Search results for: conventional computing
4146 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 1194145 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)
Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo
Abstract:
Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop
Procedia PDF Downloads 4034144 Communication Barriers and Challenges for Accessing Autism Care: Conventional Versus Alternative Medicine
Authors: M. D. Antoine
Abstract:
Despite the widespread use of complementary and alternative medicine (CAM) for autistic children, little is known about the communication flow between the different parties involved in autism care (e.g., parents/caregivers, conventional providers, alternative practitioners). This study aimed to describe how communication occurs through the first year following an autism spectrum disorder (ASD) diagnosis to identify challenges and potential barriers to communication within the healthcare system in Ottawa, Canada. From an ecological perspective, we collected qualitative data through 12 semi-structured interviews with six parents/caregivers, three conventional providers (e.g., family doctor, neurodevelopmental pediatrician, psychologist), and three alternative practitioners (e.g., naturopath, occupational therapist, speech and language pathologist) operating in Ottawa. We interpreted the data using thematic analysis. Findings revealed communication challenges between the parents/caregivers and conventional providers while they experience better communication flow with fewer challenges in alternative care settings. However, parents/caregivers are the only links between the health professionals of both streams. From the five contexts examined: organizational, interpersonal, media, cultural, and political-legal, we found four themes (provider knowledge, care integration, flexible care, and time constraints) underlining specific barriers to communication flow between the parties involved in the care of autistic children. The increasing interest in alternative medicine is forcing changes in the healthcare system. Communications occur outside the norms making openings for better communication and information-sharing increasingly essential. Within the identified themes in the current study, the necessity for better communication between all parties involved in the care of autistic children is evident. More ASD and CAM-related training for providers would support effective parent/caregiver-provider communication. The findings of the current study contribute to a better understanding of the role of communication in the care management of autism, which has implications for effective autism care.Keywords: alternative medicine, autism care management, autism spectrum disorder, conventional medicine, parent-provider communication
Procedia PDF Downloads 1764143 Communication of Sensors in Clustering for Wireless Sensor Networks
Authors: Kashish Sareen, Jatinder Singh Bal
Abstract:
The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.Keywords: clustering, DLCC, MLCC, wireless sensor networks
Procedia PDF Downloads 4814142 Global Healthcare Village Based on Mobile Cloud Computing
Authors: Laleh Boroumand, Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar
Abstract:
Cloud computing being the use of hardware and software that are delivered as a service over a network has its application in the area of health care. Due to the emergency cases reported in most of the medical centers, prompt for an efficient scheme to make health data available with less response time. To this end, we propose a mobile global healthcare village (MGHV) model that combines the components of three deployment model which include country, continent and global health cloud to help in solving the problem mentioned above. In the creation of continent model, two (2) data centers are created of which one is local and the other is global. The local replay the request of residence within the continent, whereas the global replay the requirements of others. With the methods adopted, there is an assurance of the availability of relevant medical data to patients, specialists, and emergency staffs regardless of locations and time. From our intensive experiment using the simulation approach, it was observed that, broker policy scheme with respect to optimized response time, yields a very good performance in terms of reduction in response time. Though, our results are comparable to others when there is an increase in the number of virtual machines (80-640 virtual machines). The proportionality in increase of response time is within 9%. The results gotten from our simulation experiments shows that utilizing MGHV leads to the reduction of health care expenditures and helps in solving the problems of unqualified medical staffs faced by both developed and developing countries.Keywords: cloud computing (MCC), e-healthcare, availability, response time, service broker policy
Procedia PDF Downloads 3774141 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1264140 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 634139 Decision-Making Strategies on Smart Dairy Farms: A Review
Authors: L. Krpalkova, N. O' Mahony, A. Carvalho, S. Campbell, G. Corkery, E. Broderick, J. Walsh
Abstract:
Farm management and operations will drastically change due to access to real-time data, real-time forecasting, and tracking of physical items in combination with Internet of Things developments to further automate farm operations. Dairy farms have embraced technological innovations and procured vast amounts of permanent data streams during the past decade; however, the integration of this information to improve the whole farm-based management and decision-making does not exist. It is now imperative to develop a system that can collect, integrate, manage, and analyse on-farm and off-farm data in real-time for practical and relevant environmental and economic actions. The developed systems, based on machine learning and artificial intelligence, need to be connected for useful output, a better understanding of the whole farming issue, and environmental impact. Evolutionary computing can be very effective in finding the optimal combination of sets of some objects and, finally, in strategy determination. The system of the future should be able to manage the dairy farm as well as an experienced dairy farm manager with a team of the best agricultural advisors. All these changes should bring resilience and sustainability to dairy farming as well as improving and maintaining good animal welfare and the quality of dairy products. This review aims to provide an insight into the state-of-the-art of big data applications and evolutionary computing in relation to smart dairy farming and identify the most important research and development challenges to be addressed in the future. Smart dairy farming influences every area of management, and its uptake has become a continuing trend.Keywords: big data, evolutionary computing, cloud, precision technologies
Procedia PDF Downloads 1894138 Comparing the Theory to the Practice of Islamic Banking: A Case Study of Pakistan
Authors: Zareen Khan
Abstract:
Islamic Banking has experienced high growth in Pakistan in recent years and has successfully survived the economic downturn of 2009-2011. Despite the increase in branch network and expansion of services, it is unclear if Islamic banks are truly following the theory and practical application of Shariah Law. This paper explores the theological basis of Islamic finance and examines the discrepancies between the theory and practice of Islamic banking using Pakistan as a case study. It discusses areas where Islamic banks lack proper Shariah compliance and analyzes the financial weaknesses of Islamic banks in terms of the services offered. Furthermore, the paper offers plausible explanations for the clientele of Islamic banks. The case study has three major findings. Firstly, most of the employees of Islamic banks come from conventional banking backgrounds and the banks have to invest in additional trainings to specialize employees in Islamic Banking. Secondly despite the efforts of State Bank of Pakistan, there is a lack of accounting and auditing standards tailored for Islamic Banking. Thirdly, majority of the clients of Islamic banks in Pakistan are accustomed to conventional banking causing the bankers to “speak the conventional banking language.” Combined, these three factors can create gaps in the practical application of Islamic finance in Islamic banks in Pakistan.Keywords: islamic finance, comparing theory with practice, islamic banking, Pakistan
Procedia PDF Downloads 4624137 A Review on the Hydrologic and Hydraulic Performances in Low Impact Development-Best Management Practices Treatment Train
Authors: Fatin Khalida Abdul Khadir, Husna Takaijudin
Abstract:
Bioretention system is one of the alternatives to approach the conventional stormwater management, low impact development (LID) strategy for best management practices (BMPs). Incorporating both filtration and infiltration, initial research on bioretention systems has shown that this practice extensively decreases runoff volumes and peak flows. The LID-BMP treatment train is one of the latest LID-BMPs for stormwater treatments in urbanized watersheds. The treatment train is developed to overcome the drawbacks that arise from conventional LID-BMPs and aims to enhance the performance of the existing practices. In addition, it is also used to improve treatments in both water quality and water quantity controls as well as maintaining the natural hydrology of an area despite the current massive developments. The objective of this paper is to review the effectiveness of the conventional LID-BMPS on hydrologic and hydraulic performances through column studies in different configurations. The previous studies on the applications of LID-BMP treatment train that were developed to overcome the drawbacks of conventional LID-BMPs are reviewed and use as the guidelines for implementing this system in Universiti Teknologi Petronas (UTP) and elsewhere. The reviews on the analysis conducted for hydrologic and hydraulic performances using the artificial neural network (ANN) model are done in order to be utilized in this study. In this study, the role of the LID-BMP treatment train is tested by arranging bioretention cells in series in order to be implemented for controlling floods that occurred currently and in the future when the construction of the new buildings in UTP completed. A summary of the research findings on the performances of the system is provided which includes the proposed modifications on the designs.Keywords: bioretention system, LID-BMP treatment train, hydrological and hydraulic performance, ANN analysis
Procedia PDF Downloads 1184136 Digital Homeostasis: Tangible Computing as a Multi-Sensory Installation
Authors: Andrea Macruz
Abstract:
This paper explores computation as a process for design by examining how computers can become more than an operative strategy in a designer's toolkit. It documents this, building upon concepts of neuroscience and Antonio Damasio's Homeostasis Theory, which is the control of bodily states through feedback intended to keep conditions favorable for life. To do this, it follows a methodology through algorithmic drawing and discusses the outcomes of three multi-sensory design installations, which culminated from a course in an academic setting. It explains both the studio process that took place to create the installations and the computational process that was developed, related to the fields of algorithmic design and tangible computing. It discusses how designers can use computational range to achieve homeostasis related to sensory data in a multi-sensory installation. The outcomes show clearly how people and computers interact with different sensory modalities and affordances. They propose using computers as meta-physical stabilizers rather than tools.Keywords: algorithmic drawing, Antonio Damasio, emotion, homeostasis, multi-sensory installation, neuroscience
Procedia PDF Downloads 1064135 Comparison Between Nano Composite and Pits and Fissure Sealant: In Vitro Study
Authors: Osama Safwat Mohamed
Abstract:
Pits and fissures dental caries can be prevented using sealant material. This study aimed to compare the microleakage and interfacial morphology of flowable nanocomposites and conventional pit and fissure sealants. 60 extracted intact and caries-free permanent mandibular third molars. The teeth were randomly divided into three groups (n = 20) according to the material used for pit and fissure sealant. Group I: Unfilled resin-based pits and fissure sealant, Group II: Unfilled resin-based pits and fissure sealant with bond and Group III: Nano flowable composite resin with bond. The results showed that nano-flowable composite was significantly better than the conventional sealants groups p = 0.000. As well there was better as well, there were gaps between sealants and the tooth surfaces in groups I and II, but for group III, there was close contact between the nano-flowable composite and tooth surfaces. It was concluded that nano-flowable composite showed better microleakage and interfacial morphology results than conventional pits and fissure sealant and offered promising results at the fissure sealing.Keywords: pits and fissures, Sealant, nanocomposite, dental caries
Procedia PDF Downloads 1274134 Effects of Kinesio Taping on Pain and Functions of Chronic Nonspecific Low Back Pain Patients
Authors: Ahmed Assem Abd El Rahim
Abstract:
BACKGROUND: Low back pain (LBP) is enormously common health problem& most of subjects experience it at some point of their life. Kinesio-taping is one of therapy methods introduced for studied cases with nonspecific low back pain. OBJECTIVES: to look at how Kinesio-taping affects studied cases with non-specific low back pain in terms of discomfort, range of motion, & back muscular strength. SUBJECTS: 40 mechanical LBP patients aged 20-40 years had been assigned haphazardly into two groups, They had been selected from outpatient clinic, KasrAl-AiniHospital, Cairo university. Methods: GroupA: 20 patients received the I-shape KT longitudinally & conventional physiotherapy program. Group B:20 studied cases received application of the KT Horizontally & conventional physiotherapy program. pain had been measured by visual analog scale, Range of motion had been measured by Roland Morris Disability Questionnaire (RMDQ), & strength had been measured by an isokinetic dynamometer before & after therapy. Therapy sessions had been three times weekly for four weeks. RESULTS: Groups (A & B) discovered decrease in pain& disability and rise in their flexion, extension ROM & peak torque of trunk extensor after end of 4 weeks of program. mean values of pain scale after therapy had been 3.7 and 5.04 in groups A & B. mean values of Disability scale after treatment had been 7.87.and 9.35 in groups A & B. mean values of ROM of flexion had been 28.06, and 24.53 in groups A & B. mean values of ROM of extension had been 13.43 & 10.73 in groups A & B. mean values of Peak torque of lumbar extensors were 65.43 and 63.22 in groups A & B. Though, participants who received the I-shape KT longitudinally as well as conventional physiotherapy program (group A), discovered more reduction in pain& disability and more improvement in ROM of flexion, extension, and Peak torque of lumbar extensors value (P<0.001) after therapy program CONCLUSION: Therapeutic longitudinal Kinesio-taping application with conventional physiotherapy will be more valuable than Therapeutic horizontal Kinesio-taping application with conventional physiotherapy when treating nonspecific low back pain studied cases.Keywords: Kinesio taping, function, low back pain, muscle power
Procedia PDF Downloads 624133 Design Off-Campus Interactive Cloud-Based Learning Model
Authors: Osamah Al Qadoori
Abstract:
Using cloud computing in educational sectors grow rapidly in UAE. Initially, within Cloud-Learning Environment Students whenever and wherever can remotely join the online-classroom, on the other hand, Cloud-Based Learning is greatly decreasing the infrastructure and the maintenance cost. Nowadays in many schools (K-12), institutes, colleges as well as universities in UAE Cloud-Based Teaching and Learning environments gain a higher demand and concern. Many students don’t use the available online-educational resources effectively. The challenging question is to which extend these educational resources which are installed in the cloud environment are valuable and constructive? In this paper the researcher is seeking to design an expert agent prototype where the huge information being accommodated inside the cloud environment will go through expert filtration before going to be utilized by other clients (students). To achieve this goal, the focus of the present research would be on two different directions the educational human expertise and the automated-educational expert systems.Keywords: cloud computing, cloud-learning environment, online-classroom, the educational human expertise, the automated-educational expert systems
Procedia PDF Downloads 5404132 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 4804131 Input Energy Requirements and Performance of Different Soil Tillage Systems on Yield of Maize Crop
Authors: Shafique Qadir Memon, Muhammad Safar Mirjat, Abdul Quadir Mughal, Nadeem Amjad
Abstract:
The aims of this study were to determine direct input energy and indirect energy in maize production, to evaluate the inputs energy consumption and outputs energy gained for maize production in Islamabad, Pakistan for spring 2013. Results showed that grain yield was maximum under deep tillage as compared to conventional and zero tillage. Total energy input/output were maximum in deep tillage as compared to conventional tillage while lowest in zero tillage, net energy gain were found maximum under deep tillage.Keywords: tillage, energy, grain yield, net energy gain
Procedia PDF Downloads 4594130 Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing
Authors: Ahmed Tarek, Ahmed Alveed
Abstract:
In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet.Keywords: alphabet, codeword, deduction, mathematical, induction, recurrence relation, strong induction, structural induction, weak induction
Procedia PDF Downloads 1634129 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 2624128 Portable and Parallel Accelerated Development Method for Field-Programmable Gate Array (FPGA)-Central Processing Unit (CPU)- Graphics Processing Unit (GPU) Heterogeneous Computing
Authors: Nan Hu, Chao Wang, Xi Li, Xuehai Zhou
Abstract:
The field-programmable gate array (FPGA) has been widely adopted in the high-performance computing domain. In recent years, the embedded system-on-a-chip (SoC) contains coarse granularity multi-core CPU (central processing unit) and mobile GPU (graphics processing unit) that can be used as general-purpose accelerators. The motivation is that algorithms of various parallel characteristics can be efficiently mapped to the heterogeneous architecture coupled with these three processors. The CPU and GPU offload partial computationally intensive tasks from the FPGA to reduce the resource consumption and lower the overall cost of the system. However, in present common scenarios, the applications always utilize only one type of accelerator because the development approach supporting the collaboration of the heterogeneous processors faces challenges. Therefore, a systematic approach takes advantage of write-once-run-anywhere portability, high execution performance of the modules mapped to various architectures and facilitates the exploration of design space. In this paper, A servant-execution-flow model is proposed for the abstraction of the cooperation of the heterogeneous processors, which supports task partition, communication and synchronization. At its first run, the intermediate language represented by the data flow diagram can generate the executable code of the target processor or can be converted into high-level programming languages. The instantiation parameters efficiently control the relationship between the modules and computational units, including two hierarchical processing units mapping and adjustment of data-level parallelism. An embedded system of a three-dimensional waveform oscilloscope is selected as a case study. The performance of algorithms such as contrast stretching, etc., are analyzed with implementations on various combinations of these processors. The experimental results show that the heterogeneous computing system with less than 35% resources achieves similar performance to the pure FPGA and approximate energy efficiency.Keywords: FPGA-CPU-GPU collaboration, design space exploration, heterogeneous computing, intermediate language, parameterized instantiation
Procedia PDF Downloads 1184127 Design, Development, and Performance Evaluation of Hybrid Cross Axis Wind Turbine
Authors: Gwani M., Umar M. Kangiwa, Bello A. Umar, Gado A. Abubakar
Abstract:
The increasing demand for sustainable energy solutions has driven significant interest in the development of innovative designs of wind turbines. The horizontal axis wind turbine (HAWT) and the vertical axis wind turbine (VAWT) are the dominant type of wind turbine used for power generation. However, these turbines have their respective merits and demerits, which affect their performance. This study introduces a Hybrid Cross Axis Wind Turbine (HCAWT), which integrates the blades of both horizontal axis wind turbines (HAWTs) and vertical axis wind turbines (VAWTs) in a cross-axis configuration with a Savonius rotor to form a hybrid system. The HCAWT combines the self-starting capabilities of Savonius rotors with the high-efficiency characteristics of Darrieus rotors and HAWT, aiming to optimize performance across a range of wind conditions. The performance of the HCAWT was tested and evaluated against a cross-axis wind turbine (CAWT) and a conventional VAWT under similar experimental conditions. The study’s results indicate that the HCAWT outperformed both the CAWT and the conventional VAWT. The power coefficient (Cp) of the HCAWT increases by 83% and 132% compared to that of the CAWT and conventional VAWT, respectively. The findings show that the HCAWT offers better start-up performance and maintains higher efficiency at lower wind speeds compared to CAWT and conventional VAWT. The findings suggest that the HCAWT offers significant improvements in energy capture, particularly in turbulent wind conditions, and greater adaptability to changing wind conditions, making it a viable option for both urban and rural energy applications.Keywords: renewable energy, hybrid, cross axis wind turbine, energy efficiency
Procedia PDF Downloads 104126 A Comparison Study of Different Methods Used in the Detection of Giardia lamblia on Fecal Specimen of Children
Authors: Muhammad Farooq Baig
Abstract:
Objective: The purpose of this study was to compare results obtained using a single fecal specimen for O&P examination, direct immunofluorescence assay (DFA), and two conventional staining methods. Design: Hundred and fifty children fecal specimens were collected and examined by each method. The O&P and the DFA were used as the reference method. Setting: The study was performed at the laboratory in the Basic Medical Science Institute JPMC Karachi. Patients or Other Participants: The fecal specimens were collected from children with a suspected Giardia lamblia infection. Main Outcome Measures: The amount of agreement and disagreement between methods.1) Presence of giardiasis in our population. 2) The sensitivity and specificity of each method. Results: There was 45(30%) positive 105 (70%) negative on DFA, 41 (27.4%) positive 109 (72.6%) negative on iodine and 34 (22.6%) positive 116(77.4%) on saline method. The sensitivity and specificity of DFA in comparision to iodine were 92.2%, 92.7% respectively. The sensitivity and specificity of DFA in comparisoin to saline method were 91.2%, 87.9% respectively. The sensitivity of iodine method and saline method in compariosn to DFA were 82.2%, 68.8% respectively. There is mark diffrence in sensitivity of DFA to conventional method. Conclusion: The study supported findings of other investigators who concluded that DFA method have the greater sensitivity. The immunologic methods were more efficient and quicker than the conventional O&P method.Keywords: direct immunofluorescence assay (DFA), ova and parasite (O&P), Giardia lamblia, children, medical science
Procedia PDF Downloads 4234125 Opto-Mechanical Characterization of Aspheric Lenses from the Hybrid Method
Authors: Aliouane Toufik, Hamdi Amine, Bouzid Djamel
Abstract:
Aspheric optical components are an alternative to the use of conventional lenses in the implementation of imaging systems for the visible range. Spherical lenses are capable of producing aberrations. Therefore, they are not able to focus all the light into a single point. Instead, aspherical lenses correct aberrations and provide better resolution even with compact lenses incorporating a small number of lenses. Metrology of these components is very difficult especially when the resolution requirements increase and insufficient or complexity of conventional tools requires the development of specific approaches to characterization. This work is part of the problem existed because the objectives are the study and comparison of different methods used to measure surface rays hybrid aspherical lenses.Keywords: manufacture of lenses, aspherical surface, precision molding, radius of curvature, roughness
Procedia PDF Downloads 4674124 High Speed Image Rotation Algorithm
Authors: Hee-Choul Kwon, Hyungjin Cho, Heeyong Kwon
Abstract:
Image rotation is one of main pre-processing step in image processing or image pattern recognition. It is implemented with rotation matrix multiplication. However it requires lots of floating point arithmetic operations and trigonometric function calculations, so it takes long execution time. We propose a new high speed image rotation algorithm without two major time-consuming operations. We compare the proposed algorithm with the conventional rotation one with various size images. Experimental results show that the proposed algorithm is superior to the conventional rotation ones.Keywords: high speed rotation operation, image processing, image rotation, pattern recognition, transformation matrix
Procedia PDF Downloads 5064123 Spherical Harmonic Based Monostatic Anisotropic Point Scatterer Model for RADAR Applications
Authors: Eric Huang, Coleman DeLude, Justin Romberg, Saibal Mukhopadhyay, Madhavan Swaminathan
Abstract:
High performance computing (HPC) based emulators can be used to model the scattering from multiple stationary and moving targets for RADAR applications. These emulators rely on the RADAR Cross Section (RCS) of the targets being available in complex scenarios. Representing the RCS using tables generated from electromagnetic (EM) simulations is often times cumbersome leading to large storage requirement. This paper proposed a spherical harmonic based anisotropic scatterer model to represent the RCS of complex targets. The problem of finding the locations and reflection profiles of all scatterers can be formulated as a linear least square problem with a special sparsity constraint. This paper solves this problem using a modified Orthogonal Matching Pursuit algorithm. The results show that the spherical harmonic based scatterer model can effectively represent the RCS data of complex targets.Keywords: RADAR, RCS, high performance computing, point scatterer model
Procedia PDF Downloads 1914122 Implementation of 'Bay Al-Salam' in Agricultural Banking of Bangladesh: An Islamic Banking Perspective
Authors: M. Obydul Haque Kamaly
Abstract:
This paper aims to provide a brief discussion on bay al-salam as a method of implementing Islamic Banking in the agricultural arena of Bangladesh. For this purpose, the nature and conditions of bay al-salam contracts will be first discussed. Next, the paper will focus on the comparison between conventional banks and Islamic banks and should answer how bay al-salam can be used as a popular method in agricultural transactions in the country. The paper is based on secondary data which is to describe bay al-salam as future proceedings for Islamic banking. Evidence suggests Islamic banking is very much practiced like modern conventional banking with certain restrictions imposed by Sharia and addresses a large number of business requirements successfully. Thus, it’s time for us to implement Islamic banking (bay al-salam) on our agricultural arena and to get most benefits from them.Keywords: bay al-salam, agricultural banking, Islamic banking, implementation
Procedia PDF Downloads 2634121 Using the M-Learning to Support Learning of the Concept of the Derivative
Authors: Elena F. Ruiz, Marina Vicario, Chadwick Carreto, Rubén Peredo
Abstract:
One of the main obstacles in Mexico’s engineering programs is math comprehension, especially in the Derivative concept. Due to this, we present a study case that relates Mobile Computing and Classroom Learning in the “Escuela Superior de Cómputo”, based on the Educational model of the Instituto Politécnico Nacional (competence based work and problem solutions) in which we propose apps and activities to teach the concept of the Derivative. M- Learning is emphasized as one of its lines, as the objective is the use of mobile devices running an app that uses its components such as sensors, screen, camera and processing power in classroom work. In this paper, we employed Augmented Reality (ARRoC), based on the good results this technology has had in the field of learning. This proposal was developed using a qualitative research methodology supported by quantitative research. The methodological instruments used on this proposal are: observation, questionnaires, interviews and evaluations. We obtained positive results with a 40% increase using M-Learning, from the 20% increase using traditional means.Keywords: augmented reality, classroom learning, educational research, mobile computing
Procedia PDF Downloads 3604120 The Use of Orthodontic Pacifiers to Prevent Pacifier Induced Malocclusion - A Literature Review
Authors: Maliha Ahmed Suleman, Sidra Ahmed Suleman
Abstract:
Introduction: The use of pacifiers is common amongst infants and young children as a comforting behavior. These non-nutritive sucking habits can be detrimental to the developing occlusion should they persist while the permanent dentition is established. Orthodontic pacifiers have been recommended as an alternative to conventional pacifiers as they are considered to have less interference with orofacial development. However, there is a lack of consensus on whether this is true. Aim and objectives: To review the prevalence of malocclusion associated with the use of orthodontic pacifiers. Methodology: Literature was identified through a rigorous search of the Embase, Pubmed, CINAHL, and Cochrane Library databases. Articles published from 2000 onwards were included. In total, 5 suitable papers were identified. Results: One study showed that the use of orthodontic pacifiers increased the risk of malocclusion, as seen through a greater prevalence of accentuated overjet, posterior crossbites, and anterior open bites in comparison to individuals who did not use pacifiers. However, this study found that there was a clinically significant reduction in the prevalence of anterior open bites amongst orthodontic pacifier users in comparison to conventional pacifier users. Another study found that both types of pacifiers lead to malocclusion; however, they found no difference in the mean overjet and prevalence of anterior open bites amongst conventional and orthodontic pacifier users. In contrast, one study suggested that orthodontic pacifiers do not seem to be related to the development of malocclusions in the primary dentitions, and using them between the ages of 0-3 months was actually beneficial as it prevents thumb-sucking habits. One of the systemic reviews concluded that orthodontic pacifiers do not seem to reduce the occurrence of posterior crossbites; however, they could reduce the development of open bites by virtue of their thin neck design. Whereas another systematic review concluded that there were no differences as to the effects on the stomatognathic system when comparing conventional and orthodontic pacifiers. Conclusion: There is limited and conflicting evidence to support the notion that orthodontic pacifiers can reduce the prevalence of malocclusion when compared to conventional pacifiers. Well-designed randomized controlled trials are required in the future in order to thoroughly assess the effects of orthodontic pacifiers on the developing occlusion and orofacial structures.Keywords: orthodontics, pacifier, malocclusion, review
Procedia PDF Downloads 854119 Design and Study of a Low Power High Speed Full Adder Using GDI Multiplexer
Authors: Biswarup Mukherjee, Aniruddha Ghosal
Abstract:
In this paper, we propose a new technique for implementing a low power full adder using a set of GDI multiplexers. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have low power operation for the sub components. The explored method of implementation achieves a low power design for the full adder. Simulated results using state-of-art Tanner tool indicates the superior performance of the proposed technique over conventional CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.Keywords: low power full adder, 2-T GDI MUX, ASIC (application specific integrated circuit), 12-T FA, CMOS (complementary metal oxide semiconductor)
Procedia PDF Downloads 3484118 Design Aspects of 3D Printing for Fashion and Textiles
Authors: Chi-Chung Marven Chick, Chu-Po Ho, Sau-Chuen Joe Au, Wing-Fai Sidney Wong, Chi-Wai Kan
Abstract:
3D printing is now drawing attention to manufacturing process. In fashion and textile industry, many 3D printing applications had been developed for prototyping or even final product production because of its great flexibility in production. However, when compared with conventional manufacturing processes for fashion and textiles, the design aspects and requirements may not be same for using 3D printing process. Therefore, in this paper, we will compare the design aspects between conventional manufacturing processes and 3D printing processes. Also, the material requirements related to the design in 3D printing for fashion and textiles will be reviewed and discussed. This review paper may demonstrate a possible way to develop 3D printing method(s) for fashion and textiles.Keywords: 3D printing, design, textile, applications
Procedia PDF Downloads 574117 Modified Newton's Iterative Method for Solving System of Nonlinear Equations in Two Variables
Authors: Sara Mahesar, Saleem M. Chandio, Hira Soomro
Abstract:
Nonlinear system of equations in two variables is a system which contains variables of degree greater or equal to two or that comprises of the transcendental functions. Mathematical modeling of numerous physical problems occurs as a system of nonlinear equations. In applied and pure mathematics it is the main dispute to solve a system of nonlinear equations. Numerical techniques mainly used for finding the solution to problems where analytical methods are failed, which leads to the inexact solutions. To find the exact roots or solutions in case of the system of non-linear equations there does not exist any analytical technique. Various methods have been proposed to solve such systems with an improved rate of convergence and accuracy. In this paper, a new scheme is developed for solving system of non-linear equation in two variables. The iterative scheme proposed here is modified form of the conventional Newton’s Method (CN) whose order of convergence is two whereas the order of convergence of the devised technique is three. Furthermore, the detailed error and convergence analysis of the proposed method is also examined. Additionally, various numerical test problems are compared with the results of its counterpart conventional Newton’s Method (CN) which confirms the theoretic consequences of the proposed method.Keywords: conventional Newton’s method, modified Newton’s method, order of convergence, system of nonlinear equations
Procedia PDF Downloads 256