Search results for: centralized server
146 A Structure-Switching Electrochemical Aptasensor for Rapid, Reagentless and Single-Step, Nanomolar Detection of C-Reactive Protein
Authors: William L. Whitehouse, Louisa H. Y. Lo, Andrew B. Kinghorn, Simon C. C. Shiu, Julian. A. Tanner
Abstract:
C-reactive protein (CRP) is an acute-phase reactant and sensitive indicator for sepsis and other life-threatening pathologies, including systemic inflammatory response syndrome (SIRS). Currently, clinical turn-around times for established CRP detection methods take between 30 minutes to hours or even days from centralized laboratories. Here, we report the development of an electrochemical biosensor using redox probe-tagged DNA aptamers functionalized onto cheap, commercially available screen-printed electrodes. Binding-induced conformational switching of the CRP-targeting aptamer induces a specific and selective signal-ON event, which enables single-step and reagentless detection of CRP in as little as 1 minute. The aptasensor dynamic range spans 5-1000nM (R=0.97) or 5-500nM (R=0.99) in 50% diluted human serum, with a LOD of 3nM, corresponding to 2-orders of magnitude sensitivity under the clinically relevant cut-off for CRP. The sensor is stable for up to one week and can be reused numerous times, as judged from repeated real-time dosing and dose-response assays. By decoupling binding events from the signal induction mechanism, structure-switching electrochemical aptamer-based sensors (SS-EABs) provide considerable advantages over their adsorption-based counterparts. Our work expands on the retinue of such sensors reported in the literature and is the first instance of an SS-EAB for reagentless CRP detection. We hope this study can inspire further investigations into the suitability of SS-EABs for diagnostics, which will aid translational R&D toward fully realized devices aimed at point-of-care applications or for use more broadly by the public.Keywords: structure-switching, C-reactive protein, electrochemical, biosensor, aptasensor.
Procedia PDF Downloads 70145 Analysis of a Discrete-time Geo/G/1 Queue Integrated with (s, Q) Inventory Policy at a Service Facility
Authors: Akash Verma, Sujit Kumar Samanta
Abstract:
This study examines a discrete-time Geo/G/1 queueing-inventory system attached with (s, Q) inventory policy. Assume that the customers follow the Bernoulli process on arrival. Each customer demands a single item with arbitrarily distributed service time. The inventory is replenished by an outside supplier, and the lead time for the replenishment is determined by a geometric distribution. There is a single server and infinite waiting space in this facility. Demands must wait in the specified waiting area during a stock-out period. The customers are served on a first-come-first-served basis. With the help of the embedded Markov chain technique, we determine the joint probability distributions of the number of customers in the system and the number of items in stock at the post-departure epoch using the Matrix Analytic approach. We relate the system length distribution at post-departure and outside observer's epochs to determine the joint probability distribution at the outside observer's epoch. We use probability distributions at random epochs to determine the waiting time distribution. We obtain the performance measures to construct the cost function. The optimum values of the order quantity and reordering point are found numerically for the variety of model parameters.Keywords: discrete-time queueing inventory model, matrix analytic method, waiting-time analysis, cost optimization
Procedia PDF Downloads 42144 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique
Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim
Abstract:
This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic
Procedia PDF Downloads 117143 IoT Based Agriculture Monitoring Framework for Sustainable Rice Production
Authors: Armanul Hoque Shaon, Md Baizid Mahmud, Askander Nobi, Md. Raju Ahmed, Md. Jiabul Hoque
Abstract:
In the Internet of Things (IoT), devices are linked to the internet through a wireless network, allowing them to collect and transmit data without the need for a human operator. Agriculture relies heavily on wireless sensors, which are a vital component of the Internet of Things (IoT). This kind of wireless sensor network monitors physical or environmental variables like temperatures, sound, vibration, pressure, or motion without relying on a central location or sink and collaboratively passes its data across the network to be analyzed. As the primary source of plant nutrients, the soil is critical to the agricultural industry's continued growth. We're excited about the prospect of developing an Internet of Things (IoT) solution. To arrange the network, the sink node collects groundwater levels and sends them to the Gateway, which centralizes the data and forwards it to the sensor nodes. The sink node gathers soil moisture data, transmits the mean to the Gateways, and then forwards it to the website for dissemination. The web server is in charge of storing and presenting the moisture in the soil data to the web application's users. Soil characteristics may be collected using a networked method that we developed to improve rice production. Paddy land is running out as the population of our nation grows. The success of this project will be dependent on the appropriate use of the existing land base.Keywords: IoT based agriculture monitoring, intelligent irrigation, communicating network, rice production
Procedia PDF Downloads 154142 SIM (Subscriber Identity Module) Banking
Authors: Okanta Andrew, Richmond Kweku Frempong
Abstract:
As mobile networks are upgraded with technologies like WAP, GPRS and UMTS to deliver next-generation multimedia services, so are the banks and other financial institutions also getting ready to unleash the financial products on the mobile platform to meet growing demand for mobile based application services. Hence, the onset of Unstructured Supplementary Services (USSD) Banking which would make banking services available at anywhere, anytime through a string of interactive SMS sessions between a mobile device and an application server of a service provider. The aim of this studies was to find out whether the public will accept the sim banking service when it is implemented. Our target group includes: Working class. E. g. Businessmen/women, office workers, fishermen, market women, teachers etc. Nonworking class. E. g. Students (Tertiary, Senior High School), housewives. etc. The survey was in the form of a questionnaire and a verbal interview (video) which was to investigate their idea about the current banking system and the yet to be introduced sim banking concept. Meanwhile, some challenges accompanied the progression of data gathering because some populace showed reluctance in freeing their information. One other suggestion was that government should put measures against foremost challenges obstructing sim banking in Ghana counter to computers hackers. Government and individual have a key role to undertake to give suitable support to facelift the sim banking industry in the country. It was also suggested that Government put strong regulations on the use of sim banking products and services to streamline all the activities and also create awareness of the need for sim banking and emphasize its relevance in the aspect of national GDP.Keywords: banking, mobile banking, SIM banking, mobile banking in Ghana
Procedia PDF Downloads 484141 Classification of Manufacturing Data for Efficient Processing on an Edge-Cloud Network
Authors: Onyedikachi Ulelu, Andrew P. Longstaff, Simon Fletcher, Simon Parkinson
Abstract:
The widespread interest in 'Industry 4.0' or 'digital manufacturing' has led to significant research requiring the acquisition of data from sensors, instruments, and machine signals. In-depth research then identifies methods of analysis of the massive amounts of data generated before and during manufacture to solve a particular problem. The ultimate goal is for industrial Internet of Things (IIoT) data to be processed automatically to assist with either visualisation or autonomous system decision-making. However, the collection and processing of data in an industrial environment come with a cost. Little research has been undertaken on how to specify optimally what data to capture, transmit, process, and store at various levels of an edge-cloud network. The first step in this specification is to categorise IIoT data for efficient and effective use. This paper proposes the required attributes and classification to take manufacturing digital data from various sources to determine the most suitable location for data processing on the edge-cloud network. The proposed classification framework will minimise overhead in terms of network bandwidth/cost and processing time of machine tool data via efficient decision making on which dataset should be processed at the ‘edge’ and what to send to a remote server (cloud). A fast-and-frugal heuristic method is implemented for this decision-making. The framework is tested using case studies from industrial machine tools for machine productivity and maintenance.Keywords: data classification, decision making, edge computing, industrial IoT, industry 4.0
Procedia PDF Downloads 180140 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 392139 Artificial Intelligent-Based Approaches for Task Offloading, Resource Allocation and Service Placement of Internet of Things Applications: State of the Art
Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib
Abstract:
In order to support the continued growth, critical latency of IoT applications, and various obstacles of traditional data centers, mobile edge computing (MEC) has emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. By adopting a MEC structure, IoT applications could be executed locally, on an edge server, different fog nodes, or distant cloud data centers. However, we are often faced with wanting to optimize conflicting criteria such as minimizing energy consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge devices and trying to keep high performance (reducing response time, increasing throughput and service availability) at the same time. Achieving one goal may affect the other, making task offloading (TO), resource allocation (RA), and service placement (SP) complex processes. It is a nontrivial multi-objective optimization problem to study the trade-off between conflicting criteria. The paper provides a survey on different TO, SP, and RA recent multi-objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications.Keywords: mobile edge computing, multi-objective optimization, artificial intelligence approaches, task offloading, resource allocation, service placement
Procedia PDF Downloads 115138 Digitalized Cargo Coordination to Eliminate Emissions in the Shipping Ecosystem: A System Dynamical Approach
Authors: Henry Schwartz, Bogdan Iancu, Magnus Gustafsson, Johan Lilius
Abstract:
The shipping sector generates significant amounts of carbon emissions on annual basis. The excess amount of carbon dioxide is harmful for both the environment and the society, and partly for that reason, there is acute interest to decrease the volume of anthropogenic carbon dioxide emissions in shipping. The usage of the existing cargo carrying capacity can be maximized, and the share of time used in actual transportation operations could be increased if the whole transportation and logistics chain was optimized with the aid of information sharing done through a centralized marketplace and an information-sharing platform. The outcome of this change would be decreased carbon dioxide emission volumes produced per each metric ton of cargo transported by a vessel. Cargo coordination is a platform under development that matches the need for waterborne transportation services with the ships that operate at a given moment in time. In this research, the transition towards adopting cargo coordination is modelled with system dynamics. The model encompasses the complex supply-demand relationships of ship operators and cargo owners. The built scenarios predict the pace at which different stakeholders start using the digitalized platform and by doing so reduce the amount of annual CO2 emissions generated. To improve the reliability of the results, various sensitivity analyses considering the pace of transition as well as the overall impact on the environment (carbon dioxide emissions per amount of cargo transported) are conducted. The results of the study can be used to support investors and politicians in decision making towards more environmentally sustainable solutions. In addition, the model provides concepts and ideas for a wider discussion considering the paths towards carbon neutral transportation.Keywords: carbon dioxide emissions, energy efficiency, sustainable transportation, system dynamics
Procedia PDF Downloads 147137 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 99136 Antibody Reactivity of Synthetic Peptides Belonging to Proteins Encoded by Genes Located in Mycobacterium tuberculosis-Specific Genomic Regions of Differences
Authors: Abu Salim Mustafa
Abstract:
The comparisons of mycobacterial genomes have identified several Mycobacterium tuberculosis-specific genomic regions that are absent in other mycobacteria and are known as regions of differences. Due to M. tuberculosis-specificity, the peptides encoded by these regions could be useful in the specific diagnosis of tuberculosis. To explore this possibility, overlapping synthetic peptides corresponding to 39 proteins predicted to be encoded by genes present in regions of differences were tested for antibody-reactivity with sera from tuberculosis patients and healthy subjects. The results identified four immunodominant peptides corresponding to four different proteins, with three of the peptides showing significantly stronger antibody reactivity and rate of positivity with sera from tuberculosis patients than healthy subjects. The fourth peptide was recognized equally well by the sera of tuberculosis patients as well as healthy subjects. Predication of antibody epitopes by bioinformatics analyses using ABCpred server predicted multiple linear epitopes in each peptide. Furthermore, peptide sequence analysis for sequence identity using BLAST suggested M. tuberculosis-specificity for the three peptides that had preferential reactivity with sera from tuberculosis patients, but the peptide with equal reactivity with sera of TB patients and healthy subjects showed significant identity with sequences present in nob-tuberculous mycobacteria. The three identified M. tuberculosis-specific immunodominant peptides may be useful in the serological diagnosis of tuberculosis.Keywords: genomic regions of differences, Mycobacterium tuberculossis, peptides, serodiagnosis
Procedia PDF Downloads 183135 Ecological Concerns in Food Systems: An Ethnographical Approach on Vegan Impact in Governmentality
Authors: Jessica Gonzalez
Abstract:
Veganism, along with different types of vegetarianism, consists in the abstinence of animal products. Far from being only an alimentary regulation, it stands as a political posture against the food industry generating itself a set of beliefs, prohibitions, and attitudes that compel the individual to a reevaluation of his obligations towards the environment. Veganism defends animal rights and at the same time reinforces a different conception of natural resources embodying it in alimentary restrictions. These practices emerge in the context of alimentary modernity, which is characterized by bringing new concerns to the consumer. An increased skepticism towards the government ability to protect food supply; a notable distrust toward the market guaranties on providing safe food with sustainable techniques and the desire to react to the neoliberal forms of exploitation are some of its consequences of this phenomenon. This study aims to approach the concept of governmentality as a coproduced system of legitimized practices and knowledge, formed by the interaction of the different actors that are involved. In a scenario where the State seems to retreat from centralized regulation of food production giving up importance to citizens, dietary consultants, farmers, and stockbreeders, veganism plays its role on the conformation of distinctive forms of environmentalism, nature rights and responses to ecological crisis. The ethnographic method allows observing the mechanisms of interaction of consumers and discourses with the mainstream food system, providing evidence about the means of generation of new conceptions about nature and the environment. The paper focuses on how the dietary restrictions, consumption patterns and public discourses of vegans in Barcelona impact local consumption, demonstrating its relevance as a mechanism that associates particular concerns about food with political economy.Keywords: animal rights, environmentalism, food system, governmentality, veganism
Procedia PDF Downloads 127134 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks
Authors: Hyunsun Lee, Yi Zhu
Abstract:
Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles
Procedia PDF Downloads 123133 Analytical Study: An M-Learning App Reflecting the Factors Affecting Student’s Adoption of M-Learning
Authors: Ahmad Khachan, Ahmet Ozmen
Abstract:
This study aims to introduce a mobile bite-sized learning concept, a mobile application with social networks motivation factors that will encourage students to practice critical thinking, improve analytical skills and learn knowledge sharing. We do not aim to propose another e-learning or distance learning based tool like Moodle and Edmodo; instead, we introduce a mobile learning tool called Interactive M-learning Application. The tool reconstructs and strengthens the bonds between educators and learners and provides a foundation for integrating mobile devices in education. The application allows learners to stay connected all the time, share ideas, ask questions and learn from each other. It is built on Android since the Android has the largest platform share in the world and is dominating the market with 74.45% share in 2018. We have chosen Google-Firebase server for hosting because of flexibility, ease of hosting and real time update capabilities. The proposed m-learning tool was offered to four groups of university students in different majors. An improvement in the relation between the students, the teachers and the academic institution was obvious. Student’s performance got much better added to better analytical and critical skills advancement and moreover a willingness to adopt mobile learning in class. We have also compared our app with another tool in the same class for clarity and reliability of the results. The student’s mobile devices were used in this experimental study for diversity of devices and platform versions.Keywords: education, engineering, interactive software, undergraduate education
Procedia PDF Downloads 155132 The Comparative Study of the Characteristics of Chinese and Foreign Excellent Woman’s Single Players’ Serve, Receive Tactic Author
Authors: Zhai Yuan, Wu Xueqing
Abstract:
This article statistics the technology which used by Chinese and foreign excellent players in the game, including types and serves areas,receive technology and effect and utilization ratio receiving and losing points. The sample is che videos which is world's top matches of excellent badminton athletes of che single, including Chinese players’ 43 games and foreign players’ 38 games. Conclusion: For the serving, Chinese and foreign single players are to give priority to forehand short-low serve and the long-high serve. And Chinese and foreign players in using forehand short-low serve and drive server exist significant differences; For the serves areas, Chinese and foreign players serve area is concentrated in area 1,5,6. Area 6 has the highest rate of all the district areas, following by the area 1and area 5. Among the 2ed serve area Sino-foreign player, there exist significant differences; In the receiver, when returning the frontcourt shutter, players is given priority to net lift and push. When returning the backcourt shutter, receiver's the best ball is smash, followed by clear and drop shot. Foreign players have higher utilization rate in smash than Chinese players in the backcourt; In the receiver result, Chinese players give priority to actively and equally situation than foreign players, but in negatively receiving is just opposite.Keywords: badminton, woman’s singles, technique and tactics, comparative analysis
Procedia PDF Downloads 539131 The Cost-Effectiveness of High-Volume Hospital’s Surgical Care for Pancreatic Cancer: Economic Evidence Reviewed
Authors: Shannon Hearney, Jeffrey Hoch
Abstract:
Pancreatic cancer is a notoriously costly and deadly form of cancer. Many types of treatment centers exist for patients to seek care from, including high-volume centers which have shown promise to provide the highest quality of care. While it may be true that this type of center provides the best care it is unclear if that care is cost-effective. Studies in the US have confirmed that high-volume hospitals do provide higher quality of care but have shown inconsistencies in the cost-effectiveness of that care. Other studies, like those from Finland have shown that high-volume centers had lower mortality and lower costs than low-volume centers. This paper thus seeks to review the current scientific literature to better understand if high-volume centers are cost-effective in delivering care in both a European setting and in the US. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review
Procedia PDF Downloads 90130 Analysis of Two-Echelon Supply Chain with Perishable Items under Stochastic Demand
Authors: Saeed Poormoaied
Abstract:
Perishability and developing an intelligent control policy for perishable items are the major concerns of marketing managers in a supply chain. In this study, we address a two-echelon supply chain problem for perishable items with a single vendor and a single buyer. The buyer adopts an aged-based continuous review policy which works by taking both the stock level and the aging process of items into account. The vendor works under the warehouse framework, where its lot size is determined with respect to the batch size of the buyer. The model holds for a positive and fixed lead time for the buyer, and zero lead time for the vendor. The demand follows a Poisson process and any unmet demand is lost. We provide exact analytic expressions for the operational characteristics of the system by using the renewal reward theorem. Items have a fixed lifetime after which they become unusable and are disposed of from the buyer's system. The age of items starts when they are unpacked and ready for the consumption at the buyer. When items are held by the vendor, there is no aging process which results in no perishing at the vendor's site. The model is developed under the centralized framework, which takes the expected profit of both vendor and buyer into consideration. The goal is to determine the optimal policy parameters under the service level constraint at the retailer's site. A sensitivity analysis is performed to investigate the effect of the key input parameters on the expected profit and order quantity in the supply chain. The efficiency of the proposed age-based policy is also evaluated through a numerical study. Our results show that when the unit perishing cost is negligible, a significant cost saving is achieved.Keywords: two-echelon supply chain, perishable items, age-based policy, renewal reward theorem
Procedia PDF Downloads 143129 Discrete-Event Modeling and Simulation Methodologies: Past, Present and Future
Authors: Gabriel Wainer
Abstract:
Modeling and Simulation methods have been used to better analyze the behavior of complex physical systems, and it is now common to use simulation as a part of the scientific and technological discovery process. M&S advanced thanks to the improvements in computer technology, which, in many cases, resulted in the development of simulation software using ad-hoc techniques. Formal M&S appeared in order to try to improve the development task of very complex simulation systems. Some of these techniques proved to be successful in providing a sound base for the development of discrete-event simulation models, improving the ease of model definition and enhancing the application development tasks; reducing costs and favoring reuse. The DEVS formalism is one of these techniques, which proved to be successful in providing means for modeling while reducing development complexity and costs. DEVS model development is based on a sound theoretical framework. The independence of M&S tasks made possible to run DEVS models on different environments (personal computers, parallel computers, real-time equipment, and distributed simulators) and middleware. We will present a historical perspective of discrete-event M&S methodologies, showing different modeling techniques. We will introduce DEVS origins and general ideas, and compare it with some of these techniques. We will then show the current status of DEVS M&S, and we will discuss a technological perspective to solve current M&S problems (including real-time simulation, interoperability, and model-centered development techniques). We will show some examples of the current use of DEVS, including applications in different fields. We will finally show current open topics in the area, which include advanced methods for centralized, parallel or distributed simulation, the need for real-time modeling techniques, and our view in these fields.Keywords: modeling and simulation, discrete-event simulation, hybrid systems modeling, parallel and distributed simulation
Procedia PDF Downloads 323128 Structural Health Monitoring of Offshore Structures Using Wireless Sensor Networking under Operational and Environmental Variability
Authors: Srinivasan Chandrasekaran, Thailammai Chithambaram, Shihas A. Khader
Abstract:
The early-stage damage detection in offshore structures requires continuous structural health monitoring and for the large area the position of sensors will also plays an important role in the efficient damage detection. Determining the dynamic behavior of offshore structures requires dense deployment of sensors. The wired Structural Health Monitoring (SHM) systems are highly expensive and always needs larger installation space to deploy. Wireless sensor networks can enhance the SHM system by deployment of scalable sensor network, which consumes lesser space. This paper presents the results of wireless sensor network based Structural Health Monitoring method applied to a scaled experimental model of offshore structure that underwent wave loading. This method determines the serviceability of the offshore structure which is subjected to various environment loads. Wired and wireless sensors were installed in the model and the response of the scaled BLSRP model under wave loading was recorded. The wireless system discussed in this study is the Raspberry pi board with Arm V6 processor which is programmed to transmit the data acquired by the sensor to the server using Wi-Fi adapter, the data is then hosted in the webpage. The data acquired from the wireless and wired SHM systems were compared and the design of the wireless system is verified.Keywords: condition assessment, damage detection, structural health monitoring, structural response, wireless sensor network
Procedia PDF Downloads 276127 Establishment of Landslide Warning System Using Surface or Sub-Surface Sensors Data
Authors: Neetu Tyagi, Sumit Sharma
Abstract:
The study illustrates the results of an integrated study done on Tangni landslide located on NH-58 at Chamoli, Uttarakhand. Geological, geo-morphological and geotechnical investigations were carried out to understand the mechanism of landslide and to plan further investigation and monitoring. At any rate, the movements were favored by continuous rainfall water infiltration from the zones where the phyllites/slates and Dolomites outcrop. The site investigations were carried out including the monitoring of landslide movements and of the water level fluctuations due to rainfall give us a better understanding of landslide dynamics that have been causing in time soil instability at Tangni landslide site. The Early Warning System (EWS) installed different types of sensors and all sensors were directly connected to data logger and raw data transfer to the Defence Terrain Research Laboratory (DTRL) server room with the help of File Transfer Protocol (FTP). The slip surfaces were found at depths ranging from 8 to 10 m from Geophysical survey and hence sensors were installed to the depth of 15m at various locations of landslide. Rainfall is the main triggering factor of landslide. In this study, the developed model of unsaturated soil slope stability is carried out. The analysis of sensors data available for one year, indicated the sliding surface of landslide at depth between 6 to 12m with total displacement up to 6cm per year recorded at the body of landslide. The aim of this study is to set the threshold and generate early warning. Local peoples already alert towards landslide, if they have any types of warning system.Keywords: early warning system, file transfer protocol, geo-morphological, geotechnical, landslide
Procedia PDF Downloads 158126 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy
Authors: Neda Seyyedi, Reza Berangi
Abstract:
Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.Keywords: VOIP networks, flooding attacks, entropy, computer networks
Procedia PDF Downloads 405125 Innovate, Educate, and Transform, Tailoring Sustainable Waste Handling Solutions for Nepal’s Small Populated Municipalities: Insights From Chandragiri Municipality
Authors: Anil Kumar Baral
Abstract:
The research introduces a ground-breaking approach to waste management, emphasizing innovation, education, and transformation. Using Chandragiri Municipality as a case study, the study advocates a shift from traditional to progressive waste management strategies, contributing an inventive waste framework, sustainability advocacy, and a transformative blueprint. The waste composition analysis highlights Chandragiri's representative profile, leading to a comprehensive plan addressing challenges and recommending a transition to a profitable waste treatment model, supported by relevant statistics. The data-driven approach incorporates the official data of waste Composition from Chandragiri Municipality as secondary data and incorporates the primary data from Chandragiri households, ensuring a nuanced perspective. Discussions on implementation, viability, and environmental preservation underscore the dual benefit of sustainability. The study includes a comparative analysis, monitoring, and evaluation framework, examining international relevance and collaboration, and conducting a social and environmental impact assessment. The results indicate the necessity for creative changes in Chandragiri's waste practices, recommending separate treatment centers in wards level rather than Municipal level, composting machines, and a centralized waste treatment plant. Educational reforms involve revising school curricula and awareness campaigns. The transformation's success hinges on reducing waste size, efficient treatment center operation, and ongoing public literacy. The conclusion summarizes key findings, envisioning a future with sustainable waste management practices deeply embedded in the community fabric.Keywords: innovate, educate, transform, municipality, method
Procedia PDF Downloads 46124 Bridging between Shariah Law and Legal Framework: A Study of Problems and Solutions of Islamic Banking System in Bangladesh
Authors: Md. Abdul Kader, Md. Akiz Uddin
Abstract:
The Islamic banking system is based on the Islamic shariah principles. Islamic banking is set up to avoid riba (interest)--which is prohibited in Islam-- and to prevent unscrupulous practices and participate actively in achieving the welfare-oriented Islamic economy. In the process of offering Islamic banking services, practitioners have been facing several challenges. Out of many challenges, this paper particularly highlights the need for a centralized legal framework for Islamic banks that should be compliant with the shariah law. The researchers employed a qualitative method to collect case studies from high-profile Islamic Bankers and analyzed respective legal documents and policy papers to conduct the study. This study investigates the Shariah Governance Framework (SGF), amended Banking Companies Act, 1991 (Act No. 14 of 1991), and the Shariah Supervisory Board (SSB) of Islamic banks in Bangladesh to evaluate how legal framework supervise and/or monitor Islamic banking system under the jurisdiction of shariah law. The study reveals that the Shariah governance system in Bangladesh is mainly voluntary rather than regulatory, and there is an absence of full-fledged SGF. Though there is no complete Islamic Banking Act for controlling, guiding, and supervising the Islamic banks in Bangladesh, some Islamic banking provisions have already been incorporated in the amended Banking Companies Act, 1991 (Act No. 14 of 1991). Bangladesh Bank did not set up any separate Department at its Head Office to control, guide and supervise the operation of the Islamic banks. So, ensuring the implementation of Shariah principles concurrent with the legal framework of banking policies is recommended in this study. This study also prescribes that the government should enact a law or policy for the operations of Islamic banks in order to improve the Islamic Banking system of Bangladesh. In addition, the central bank can set up a Central Shariah Supervisory Board (CSSB) or authorize the existing Central Shariah Board for Islamic Banks of Bangladesh (CSBIB) to supervise and monitor overall activities of Islamic banks and resolve the disputes among the stakeholders concerning the Shariah issues of Islamic banks.Keywords: islamic banking, shariah law, banking policies, shariah governance framework (SGF)
Procedia PDF Downloads 72123 The Political Pedagogy of Everyday Life in the French Revolution
Authors: Michael Ruiz
Abstract:
Many scholars view the French Revolution as the origins of ‘modern nationalism,’ citing the unprecedented rhetorical power of ‘the nation’ and the emergence of a centralized, modern nation-state during this time. They have also stressed the role of public education in promoting a national language and creating a sense of shared national identity among the masses. Yet as many cultural historians have shown, revolutionary leaders undertook an unprecedented campaign to overhaul French culture in the 1790s in order to cultivate these national ideals and inspire Republican virtues, in what has been called ‘political pedagogy.’ In contrast to scholars of nationalism, who emphasize formal education, revolutionaries attempted to translate abstract ideas of equality and liberty into palpable representations that would inundate everyday life, thereby serving as pedagogical tools. Material culture and everyday life became state apparatuses not just for winning over citizens’ hearts and minds, but for influencing the very formation of the citizen and their innermost ‘self.’ This paper argues that nationalism began in 1789, when ‘the self’ became a political concern and its formation a state project for cultivating political legitimacy. By broadening the meaning of ‘political pedagogy,’ this study brings together scholarship on nationalism with cultural history, thereby highlighting nations and nationalism as banal, palpable, quotidian phenomena and historicizing the complex emergence of ‘modern nationalism.’ Moreover, because the contemporary view of material culture and pedagogy was highly gendered, this study shows the role of culture in the development of a homosocial, male-dominated public sphere in the 19th century. The legacy of the French Revolution’s concern with culture thus persists as much in our vocabulary for political expression as it does in the material world, remaining deeply embedded in everyday day life as a crucial, nearly-invisible, component of nationalism.Keywords: French Revolution, nationalism, political culture, material culture
Procedia PDF Downloads 140122 Integrated Education at Jazan University: Budding Hope for Employability
Authors: Jayanthi Rajendran
Abstract:
Experience is what makes a man perfect. Though we tend to learn many a different things in life through practice still we need to go an extra mile to gain experience which would be profitable only when it is integrated with regular practice. A clear phenomenal idea is that every teacher is a learner. The centralized idea of this paper would focus on the integrated practices carried out among the students of Jizan University which enhances learning through experiences. Integrated practices like student-directed activities, balanced curriculum, phonological based activities and use of consistent language would enlarge the vision and mission of students to earn experience through learning. Students who receive explicit instruction and guidance could practice the skills and strategies through student-directed activities such as peer tutoring and cooperative learning. The second effective practice is to use consistent language. Consistent language provides students a model for talking about the new concepts which also enables them to communicate without hindrances. Phonological awareness is an important early reading skill for all students. Students generally have phonemic awareness in their home language can often transfer that knowledge to a second language. And also a balanced curriculum requires instruction in all the elements of reading. Reading is the most effective skill when both basic and higher-order skills are included on a daily basis. Computer based reading and listening skills will empower students to understand a language in a better way. English language learners can benefit from sound reading instruction even before they are fully proficient in English as long as the instruction is comprehensible. Thus, if students have to be well equipped in learning they should foreground themselves in various integrated practices through multifarious experience for which teachers are moderators and trainers. This type of learning prepares the students for a constantly changing society which helps them to meet the competitive world around them for better employability fulfilling the vision and mission of the institution.Keywords: consistent language, employability, phonological awareness, balanced curriculum
Procedia PDF Downloads 401121 Portable Cardiac Monitoring System Based on Real-Time Microcontroller and Multiple Communication Interfaces
Authors: Ionel Zagan, Vasile Gheorghita Gaitan, Adrian Brezulianu
Abstract:
This paper presents the contributions in designing a mobile system named Tele-ECG implemented for remote monitoring of cardiac patients. For a better flexibility of this application, the authors chose to implement a local memory and multiple communication interfaces. The project described in this presentation is based on the ARM Cortex M0+ microcontroller and the ADAS1000 dedicated chip necessary for the collection and transmission of Electrocardiogram signals (ECG) from the patient to the microcontroller, without altering the performances and the stability of the system. The novelty brought by this paper is the implementation of a remote monitoring system for cardiac patients, having a real-time behavior and multiple interfaces. The microcontroller is responsible for processing digital signals corresponding to ECG and also for the implementation of communication interface with the main server, using GSM/Bluetooth SIMCOM SIM800C module. This paper translates all the characteristics of the Tele-ECG project representing a feasible implementation in the biomedical field. Acknowledgment: This paper was supported by the project 'Development and integration of a mobile tele-electrocardiograph in the GreenCARDIO© system for patients monitoring and diagnosis - m-GreenCARDIO', Contract no. BG58/30.09.2016, PNCDI III, Bridge Grant 2016, using the infrastructure from the project 'Integrated Center for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for fabrication and control', Contract No. 671/09.04.2015, Sectoral Operational Program for Increase of the Economic Competitiveness co-funded from the European Regional Development Fund.Keywords: Tele-ECG, real-time cardiac monitoring, electrocardiogram, microcontroller
Procedia PDF Downloads 272120 Developing and Enacting a Model for Institutional Implementation of the Humanizing Pedagogy: Case Study of Nelson Mandela University
Authors: Mukhtar Raban
Abstract:
As part of Nelson Mandela University’s journey of repositioning its learning and teaching agenda, the university adopted and foregrounded a humanizing pedagogy-aligning with institutional goals of critically transforming the academic project. The university established the Humanizing Pedagogy Praxis and Research Niche (HPPRN) as a centralized hub for coordinating institutional work exploring and advancing humanizing pedagogies and tasked the unit with developing and enacting a model for humanizing pedagogy exploration. This investigation endeavored to report on the development and enactment of a model that sought to institutionalize a humanizing pedagogy at a South African university. Having followed a qualitative approach, the investigation presents the case study of Nelson Mandela University’s HPPRN and the model it subsequently established and enacted for the advancement towards a more common institutional understanding, interpretation and application of the humanizing pedagogy. The study adopted an interpretive lens for analysis, complementing the qualitative approach of the investigation. The primary challenge that confronted the HPPRN was the development of a ‘living model’ that had to complement existing institutional initiatives while accommodating a renewed spirit of critical reflection, innovation and research of continued and new humanizing pedagogical exploration and applications. The study found that the explicit consideration of tenets of humanizing and critical pedagogies in underpinning and framing the HPPRN Model contributed to the sense of ‘lived’ humanizing pedagogy experiences during enactment. The multi-leveled inclusion of critical reflection in the development and enactment stages was found to further the processes of praxis employed at the university, which is integral to the advancement of humanizing and critical pedagogies. The development and implementation of a model that seeks to institutionalize the humanizing pedagogy at a university rely not only on sound theoretical conceptualization but also on the ‘richness of becoming more human’ explicitly expressed and encountered in praxes and application.Keywords: humanizing pedagogy, critical pedagogy, institutional implementation, praxis
Procedia PDF Downloads 167119 The Effect of CPU Location in Total Immersion of Microelectronics
Authors: A. Almaneea, N. Kapur, J. L. Summers, H. M. Thompson
Abstract:
Meeting the growth in demand for digital services such as social media, telecommunications, and business and cloud services requires large scale data centres, which has led to an increase in their end use energy demand. Generally, over 30% of data centre power is consumed by the necessary cooling overhead. Thus energy can be reduced by improving the cooling efficiency. Air and liquid can both be used as cooling media for the data centre. Traditional data centre cooling systems use air, however liquid is recognised as a promising method that can handle the more densely packed data centres. Liquid cooling can be classified into three methods; rack heat exchanger, on-chip heat exchanger and full immersion of the microelectronics. This study quantifies the improvements of heat transfer specifically for the case of immersed microelectronics by varying the CPU and heat sink location. Immersion of the server is achieved by filling the gap between the microelectronics and a water jacket with a dielectric liquid which convects the heat from the CPU to the water jacket on the opposite side. Heat transfer is governed by two physical mechanisms, which is natural convection for the fixed enclosure filled with dielectric liquid and forced convection for the water that is pumped through the water jacket. The model in this study is validated with published numerical and experimental work and shows good agreement with previous work. The results show that the heat transfer performance and Nusselt number (Nu) is improved by 89% by placing the CPU and heat sink on the bottom of the microelectronics enclosure.Keywords: CPU location, data centre cooling, heat sink in enclosures, immersed microelectronics, turbulent natural convection in enclosures
Procedia PDF Downloads 272118 Coherent All-Fiber and Polarization Maintaining Source for CO2 Range-Resolved Differential Absorption Lidar
Authors: Erwan Negre, Ewan J. O'Connor, Juha Toivonen
Abstract:
The need for CO2 monitoring technologies grows simultaneously with the worldwide concerns regarding environmental challenges. To that purpose, we developed a compact coherent all-fiber ranged-resolved Differential Absorption Lidar (RR-DIAL). It has been designed along a tunable 2x1fiber optic switch set to a frequency of 1 Hz between two Distributed FeedBack (DFB) lasers emitting in the continuous-wave mode at 1571.41 nm (absorption line of CO2) and 1571.25 nm (CO2 absorption-free line), with linewidth and tuning range of respectively 1 MHz and 3 nm over operating wavelength. A three stages amplification through Erbium and Erbium-Ytterbium doped fibers coupled to a Radio Frequency (RF) driven Acousto-Optic Modulator (AOM) generates 100 ns pulses at a repetition rate from 10 to 30 kHz with a peak power up to 2.5 kW and a spatial resolution of 15 m, allowing fast and highly resolved CO2 profiles. The same afocal collection system is used for the output of the laser source and the backscattered light which is then directed to a circulator before being mixed with the local oscillator for heterodyne detection. Packaged in an easily transportable box which also includes a server and a Field Programmable Gate Array (FPGA) card for on-line data processing and storing, our setup allows an effective and quick deployment for versatile in-situ analysis, whether it be vertical atmospheric monitoring, large field mapping or sequestration site continuous oversight. Setup operation and results from initial field measurements will be discussed.Keywords: CO2 profiles, coherent DIAL, in-situ atmospheric sensing, near infrared fiber source
Procedia PDF Downloads 128117 Efficacy and Safety of Inhaled Nebulized Chemotherapy in Treatment of Patients with Newly Diagnosed Pulmonary Tuberculosis in Comparison to Standard Antimycobacterial Therapy
Authors: M. Kuzhko, M. Gumeniuk, D. Butov, T. Tlustova, O. Denysov, T. Sprynsian
Abstract:
Abstract: The objective of this work was to study the efficacy and safety of inhaled nebulized chemotherapy in the treatment of patients with newly diagnosed pulmonary tuberculosis in comparison with standard antimycobacterial therapy. Materials and methods: The study involved 68 patients aged between 20 and 70 years with newly diagnosed pulmonary tuberculosis. Patients were allocated to two groups. The first (main, n=21) group of patients received standard chemotherapy and further 0.15 g of isoniazid and rifampicin 0.15 g inhaled through a nebulizer, also they received salmeterol 50 mcg + fluticasone propionate 250 mcg at 2 breaths twice a day for 2 months. The second (control, n=47) group of patients received standard chemotherapy, consisting of orally administered isoniazid (0.3 g), rifampicin (0.6 g), pyrazinamide (2 g), ethambutol (1.2 g) with a dose reduction after the intensive phase of the therapy. The anti-TB drugs were procured through the Ukraine’s centralized national supply system. Results: Intoxication symptoms in the first group reduced following 1.39±0.18 months, whereas in the second group, intoxication symptoms reduced following 2.7±0.1 months, p<.001. Moreover, respiratory symptoms regression in the first group was observed following 1.6±0.2 months, whereas in the second group – following 2.5±0.2 months, p<0.05. Bacillary excretion period evaluated within 1 month was reduced, as it was shown by 66.6±10.5% in the main group compared to 27.6±6.5%, p<0.05, in the control group. In addition, period of cavities healing was reduced to 2.9±0.2 months in the main group compared to 3.7±0.1 months, p<0.05, in the control group. Residual radiological lung damage findings (large residual changes) were observed in 22 (23.8±9.5 %) patients of the main group versus 24 (51.0±7.2 %) patients in the control group, p<0.05. After completion of treatment scar stenosis of the bronchi II-III art. diagnosed in 3 (14.2±7.8%) patients in main group and 17 (68.0±6.8%) - control group, p<0.05. The duration of hospital treatment was 2.4±0.4 months in main group and 4.1±0.4 months in control group, p<0.05. Conclusion: Administration of of inhaled nebulized chemotherapy in patients with newly diagnosed pulmonary tuberculosis resulted in a comparatively quick reduction of disease manifestation.Keywords: inhaled nebulized chemotherapy, pulmonary tuberculosis, tuberculosis, treatment of tuberculosis
Procedia PDF Downloads 197