages (LP05, LP12 and LP20) were isolated from soil samples and all of them showed 100% lysis against a panel of 10 L. monocytogenes strains representing different serotypes of this pathogen. A mix of L. monocytogenes 1/2a and 4b were inoculated in soft cheeses (approximately 105 cfu/cm2) with the phage cocktail added thereafter (1 x 109 PFU/cm2). Samples were analyzed immediately and then stored at 10°C for ten days. At 30 min post-infection, the cocktail reduced L. monocytogenes counts approximately 1.5 logs, compared to controls without bacteriophage. The treatment produced a statistically significant decrease in the counts of viable cells (p < 0.05) and in all assays performed we observed a decrease of up to 4 logs of L. monocytogenes. This study will make available to the international community behavioral and molecular data regarding bacteriophages present in soil samples in Brazil. Furthermore, there is the possibility to apply this new cocktail of phages in different food products to combat L. monocytogenes.

Keywords: bacteriophages, biocontrol, listeria monocytogenes, soft cheese

Procedia PDF Downloads 355
1590 The Use of Smartphones as a News Resource by Female University Students in the UAE

Authors: Mahinaz Saad

Abstract:

Little empirical data exists regarding smartphone usage for news consumption in the UAE, and no previous research explored undergraduate female university students’ usage of smartphones. This represents a gap in the professional literature and makes it an important area to examine. Uses and Gratifications theory is used to study the motivations of consumers for adopting a particular type of communication tool. This theory is an audience-centred approach to understanding mass communication that assumes audiences are active consumers of media and explains why and how people seek out specific media to satisfy needs. This theory is particularly relevant given the rapid development of new communication technologies. Situated within this theoretical framework, this study utilised a quantitative research design to explore respondents’ (N=488) how and why respondents use their smartphones. Further, this study explored the relationship between mobile news use and the use of other mediums for news access and how different gratifications predict mobile hard news use and mobile soft news use. Results revealed that smartphones often replace traditional media as a news source and have become students’ primary source of news. Results also revealed that different gratifications can be used as a predictor of mobile hard news and soft news and that most students use their smartphones to access soft news. These results are fundamental in allowing us to predict possible future trends relating to news consumption in the UAE and the myriad ways in which the media landscape is changing.

Keywords: uses and gratifications, smartphones, university students, news consumption

Procedia PDF Downloads 137
1589 Accelerating the Uptake of Smart City Applications through Cloud Computing

Authors: Panagiotis Tsarchopoulos, Nicos Komninos, Christina Kakderi

Abstract:

Smart cities are high on the political agenda around the globe. However, planning smart cities and deploying applications dealing with the complex problems of the urban environment is a very challenging task that is difficult to be undertaken solely by the cities. We argue that the uptake of smart city strategies is facilitated, first, through the development of smart city application repositories allowing re-use of already developed and tested software, and, second, through cloud computing which disengages city authorities from any resource constraints, technical or financial, and has a higher impact and greater effect at the city level The combination of these two solutions allows city governments and municipalities to select and deploy a large number of applications dedicated to different city functions, which collectively could create a multiplier effect with a greater impact on the urban environment.

Keywords: smart cities, applications, cloud computing, migration to the cloud, application repositories

Procedia PDF Downloads 346
1588 Bonding Characteristics Between FRP and Concrete Substrates

Authors: Houssam A. Toutanji, Meng Han

Abstract:

This study focuses on the development of a fracture mechanics based-model that predicts the debonding behavior of FRP strengthened RC beams. In this study, a database includes 351 concrete prisms bonded with FRP plates tested in single and double shear were prepared. The existing fracture-mechanics-based models are applied to this database. Unfortunately the properties of adhesive layer, especially a soft adhesive layer, used on the specimens in the existing studies were not always able to found. Thus, the new model’s proposal was based on fifteen newly conducted pullout tests and twenty four data selected from two independent existing studies with the application of a soft adhesive layers and the availability of adhesive properties.

Keywords: carbon fiber composite materials, interface response, fracture characteristics, maximum shear stress, ultimate transferable load

Procedia PDF Downloads 258
1587 Properties Soft Cheese as Diversification of Dangke: A Natural Cheese of South Sulawesi Indonesia

Authors: Ratmawati Malaka, Effendi Abustam, Kusumandari Indah Prahesti, Sudirman Baco

Abstract:

Dangke is natural cheese from Enrekang South Sulawesi, Indonesia produced through aglutination buffalo milk, cow, goat or sheep using the sap of papaya (Carica papaya). Dangke has been widely known in South Sulawesi but this soft cheese product diversification by using passion fruit juice as milk clotting agents has not been used. Passion fruit juice has a high acidity with a pH of around 4 - 4.5 and has a proteolytic enzyme, so that it can be used to agglutinate milk. The purpose of this study was to investigate the nature Dangke using passion fruit juice as coagulate milk. Dangke made by 10 lt of raw milk by heating at a temperature of 73oC with coagulant passion fruit juice (7.5% and 10%), and added 1% salt. Curd clot and then be formed using a coconut shell, is then pressed until the cheese is compact. The cheese is then observed for 28 days ripening at a temperature of about 5 ° C. Dangke then studied to violence, pH, fat levels and microstructure. Hardness is determined using CD-shear Force, pH is measured using a pH meter Hanna, and fat concentrations were analyzed with methods of proximate. Microstructure viewed using a light microscope with magnification 1000 x. The results showed that the levels of clotting material very significant influence on hardness, pH, and lipid levels. Maturation increase the hardness but lower the pH, the level of fat soft cheese with an average Dangke respectively 21.4% and 30.5% on 7.5% addition of passion fruit juice and 10%. Dangke violence is increasing with the increasing maturation time (1.38 to 3.73 kg / cm), but Dangke pH was decreased by the increase in storage maturation (5.34 to 4.1). Microktrukture cheeses coagulated with 10% of the passion fruit are very firmer and compact with a full globular fat of 7.5%. But the sensory properties of the soft cheese similar in both treatment. The manufacturing process with the addition of coagulant passion fruit juice on making Dangke affect hardness, pH, fat content and microstructure during storage at 5 ° C for 1 d - 28 d.

Keywords: dangke, passion fruits, microstructure, cheese

Procedia PDF Downloads 405
1586 Quantum Computing with Qudits on a Graph

Authors: Aleksey Fedorov

Abstract:

Building a scalable platform for quantum computing remains one of the most challenging tasks in quantum science and technologies. However, the implementation of most important quantum operations with qubits (quantum analogues of classical bits), such as multiqubit Toffoli gate, requires either a polynomial number of operation or a linear number of operations with the use of ancilla qubits. Therefore, the reduction of the number of operations in the presence of scalability is a crucial goal in quantum information processing. One of the most elegant ideas in this direction is to use qudits (multilevel systems) instead of qubits and rely on additional levels of qudits instead of ancillas. Although some of the already obtained results demonstrate a reduction of the number of operation, they suffer from high complexity and/or of the absence of scalability. We show a strong reduction of the number of operations for the realization of the Toffoli gate by using qudits for a scalable multi-qudit processor. This is done on the basis of a general relation between the dimensionality of qudits and their topology of connections, that we derived.

Keywords: quantum computing, qudits, Toffoli gates, gate decomposition

Procedia PDF Downloads 140
1585 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic

Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi

Abstract:

In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.

Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing

Procedia PDF Downloads 294
1584 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 294
1583 Stochastic Programming and C-Somga: Animal Ration Formulation

Authors: Pratiksha Saxena, Dipti Singh, Neha Khanna

Abstract:

A self-organizing migrating genetic algorithm(C-SOMGA) is developed for animal diet formulation. This paper presents animal diet formulation using stochastic and genetic algorithm. Tri-objective models for cost minimization and shelf life maximization are developed. These objectives are achieved by combination of stochastic programming and C-SOMGA. Stochastic programming is used to introduce nutrient variability for animal diet. Self-organizing migrating genetic algorithm provides exact and quick solution and presents an innovative approach towards successful application of soft computing technique in the area of animal diet formulation.

Keywords: animal feed ration, feed formulation, linear programming, stochastic programming, self-migrating genetic algorithm, C-SOMGA technique, shelf life maximization, cost minimization, nutrient maximization

Procedia PDF Downloads 432
1582 Technology and Educational Gaps: A Literature Review on the Proportionate Infusion of Technology into Education

Authors: Tamika Gordon

Abstract:

As technology continues to progress every second, educational institutions attempt to stay abreast of the latest developments through the acquisition of technological devices. Within schools, soft and hard technologies have assisted with reaching more students and expedient communication. As schools continue to grow, the need for simultaneous communication and efficient feedback has grown, and technology has allowed for these avenues to be explored and incorporated within a variety of daily operations. With the rapid inclusion of technology comes the potential for less face-to-face interactions among stakeholders. Although technology plays an integral role in education, the elements of both soft and hard technological devices must be proportionally utilized and coexist for the overall advancement and longevity of organizations. Over 20 articles were referenced to obtain a multitude of views on technology reflecting effects for students and teachers. Throughout this literature review, the effects of technology in the workplace will be discussed including views of current researchers, pros and cons surrounding technological inclusion, and implications for future research and further consideration. Upon the completion of the literature review, the benefits and necessity of technology remained high, however, low availability of resources, limited exposure to technological devices, and decreasing soft skills remained high as well. Recommendations are made for proportionate balances of technology and face-to-face interactions in order to minimize societal, educational, and organizational gaps.

Keywords: communication, devices, education, organizations, technology

Procedia PDF Downloads 227
1581 Performance of Pilot Test of Geotextile Tube Filled with Lightly Cemented Clay

Authors: S. H. Chew, Z. X. Eng, K. E. Chuah, T. Y. Lim, H. M. A. Yim

Abstract:

In recent years, geotextile tube has been widely used in the hydraulic engineering and dewatering industry. To construct a stable containment bund with geotextile tubes, the sand slurry is always the preference infilling material. However, the shortage of sand supply posts a problem in Singapore to adopt this construction method in the actual construction of long containment bund. Hence, utilizing the soft dredged clay or the excavated soft clay as the infilling material of geotextile tubes has a great economic benefit. There are any technical issues with using this soft clayey material as infilling material, especially on the excessive settlement and stability concerns. To minimize the shape deformation and settlement of geotextile tube associated with the use of this soft clay infilling material, a modified innovative infilling material is proposed – lightly cemented soft clay. The preliminary laboratory studies have shown that the dewatering mechanism via geotextile material of the tube skin, and the introduction of cementitious chemical action of the lightly cemented soft clay will accelerate the consolidation and improve the shear strength of infill material. This study aims to extend the study by conducting a pilot test of the geotextile tube filled with lightly cemented clay. This study consists of testing on a series of miniature geo-tubes and two full-size geotextile tube. In the miniature geo-tube tests, a number of small scaled-down size of geotextile tubes were filled with cemented clay (at water content of 150%) with cement content of 0% to 8% (by weight). The shear strength development of the lightly cemented clay under dewatering mechanism was evaluated using a modified in-situ Cone Penetration Test (CPT) at 0 days, 3 days, 7 days and 28 days after the infilling. The undisturbed soil samples of lightly cemented infilled clay were also extracted at 3-days and 7-days for triaxial tests and evaluation of final water content. The results suggested that the geotextile tubes filled with un-cemented soft clay experienced very significant shape change over the days (as control test). However, geotextile mini-tubes filled with lightly cemented clay experienced only marginal shape changed, even that the strength development of this lightly cemented clay inside the tube may not show significant strength gain at the early stage. The shape stability is believed to be due to the confinement effect of the geotextile tube with clay at non-slurry state. Subsequently, a full-scale instrumented geotextile tube filled with lightly cemented clay was performed. The extensive results of strain gauges and pressure transducers installed on this full-size geotextile tube demonstrated a substantial mobilization of tensile forces on the geotextile skin corresponding to the filling activity and the subsequent dewatering stage. Shape change and the in-fill material strength development was also monitored. In summary, the construction of containment bund with geotextile tube filled with lightly cemented clay is found to be technically feasible and stable with the use of the sufficiently strong (i.e. adequate tensile strength) geotextile tube, the adequate control on the dosage of cement content, and suitable water content of infilling soft clay material.

Keywords: cemented clay, containment bund, dewatering, geotextile tube

Procedia PDF Downloads 263