Search results for: Durga Prasad D.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 238

Search results for: Durga Prasad D.

208 On Optimum Stratification

Authors: M. G. M. Khan, V. D. Prasad, D. K. Rao

Abstract:

In this manuscript, we discuss the problem of determining the optimum stratification of a study (or main) variable based on the auxiliary variable that follows a uniform distribution. If the stratification of survey variable is made using the auxiliary variable it may lead to substantial gains in precision of the estimates. This problem is formulated as a Nonlinear Programming Problem (NLPP), which turn out to multistage decision problem and is solved using dynamic programming technique.

Keywords: auxiliary variable, dynamic programming technique, nonlinear programming problem, optimum stratification, uniform distribution

Procedia PDF Downloads 305
207 A Hybrid Data Mining Algorithm Based System for Intelligent Defence Mission Readiness and Maintenance Scheduling

Authors: Shivam Dwivedi, Sumit Prakash Gupta, Durga Toshniwal

Abstract:

It is a challenging task in today’s date to keep defence forces in the highest state of combat readiness with budgetary constraints. A huge amount of time and money is squandered in the unnecessary and expensive traditional maintenance activities. To overcome this limitation Defence Intelligent Mission Readiness and Maintenance Scheduling System has been proposed, which ameliorates the maintenance system by diagnosing the condition and predicting the maintenance requirements. Based on new data mining algorithms, this system intelligently optimises mission readiness for imminent operations and maintenance scheduling in repair echelons. With modified data mining algorithms such as Weighted Feature Ranking Genetic Algorithm and SVM-Random Forest Linear ensemble, it improves the reliability, availability and safety, alongside reducing maintenance cost and Equipment Out of Action (EOA) time. The results clearly conclude that the introduced algorithms have an edge over the conventional data mining algorithms. The system utilizing the intelligent condition-based maintenance approach improves the operational and maintenance decision strategy of the defence force.

Keywords: condition based maintenance, data mining, defence maintenance, ensemble, genetic algorithms, maintenance scheduling, mission capability

Procedia PDF Downloads 271
206 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 62
205 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 94
204 Labyrinth Fractal on a Convex Quadrilateral

Authors: Harsha Gopalakrishnan, Srijanani Anurag Prasad

Abstract:

Quadrilateral labyrinth fractals are a new type of fractals that are introduced in this paper. They belong to a unique class of fractals on any plane quadrilateral. The previously researched labyrinth fractals on the unit square and triangle inspire this form of fractal. This work describes how to construct a quadrilateral labyrinth fractal and looks at the circumstances in which it can be understood as the attractor of an iterated function system. Furthermore, some of its topological properties and the Hausdorff and box-counting dimensions of the quadrilateral labyrinth fractals are studied.

Keywords: fractals, labyrinth fractals, dendrites, iterated function system, Haus-Dorff dimension, box-counting dimension, non-self similar, non-self affine, connected, path connected

Procedia PDF Downloads 49
203 Variation in Orbital Elements of Mars and Jupiter Due to the Sun Oblateness by Using Secular Theory

Authors: Avaneesh Vaishwar, Badam Singh Kushvah, Devi Prasad Mishra

Abstract:

We studied the variation in orbital elements of Mars and Jupiter for a time span of 200 thousand years by using secular theory. Here we took Sun oblateness into account and considered the first two zonal gravity constants (J2 and J4) for showing the effect of Sun oblateness on the orbital elements of Mars and Jupiter. We found that in both cases (with and without Sun oblateness) the variation in orbital elements of Mars and Jupiter is periodic moreover in case of the Sun oblateness, the period of variation in orbital elements is decreasing for both the planets.

Keywords: lagrange's planetary equation, orbital elements, planetary system, secular theory

Procedia PDF Downloads 194
202 Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology

Authors: Lin Yunuo, Seow Xing Quan, Burra Venkata Durga Kumar

Abstract:

In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section.

Keywords: cloud computing, cloud operation system, multitenancy, resource allocation, utilization of cloud resources

Procedia PDF Downloads 63
201 Impact of Brassinosteroid with GA3, CPPU on Yield and Quality of Newly Introduced Grape cv. Italia

Authors: Senthilkumar S, Vijayakumar R M , Soorianathasundaram K, Durga Devi D

Abstract:

A study was conducted to assess the influence of brassinosteroid and other bioregulators as pre-harvest sprays on yield and quality of newly introduced Californian grape cv. Italia. The vines were exposed to standardized pruning level of pruning 50% of the canes to 5-6 bud level for fruiting and 50% of the canes to two bud level for vegetative growth. The influence of brassinosteroid was assessed using BR (1 ppm) alone and in combination with GA3 and CPPU, sprayed at three different stages over the control (water spray) were given as treatments. The results revealed that the bunches treated with Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage i.e., 7-8 mm berry size, recorded the maximum values on yield characters like bunch weight (719.94 g), yield per vine (12.70 kg/vine) and yield per hectare (15.88 t). The berry characters and quality traits were also significantly influenced by the application of bioregulators. The maximum value for all those characters was registered under bunch sprays of Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage. The economic feasibility indicated that the treatment combination Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage (7-8 mm berry size) had registered the maximum benefit cost ratio of 3.13, as compared to 1.89 in control (water spray). Overall, it was observed that a combined bunch spray of Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage (7-8 mm berry size) was adjudged as the best treatment for promoting the crop for better the bunch quality and yield.

Keywords: bioregulators, brassinosteroid, CPPU, GA3, Italia grape cultivar

Procedia PDF Downloads 217
200 Antioxidant Activity Studies of Novel Schiff and Mannich Bases

Authors: D. J. Madhu Kumar, D. Jagadeesh Prasad, Sana Sheik, E. P. Rejeesh

Abstract:

A series of Mannich bases derived from 1,2,4-triazole(3a-k and 4a-k) are synthesized by treating a Schiff base with various substituted primary/secondary amines and formaldehyde. The Schiff base is prepared by treating 3-methyl-4-amino-5-mercapto-1,2,4-triazole with 3,4-dimethoxybenzaldehyde in the presence of acid catalyst. The triazole is prepared by treating acetic acid with thiocarbohydrazide at reflux temperature. All the synthesized samples are characterised by FT-IR, 1H-NMR, and LC-MASS spectral studies and screened for their anti-oxidant activity.

Keywords: mannich bases, anti-oxidant activity, schiff base, triazole

Procedia PDF Downloads 491
199 Energy-Aware Scheduling in Real-Time Systems: An Analysis of Fair Share Scheduling and Priority-Driven Preemptive Scheduling

Authors: Su Xiaohan, Jin Chicheng, Liu Yijing, Burra Venkata Durga Kumar

Abstract:

Energy-aware scheduling in real-time systems aims to minimize energy consumption, but issues related to resource reservation and timing constraints remain challenges. This study focuses on analyzing two scheduling algorithms, Fair-Share Scheduling (FFS) and Priority-Driven Preemptive Scheduling (PDPS), for solving these issues and energy-aware scheduling in real-time systems. Based on research on both algorithms and the processes of solving two problems, it can be found that Fair-Share Scheduling ensures fair allocation of resources but needs to improve with an imbalanced system load, and Priority-Driven Preemptive Scheduling prioritizes tasks based on criticality to meet timing constraints through preemption but relies heavily on task prioritization and may not be energy efficient. Therefore, improvements to both algorithms with energy-aware features will be proposed. Future work should focus on developing hybrid scheduling techniques that minimize energy consumption through intelligent task prioritization, resource allocation, and meeting time constraints.

Keywords: energy-aware scheduling, fair-share scheduling, priority-driven preemptive scheduling, real-time systems, optimization, resource reservation, timing constraints

Procedia PDF Downloads 100
198 Resource Sharing Issues of Distributed Systems Influences on Healthcare Sector Concurrent Environment

Authors: Soo Hong Da, Ng Zheng Yao, Burra Venkata Durga Kumar

Abstract:

The Healthcare sector is a business that consists of providing medical services, manufacturing medical equipment and drugs as well as providing medical insurance to the public. Most of the time, the data stored in the healthcare database is to be related to patient’s information which is required to be accurate when it is accessed by authorized stakeholders. In distributed systems, one important issue is concurrency in the system as it ensures the shared resources to be synchronized and remains consistent through multiple read and write operations by multiple clients. The problems of concurrency in the healthcare sector are who gets the access and how the shared data is synchronized and remains consistent when there are two or more stakeholders attempting to the shared data simultaneously. In this paper, a framework that is beneficial to distributed healthcare sector concurrent environment is proposed. In the proposed framework, four different level nodes of the database, which are national center, regional center, referral center, and local center are explained. Moreover, the frame synchronization is not symmetrical. There are two synchronization techniques, which are complete and partial synchronization operation are explained. Furthermore, when there are multiple clients accessed at the same time, synchronization types are also discussed with cases at different levels and priorities to ensure data is synchronized throughout the processes.

Keywords: resources, healthcare, concurrency, synchronization, stakeholders, database

Procedia PDF Downloads 127
197 Potentiostatic Growth of Hazenite Mineral Coating on AZ31 Magnesium Alloy in 0.1 M K₂HPO₄/0.1 M Na₂HPO₄ Solution

Authors: Liping Wu, Durga Bhakta Pokharel, Junhua Dong, Changgang Wang, Lin Zhao, Wei Ke, Nan Chen

Abstract:

Hazenite conversion coating was deposited on AZ31 Mg alloy in a deaerated phosphate solution containing 0.1 M K₂HPO₄ and 0.1 M Na₂HPO₄ (Na₀.₁K0₀.₁) with pH 9 at −0.8 V. The coating mechanism of hazenite was elucidated by in situ potentiostatic current decay, scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS), Fourier transform infrared spectroscopy (FT-IR), electron probe micro-analyzer (EPMA) and differential scanning calorimetry (DSC). The volume of H₂ evolved during potentiostatic polarization was measured by a gas collection apparatus. The degradation resistance of the hazenite coating was evaluated in simulated body fluid (SBF) at 37℃ by using potentiodynamic polarization (PDP). The results showed that amorphous Mg(OH)₂ was deposited first, followed by the transformation of Mg(OH)₂ to amorphous MgHPO₄, subsequently the conversion of MgHPO₄ to crystallized K-struvite (KMgPO₄·6H₂O), finally the crystallization of crystallized hazenite (NaKMg₂(PO₄)₂·14H₂O). The deposited coating was composed of four layers where the inner layer is comprised of Mg(OH)₂, the middle layer of Mg(OH)₂ and MgHPO₄, the top layer of Mg(OH)₂, MgHPO₄ and K-struvite, the topmost layer of Mg(OH)₂, MgHPO₄, K-struvite and hazenite (NaKMg₂(PO₄)₂·14H₂O). The PD results showed that the hazenite coating decreased the corrosion rate by two orders of magnitude.

Keywords: magnesium alloy, potentiostatic technique, hazenite, mineral conversion coating

Procedia PDF Downloads 150
196 Spectacles of the City: An Analysis of the Effects of Festivals in the Formation of New Urban Identities

Authors: Anusmita Das

Abstract:

In the post-industrial scenario, cities in India have become critical sites of negotiation and are expected to become some of the largest urban agglomeration of the twenty-first century. This has created a pluralist identity resulting in a new multifarious urbanism pervading throughout the entire urban landscape. There is an ambiguity regarding the character of present day Indian cities with new meanings emerging and no methodical study to understand them. More than an abstract diagram, the present day cities can be looked at as an ensemble of meanings. One of the ways in which the meaning is reflected is through events. Festivals such as Diwali, Dussera, Durga Puja, Ganesh Chaturthi, etc have transpired as the phenomenon of the city, and their presence in the everyday landscape weaves itself through the urban fabric dominating the popular visual culture of Indian cities. Festivals influence people’s idea of a city. Ritual, festival, celebrations are important in shaping of the urban environment and in their influence on the intangible aspect of the urban setting. These festivals pertaining to the city in motion have emerged as the symbolic image of the emerging urban Indian condition giving birth to new urban identities. The study undertaken to understand the present context of temporality of Indian cities is important in analyzing the process of its formation and transformation. This study aims to review the evolution of new dimensions of urbanism in India as well as its implication on the identity of cities.

Keywords: urban identities, urban design, festivals, rituals, celebrations, inter-disciplinary study

Procedia PDF Downloads 227
195 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 117
194 Experimental Study on Effects of Addition of Rice Husk on Coal Gasification

Authors: M. Bharath, Vasudevan Raghavan, B. V. S. S. S. Prasad, S. R. Chakravarthy

Abstract:

In this experimental study, effects of addition of rice husk on coal gasification in a bubbling fluidized bed gasifier, operating at atmospheric pressure with air as gasifying agent, are reported. Rice husks comprising of 6.5% and 13% by mass are added to coal. Results show that, when rice husk is added the methane yield increases from volumetric percentage of 0.56% (with no rice husk) to 2.77% (with 13% rice husk). CO and H2 remain almost unchanged and CO2 decreases with addition of rice husk. The calorific value of the synthetic gas is around 2.73 MJ/Nm3. All performance indices, such as cold gas efficiency and carbon conversion, increase with addition of rice husk.

Keywords: bubbling fluidized bed reactor, calorific value, coal gasification, rice husk

Procedia PDF Downloads 199
193 [Keynote Talk]: Implementation of 5 Level and 7 Level Multilevel Inverter in Local Trains of Mumbai

Authors: Sharvari Sane, Swati Sharma, Sanjay K. Prasad

Abstract:

Local trains are the lifelines of Mumbai city. Earlier 1500 Volt D.C. supply, is now completely and successfully converted into 25 KV A.C. in central, western and harbour routes. This task is the outcome of the advancement in the area of power electronics. Author has already done the comparative study between D.C. and A.C. supply of traction and predicted the serious problem regarding the harmonics. In this paper, the simulation for 5 level as well as 7 level multilevel inverter has been done which is the substitute for the present cascade type inverter. This paper also showed the reduced level of Total Harmonic Distortion (THD) in the traction system.

Keywords: total harmonic distortion (THD), traction sub station (TSS), harmonics, multilevel inverter

Procedia PDF Downloads 394
192 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 474
191 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 80
190 Challenges in Video Based Object Detection in Maritime Scenario Using Computer Vision

Authors: Dilip K. Prasad, C. Krishna Prasath, Deepu Rajan, Lily Rachmawati, Eshan Rajabally, Chai Quek

Abstract:

This paper discusses the technical challenges in maritime image processing and machine vision problems for video streams generated by cameras. Even well documented problems of horizon detection and registration of frames in a video are very challenging in maritime scenarios. More advanced problems of background subtraction and object detection in video streams are very challenging. Challenges arising from the dynamic nature of the background, unavailability of static cues, presence of small objects at distant backgrounds, illumination effects, all contribute to the challenges as discussed here.

Keywords: autonomous maritime vehicle, object detection, situation awareness, tracking

Procedia PDF Downloads 427
189 Modeling SET Effect on Charge Pump Phase Locked Loop

Authors: Varsha Prasad, S. Sandya

Abstract:

Cosmic Ray effects in microelectronics such as single event effect (SET) and total dose ionization (TID) have been of major concern in space electronics since 1970. Advanced CMOS technologies have demonstrated reduced sensitivity to TID effect. However, charge pump Phase Locked Loop is very much vulnerable to single event transient effect. This paper presents an SET analysis model, where the SET is modeled as a double exponential pulse. The time domain analysis reveals that the settling time of the voltage controlled oscillator (VCO) depends on the SET pulse strength, setting the time constant and the damping factor. The analysis of the proposed SET analysis model is confirmed by the simulation results.

Keywords: charge pump, phase locked loop, SET, VCO

Procedia PDF Downloads 413
188 Heavy Metal Contamination in Sediments of North East Coast of Tamilnadu by EDXRF Technique

Authors: R. Ravisankar, Tholkappian A. Chandrasekaran, Y. Raghu, K. K. Satapathy, M. V. R. Prasad, K. V. Kanagasabapathy

Abstract:

The coastal areas of Tamilnadu are assuming greater importance owing to increasing human population, urbanization and accelerated industrial activities. sIn the present study, sediment samples are collected along the east coast of Tamilnadu for assessment of heavy metal pollution. The concentration of 13 selected heavy metals such as Mg, Al, Si, K, Ca, Ti, Fe, V, Cr, Mn, Co, Ni and Zn determined by Energy dispersive X-ray fluorescence (EDXRF) technique. In order to describe the pollution status, Contamination factor and pollution load index are calculated and reported. This result suggests that sources of metal contamination were mainly attributed to natural inputs from surrounding environments.

Keywords: sediments, heavy metals, EDXRF, pollution contamination factors

Procedia PDF Downloads 315
187 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 25
186 Reverse Logistics, Green Supply Chain, and Carbon Trading

Authors: Neha Asthana, Vishal Krishna Prasad

Abstract:

Reverse logistics and green supply chain form an interconnected and interwoven network of parameters that contribute to enhancement and incremental exchange in the triple bottom line in the consistently changing and fragmenting markets of the globalizing markets of today. Reverse logistics not only contributes to completing the supply chain in a comprehensive and synchronized manner but also contributes to a significant degree in optimizing green supply chains through procedures such as recycling, refurbishing etc. contributing to waste reduction. Carbon trading, owing to its limitations in the global context and being in a nascent stage seeks plethora of research to determine its full application in synergy with reverse logistics and green supply chain.

Keywords: reverse logistics, carbon trading, carbon emissions, green supply chain

Procedia PDF Downloads 393
185 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 87
184 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning

Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar

Abstract:

As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.

Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence

Procedia PDF Downloads 85
183 Formulation and Anticancer Evaluation of Beta-Sitosterol in Henna Methanolic Extract Embedded in Controlled Release Nanocomposite

Authors: Sanjukta Badhai, Durga Barik, Bairagi C. Mallick

Abstract:

In the present study, Beta-Sitosterol in Lawsonia methanolic leaf extract embedded in controlled release nanocomposite was prepared and evaluated for in vivo anticancer efficacy in dimethyl hydrazine (DMH) induced colon cancer. In the present study, colon cancer was induced by s.c injection of DMH (20 mg/kg b.wt) for 15 weeks. The animals were divided into five groups as follows control, DMH alone, DMH and Beta Sitosterol nanocomposite (50mg/kg), DMH and Beta Sitosterol nanocomposite (100 mg/kg) and DMH and Standard Silymarin (100mg/kg) and the treatment was carried out for 15 weeks. At the end of the study period, the blood was withdrawn, and serum was separated for haematological, biochemical analysis and tumor markers. Further, the colonic tissue was removed for the estimation of antioxidants and histopathological analysis. The results of the study displays that DMH intoxication elicits altered haematological parameters (RBC,WBC, and Hb), elevated lipid peroxidation and decreased antioxidants level (SOD, CAT, GPX, GST and GSH), elevated lipid profiles (cholesterol and triglycerides), tumor markers (CEA and AFP) and altered colonic tissue histology. Meanwhile, treatment with Beta Sitosterol nanocomposites significantly restored the altered biochemicals parameters in DMH induced colon cancer mediated by its anticancer efficacy. Further, Beta Sitosterol nanocomposite (100 mg/kg) showed marked efficacy.

Keywords: nanocomposites, herbal formulation, henna, beta sitosterol, colon cancer, dimethyl hydrazine, antioxidant, lipid peroxidation

Procedia PDF Downloads 139
182 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 84
181 Studies on Design of Cyclone Separator with Tri-Chambered Filter Unit for Dust Removal in Rice Mills

Authors: T. K. Chandrashekar, R. Harish Kumar, T. B. Prasad, C. R. Rajashekhar

Abstract:

Cyclone separators are normally used for dust collection in rice mills for a long time. However, their dust collection efficiency is lower and is influenced by factors like geometry, exit pipe dimensions and length, humidity, and temperature at dust generation place. The design of cyclone has been slightly altered, and the new design has proven to be successful in collecting the dust particles of size up to 10 microns, the major modification was to change the height of exit pipe of the cyclone chamber to have optimum dust collection. The cyclone is coupled with a tri-chambered filter unit with three geo text materials filters of different mesh size to capture the dust less than 10 micron.

Keywords: cyclone-separator, rice mill, tri chambered filter, dust removal

Procedia PDF Downloads 492
180 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 494
179 Assessment of Treatment Methods to Remove Hazardous Dyes from Synthetic Wastewater

Authors: Abhiram Siva Prasad Pamula

Abstract:

Access to clean drinking water becomes scarce due to the increase in extreme weather events because of the rise in the average global temperatures and climate change. By 2030, approximately 47% of the world’s population will face water shortages due to uncertainty in seasonal rainfall. Over 10000 varieties of synthetic dyes are commercially available in the market and used by textile and paper industries, negatively impacting human health when ingested. Besides humans, textile dyes have a negative impact on aquatic ecosystems by increasing biological oxygen demand and chemical oxygen demand. This study assesses different treatment methods that remove dyes from textile wastewater while focusing on energy, economic, and engineering aspects of the treatment processes.

Keywords: textile wastewater, dye removal, treatment methods, hazardous pollutants

Procedia PDF Downloads 65