Search results for: edge computing module
2431 Addressing Rural Health Challenges: A Flexible Modular Approach for Resilient Healthcare Services
Authors: Pariya Sheykhmaleki, Debajyoti Pati
Abstract:
Rural areas in the United States face numerous challenges in providing quality and assessable primary healthcare services, especially during emergencies such as natural disasters or pandemics. This study showcases a cutting-edge flexible module that aims to overcome these challenges by offering adaptable healthcare facilities capable of providing comprehensive health services in remote and disaster-prone regions. According to the Health Resources and Services Administration (HRSA), approximately 62 million Americans, or 1 in 5 individuals, live in areas designated as Health Professional Shortage Areas (HPSAs) for primary care. These areas are characterized by limited access to healthcare facilities, shortage of healthcare professionals, transportation barriers, inadequate healthcare infrastructure, higher rates of chronic diseases, mental health disparities, and limited availability of specialized care, including urgent circumstances like pandemics that can exacerbate this issue. To address these challenges, the literature study began by examining primary health solutions in very remote areas, e.g., spaceships, to identify the state-of-the-art technologies and the methods used to facilitate primary care needs. The literature study on flexibility in architecture and interior design was also adapted to develop a conceptual design for rural areas. The designed flexible module provides an innovative solution. This module can be prefabricated as all parts are standardized. The flexibility of the module allows the structure to be modified based on local and geographical requirements as well as the ability to expand as required. It has been designed to stand either by itself or work in tandem with public buildings. By utilizing sustainable approaches and flexible spatial configurations, the module optimizes the utilization of limited resources while ensuring efficient and effective healthcare delivery. Furthermore, the poster highlights the key features of this flexible module, including its ability to support telemedicine and telehealth services for all five levels of urgent care conditions, i.e., from facilitating fast tracks to supporting emergency room services, in two divided zones. The module's versatility enables its deployment in rural areas located far from urban centers and disaster-stricken regions, ensuring access to critical healthcare services in times of need. This module is also capable of responding in urban areas when the need for primary health becomes vastly urgent, e.g., during a pandemic. It emphasizes the module's potential to bridge the healthcare gap between rural and urban areas and mitigate the impact of rural health challenges.Keywords: rural health, healthcare challenges, flexible modular design, telemedicine, telehealth
Procedia PDF Downloads 772430 Performance of the Photovoltaic Module under Different Shading Patterns
Authors: E. T. El Shenawy, O. N. A. Esmail, Adel A. Elbaset, Hesham F. A. Hamed
Abstract:
Generation of the electrical energy based on photovoltaic (PV) technology has been increased over the world due to either the continuous reduction in the traditional energy sources in addition to the pollution problems related to their usage, or the clean nature and safe usage of the PV technology. Also, PV systems can generate clean electricity in the site of use without any transmission, which can be considered cost effective than other generation systems. The performance of the PV system is highly affected by the amount of solar radiation incident on it. Completely or partially shaded PV systems can affect its output. The PV system can be shaded by trees, buildings, dust, incorrect system configuration, or other obstacles. The present paper studies the effect of the partial shading on the performance of a thin film PV module under climatic conditions of Cairo, Egypt. This effect was measured and evaluated according to practical measurement of the characteristic curves such as current-voltage and power-voltage for two identical PV modules (with and without shading) placed at the same time on one mechanical structure for comparison. The measurements have been carried out for the following shading patterns; half cell (bottom, middle, and top of the PV module); complete cell; and two adjacent cells. The results showed that partially shading the PV module changes the shapes of the I-V and P-V curves and produces more than one maximum power point, that can disturb the traditional maximum power point trackers. Also, the output power from the module decreased according to the incomplete solar radiation reaching the PV module due to shadow patterns. The power loss due shading was 7%, 22%, and 41% for shading of half-cell, one cell, and two adjacent cells of the PV module, respectively.Keywords: I-V measurements, PV module characteristics, PV module power loss, PV module shading
Procedia PDF Downloads 1372429 Artificial Intelligence for Cloud Computing
Authors: Sandesh Achar
Abstract:
Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things
Procedia PDF Downloads 1092428 Towards a Common Architecture for Cloud Computing Interoperability
Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey
Abstract:
Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.Keywords: cloud computing, reference architecture, interoperability, standard
Procedia PDF Downloads 1722427 Development and Validation of an Electronic Module in Linear Motion for First Year College Students of Iloilo City
Authors: Donna H. Gabor
Abstract:
This study aimed to develop and validate an electronic module in physics for first-year college students of Iloilo and find out if there would be a significant difference in the performance of students before and after using the electronic module. The e-module was composed of one topic with two sub-lessons in linear motion (kinematics). The participants of the study were classified into three groups: the subject matter experts who are physics instructors who suggested the content, physical appearance, and limitations of the e-module; the IT experts who are active both in teaching and developing computer programs; and 28 students divided into two groups, 15 in the pilot group and 13 in the final test group. A researcher created 30 items checklist form (difficulty of a sample problem, comprehension, application, and definition of terms) was prepared and validated by the experts in subject matter for gathering data. To test the difference in student performance in physics, the researcher prepared an achievement test containing 25 items, multiple choices. The findings revealed that there was an increase in the performance of students in the pretest and post-test. T-test results revealed that there was a significant difference in the test scores of the students before and after using the module which can be used as a future reference for linear motion as an additional teaching tool in physics.Keywords: electronic module, kinematics, linear motion, physics
Procedia PDF Downloads 1342426 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3232425 Factors Affecting U-Computing Use
Authors: Shui Lien Chen, Chen-Yin Kuo
Abstract:
U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value.Keywords: entrepreneurial orientation, market orientation, innovation, business resources, u-computing use, LBS
Procedia PDF Downloads 5922424 Developing Islamic Module Project for Preschool Teachers Using Modified Delphi Technique
Authors: Mazeni Ismail, Nurul Aliah, Hasmadi Hassan
Abstract:
The purpose of this study is to gather the consensus of experts regarding the use of moral guidance amongst preschool teachers vis-a-vis the Islamic Project module (I-Project Module). This I-Project Module seeks to provide pertinent data on the assimilation of noble values in subject-matter teaching. To obtain consensus for the various components of the module, the Modified Delphi technique was used to develop the module. 12 subject experts from various educational fields of Islamic education, early childhood education, counselling and language fully participated in the development of this module. The Modified Delphi technique was administered in two mean cycles. The standard deviation value derived from questionnaires completed by the participating panel of experts provided the value of expert consensus reached. This was subsequently analyzed using SPSS version 22. Findings revealed that the panel of experts reached a discernible degree of agreement on five topics outlined in the module, viz; content (mean value 3.36), teaching strategy (mean value 3.28), programme duration (mean value 3.0), staff involved and attention-grabbing strategy of target group participating in the value program (mean value 3.5), and strategy to attract attention of target group to utilize i-project (mean value 3.0). With regard to the strategy to attract the attention of the target group, the experts proposed for creative activities to be added in order to enhance teachers’ creativity.Keywords: Modified Delphi Technique, Islamic project, noble values, teacher moral guidance
Procedia PDF Downloads 1832423 Theoretical Study of Flexible Edge Seals for Vacuum Glazing
Authors: Farid Arya, Trevor Hyde
Abstract:
The development of vacuum glazing represents a significant advancement in the area of low heat loss glazing systems with the potential to substantially reduce building heating and cooling loads. Vacuum glazing consists of two or more glass panes hermetically sealed together around the edge with a vacuum gap between the panes. To avoid the glass panes from collapsing and touching each other under the influence of atmospheric pressure an array of support pillars is provided between the glass panes. A high level of thermal insulation is achieved by evacuating the spaces between the glass panes to a very low pressure which greatly reduces conduction and convection within the space; therefore heat transfer through this kind of glazing is significantly lower when compared with conventional insulating glazing. However, vacuum glazing is subject to inherent stresses due to atmospheric pressure and temperature differentials which can lead to fracture of the glass panes and failure of the edge seal. A flexible edge seal has been proposed to minimise the impact of these issues. In this paper, vacuum glazing system with rigid and flexible edge seals is theoretically studied and their advantages and disadvantages are discussed.Keywords: flexible edge seal, stress, support pillar, vacuum glazing
Procedia PDF Downloads 2342422 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3452421 A New Paradigm to Make Cloud Computing Greener
Authors: Apurva Saxena, Sunita Gond
Abstract:
Demand of computation, data storage in large amount are rapidly increases day by day. Cloud computing technology fulfill the demand of today’s computation but this will lead to high power consumption in cloud data centers. Initiative for Green IT try to reduce power consumption and its adverse environmental impacts. Paper also focus on various green computing techniques, proposed models and efficient way to make cloud greener.Keywords: virtualization, cloud computing, green computing, data center
Procedia PDF Downloads 5542420 Extraction of Road Edge Lines from High-Resolution Remote Sensing Images Based on Energy Function and Snake Model
Authors: Zuoji Huang, Haiming Qian, Chunlin Wang, Jinyan Sun, Nan Xu
Abstract:
In this paper, the strategy to extract double road edge lines from acquired road stripe image was explored. The workflow is as follows: the road stripes are acquired by probabilistic boosting tree algorithm and morphological algorithm immediately, and road centerlines are detected by thinning algorithm, so the initial road edge lines can be acquired along the road centerlines. Then we refine the results with big variation of local curvature of centerlines. Specifically, the energy function of edge line is constructed by gradient feature and spectral information, and Dijkstra algorithm is used to optimize the initial road edge lines. The Snake model is constructed to solve the fracture problem of intersection, and the discrete dynamic programming algorithm is used to solve the model. After that, we could get the final road network. Experiment results show that the strategy proposed in this paper can be used to extract the continuous and smooth road edge lines from high-resolution remote sensing images with an accuracy of 88% in our study area.Keywords: road edge lines extraction, energy function, intersection fracture, Snake model
Procedia PDF Downloads 3382419 Experimental Analysis on the Thermal Performance of Vacuum Membrane Distillation Module Using Polyvinylidene Fluoride Hollow Fiber Membrane
Authors: Hong-Jin Joo, Hee-Yoel Kwak
Abstract:
Vacuum Membrane Distillation (VMD) uses pressure lower than the atmospheric pressure. The feed seawater is capable of producing more vapor at the same temperature than Direct Contact Membrane Distillation (DCMD), Air Gap Membrane Distillation (AGMD) or Sweep Gas Membrane Distillation (SGMD). It is advantageous because it is operable at a lower temperature than other membrane distillations. However, no commercial product is available that uses the VMD method, as it is still in the study stage. In this study, therefore, thermal performance test according to the feed water conditions was performed prior to both construction of the demonstration plant, which uses VMD module of the capacity of 400m³/d in South Korea, and commercialization of VMD module with hollow fiber membrane. Such study was performed by designing and constructing the VMD module of the capacity of 2 m³/day which utilizes the polyvinylidene fluoride (PVDF) hollow fiber membrane. The results obtained from the VMD module manufactured by ECONITY Co., Ltd in South Korea, showed that the maximum performance ratio (PR) value of 0.904, feed water temperature of 75 ℃, and the flow rate of 8 m3/h. As the temperature of and flow rate of the feed water increased, the PR value of the VMD module also increased.Keywords: membrane distillation, vacuum membrane distillation, hollow fiber membrane, desalination
Procedia PDF Downloads 2102418 Business-to-Business Deals Based on a Co-Utile Collaboration Mechanism: Designing Trust Company of the Future
Authors: Riccardo Bonazzi, Michaël Poli, Abeba Nigussie Turi
Abstract:
This paper presents an applied research of a new module for the financial administration and management industry, Personalizable and Automated Checklists Integrator, Overseeing Legal Investigations (PACIOLI). It aims at designing the business model of the trust company of the future. By identifying the key stakeholders, we draw a general business process design of the industry. The business model focuses on disintermediating the traditional form of business through the new technological solutions of a software company based in Switzerland and hence creating a new interactive platform. The key stakeholders of this interactive platform are identified as IT experts, legal experts, and the New Edge Trust Company (NATC). The mechanism we design and propose has a great importance in improving the efficiency of the financial business administration and management industry, and it also helps to foster the provision of high value added services in the sector.Keywords: new edge trust company, business model design, automated checklists, financial technology
Procedia PDF Downloads 3722417 The Application of the Enterprise Systems through the Cloud Computing in Company: A Review and Suggestions
Authors: Mohanaad Talal Shakir, Saad AJAJ Khalaf, Nawar Ahmed Aljumaily, Mustafa Talal Shakere
Abstract:
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields.Keywords: cloud computing, information management, marketing, enterprise systems
Procedia PDF Downloads 6892416 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 1972415 Optimal Maintenance Policy for a Three-Unit System
Authors: A. Abbou, V. Makis, N. Salari
Abstract:
We study the condition-based maintenance (CBM) problem of a system subject to stochastic deterioration. The system is composed of three units (or modules): (i) Module 1 deterioration follows a Markov process with two operational states and one failure state. The operational states are partially observable through periodic condition monitoring. (ii) Module 2 deterioration follows a Gamma process with a known failure threshold. The deterioration level of this module is fully observable through periodic inspections. (iii) Only the operating age information is available of Module 3. The lifetime of this module has a general distribution. A CBM policy prescribes when to initiate a maintenance intervention and which modules to repair during intervention. Our objective is to determine the optimal CBM policy minimizing the long-run expected average cost of operating the system. This is achieved by formulating a Markov decision process (MDP) and developing the value iteration algorithm for solving the MDP. We provide numerical examples illustrating the cost-effectiveness of the optimal CBM policy through a comparison with heuristic policies commonly found in the literature.Keywords: reliability, maintenance optimization, Markov decision process, heuristics
Procedia PDF Downloads 2192414 A Task Scheduling Algorithm in Cloud Computing
Authors: Ali Bagherinia
Abstract:
Efficient task scheduling method can meet users' requirements, and improve the resource utilization, then increase the overall performance of the cloud computing environment. Cloud computing has new features, such as flexibility, virtualization and etc., in this paper we propose a two levels task scheduling method based on load balancing in cloud computing. This task scheduling method meet user's requirements and get high resource utilization, that simulation results in CloudSim simulator prove this.Keywords: cloud computing, task scheduling, virtualization, SLA
Procedia PDF Downloads 4012413 A Study of Cloud Computing Solution for Transportation Big Data Processing
Authors: Ilgin Gökaşar, Saman Ghaffarian
Abstract:
The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing
Procedia PDF Downloads 4692412 Shade Effect on Photovoltaic Systems: A Comparison between String and Module-Based Solution
Authors: Iyad M. Muslih, Yehya Abdellatif
Abstract:
In general, shading will reduce the electrical power produced from PV modules and arrays in locations where shading is unavoidable or caused by dynamic moving parts. This reduction is based on the shade effect on the I-V curve of the PV module or array and how the DC/AC inverter can search and control the optimum value of power from this module or array configuration. This is a very complicated task due to different patterns of shaded PV modules and arrays. One solution presented by the inverter industry is to perform the maximum power point tracking (MPPT) at the module level rather than the series string level. This solution is supposed to reduce the shade effect on the total harvested energy. However, this isn’t necessarily the best solution to reduce the shade effect as will be shown in this study.Keywords: photovoltaic, shade effect, I-V curve, MPPT
Procedia PDF Downloads 4112411 Sub-Pixel Mapping Based on New Mixed Interpolation
Authors: Zeyu Zhou, Xiaojun Bi
Abstract:
Due to the limited environmental parameters and the limited resolution of the sensor, the universal existence of the mixed pixels in the process of remote sensing images restricts the spatial resolution of the remote sensing images. Sub-pixel mapping technology can effectively improve the spatial resolution. As the bilinear interpolation algorithm inevitably produces the edge blur effect, which leads to the inaccurate sub-pixel mapping results. In order to avoid the edge blur effect that affects the sub-pixel mapping results in the interpolation process, this paper presents a new edge-directed interpolation algorithm which uses the covariance adaptive interpolation algorithm on the edge of the low-resolution image and uses bilinear interpolation algorithm in the low-resolution image smooth area. By using the edge-directed interpolation algorithm, the super-resolution of the image with low resolution is obtained, and we get the percentage of each sub-pixel under a certain type of high-resolution image. Then we rely on the probability value as a soft attribute estimate and carry out sub-pixel scale under the ‘hard classification’. Finally, we get the result of sub-pixel mapping. Through the experiment, we compare the algorithm and the bilinear algorithm given in this paper to the results of the sub-pixel mapping method. It is found that the sub-pixel mapping method based on the edge-directed interpolation algorithm has better edge effect and higher mapping accuracy. The results of the paper meet our original intention of the question. At the same time, the method does not require iterative computation and training of samples, making it easier to implement.Keywords: remote sensing images, sub-pixel mapping, bilinear interpolation, edge-directed interpolation
Procedia PDF Downloads 2292410 The Extraction and Stripping of Hg(II) from Produced Water via Hollow Fiber Contactor
Authors: Dolapop Sribudda, Ura Pancharoen
Abstract:
The separation of Hg(II) from produced water by hollow fiber contactors (HFC) was investigation. This system included of two hollow fiber modules in the series connecting. The first module used for the extraction reaction and the second module for stripping reaction. Aliquat336 extractant was fed from the organic reservoirs into the shell side of the first hollow fiber module and continuous to the shell side of the second module. The organic liquid was continuously feed recirculate and back to the reservoirs. The feed solution was pumped into the lumen (tube side) of the first hollow fiber module. Simultaneously, the stripping solution was pumped in the same way in tube side of the second module. The feed and stripping solution was fed which had a counter current flow. Samples were kept in the outlet of feed and stripping solution for 1 hour and characterized concentration of Hg(II) by Inductively Couple Plasma Atomic Emission Spectroscopy (ICP-AES). Feed solution was produced water from natural gulf of Thailand. The extractant was Aliquat336 dissolved in kerosene diluent. Stripping solution used was nitric acid (HNO3) and thiourea (NH2CSNH2). The effect of carrier concentration and type of stripping solution were investigated. Results showed that the best condition were 10 % (v/v) Aliquat336 and 1.0 M NH2CSNH2. At the optimum condition, the extraction and stripping of Hg(II) were 98% and 44.2%, respectively.Keywords: Hg(II), hollow fiber contactor, produced water, wastewater treatment
Procedia PDF Downloads 4032409 Grid Computing for Multi-Objective Optimization Problems
Authors: Aouaouche Elmaouhab, Hassina Beggar
Abstract:
Solving multi-objective discrete optimization applications has always been limited by the resources of one machine: By computing power or by memory, most often both. To speed up the calculations, the grid computing represents a primary solution for the treatment of these applications through the parallelization of these resolution methods. In this work, we are interested in the study of some methods for solving multiple objective integer linear programming problem based on Branch-and-Bound and the study of grid computing technology. This study allowed us to propose an implementation of the method of Abbas and Al on the grid by reducing the execution time. To enhance our contribution, the main results are presented.Keywords: multi-objective optimization, integer linear programming, grid computing, parallel computing
Procedia PDF Downloads 4862408 The Effect of Chisel Edge on Drilling-Induced Delamination
Authors: Parnian Kianfar, Navid Zarif Karimi, Giangiacomo Minak
Abstract:
Drilling is one of the most important machining operations as numerous holes must be drilled in order to install mechanical fasteners for assembly in composite structures. Delamination is a major problem associated with the drilling of fiber reinforced composite materials, which degrades the mechanical properties of these materials. In drilling, delamination is initiated when the drilling force exceeds a threshold value, particularly at the critical entry and exit locations of the drill bit. The chisel edge of twist drill is a major contributor to the thrust force which is the primary cause of delamination. The main objective of this paper is to study the effect of chisel edge and pilot hole on thrust force and delamination during drilling of glass fiber reinforced composites. For this purpose, two sets of experiments, with and without pilot hole, were conducted with different drilling conditions. The results show a great reduction in the thrust force when a pilot hole is present which removes the chisel edge contribution.Keywords: composites, chisel edge, drilling, delamination
Procedia PDF Downloads 4382407 Stress Field Induced By an Interfacial Edge Dislocation in a Multi-Layered Medium
Authors: Aditya Khanna, Andrei Kotousov
Abstract:
A novel method is presented for obtaining the stress field induced by an edge dislocation in a multilayered composite. To demonstrate the applications of the obtained solution, we consider the problem of an interfacial crack in a periodically layered bimaterial medium. The crack is modeled as a continuous distribution of edge dislocations and the Distributed Dislocation Technique (DDT) is utilized to obtain numerical results for the energy release rate (ERR). The numerical results correspond well with previously published results and the comparison serves as a validation of the obtained dislocation solution.Keywords: distributed dislocation technique, edge dislocation, elastic field, interfacial crack, multi-layered composite
Procedia PDF Downloads 4452406 Effects of Using Gusset Plate Stiffeners on the Seismic Performance of Concentrically Braced Frame
Authors: B. Mohebi, N. Asadi, F. Kazemi
Abstract:
Inelastic deformation of the brace in Special Concentrically Braced Frame (SCBF) creates inelastic damages on gusset plate connections such as buckling at edges. In this study, to improve the seismic performance of SCBFs connections, an analytical study was undertaken. To improve the gusset plate connection, this study proposes using edge’s stiffeners in both sides of gusset plate. For this purpose, in order to examine edge’s stiffeners effect on gusset plate connections, two groups of modeling with and without considering edge’s stiffener and different types of braces were modeled using ABAQUS software. The results show that considering the edge’s stiffener reduces the equivalent plastic strain values at a connection region of gusset plate with beam and column, which can improve the seismic performance of gusset plate. Furthermore, considering the edge’s stiffeners significantly decreases the strain concentration at regions where gusset plates have been connected to beam and column. Moreover, considering 2tpl distance causes reduction in the plastic strain.Keywords: special concentrically braced frame, gusset plate, edge's stiffener, seismic performance
Procedia PDF Downloads 1282405 A Framework of Virtualized Software Controller for Smart Manufacturing
Authors: Pin Xiu Chen, Shang Liang Chen
Abstract:
A virtualized software controller is developed in this research to replace traditional hardware control units. This virtualized software controller transfers motion interpolation calculations from the motion control units of end devices to edge computing platforms, thereby reducing the end devices' computational load and hardware requirements and making maintenance and updates easier. The study also applies the concept of microservices, dividing the control system into several small functional modules and then deploy into a cloud data server. This reduces the interdependency among modules and enhances the overall system's flexibility and scalability. Finally, with containerization technology, the system can be deployed and started in a matter of seconds, which is more efficient than traditional virtual machine deployment methods. Furthermore, this virtualized software controller communicates with end control devices via wireless networks, making the placement of production equipment or the redesign of processes more flexible and no longer limited by physical wiring. To handle the large data flow and maintain low-latency transmission, this study integrates 5G technology, fully utilizing its high speed, wide bandwidth, and low latency features to achieve rapid and stable remote machine control. An experimental setup is designed to verify the feasibility and test the performance of this framework. This study designs a smart manufacturing site with a 5G communication architecture, serving as a field for experimental data collection and performance testing. The smart manufacturing site includes one robotic arm, three Computer Numerical Control machine tools, several Input/Output ports, and an edge computing architecture. All machinery information is uploaded to edge computing servers and cloud servers via 5G communication and the Internet of Things framework. After analysis and computation, this information is converted into motion control commands, which are transmitted back to the relevant machinery for motion control through 5G communication. The communication time intervals at each stage are calculated using the C++ chrono library to measure the time difference for each command transmission. The relevant test results will be organized and displayed in the full-text.Keywords: 5G, MEC, microservices, virtualized software controller, smart manufacturing
Procedia PDF Downloads 822404 Deep-Learning to Generation of Weights for Image Captioning Using Part-of-Speech Approach
Authors: Tiago do Carmo Nogueira, Cássio Dener Noronha Vinhal, Gélson da Cruz Júnior, Matheus Rudolfo Diedrich Ullmann
Abstract:
Generating automatic image descriptions through natural language is a challenging task. Image captioning is a task that consistently describes an image by combining computer vision and natural language processing techniques. To accomplish this task, cutting-edge models use encoder-decoder structures. Thus, Convolutional Neural Networks (CNN) are used to extract the characteristics of the images, and Recurrent Neural Networks (RNN) generate the descriptive sentences of the images. However, cutting-edge approaches still suffer from problems of generating incorrect captions and accumulating errors in the decoders. To solve this problem, we propose a model based on the encoder-decoder structure, introducing a module that generates the weights according to the importance of the word to form the sentence, using the part-of-speech (PoS). Thus, the results demonstrate that our model surpasses state-of-the-art models.Keywords: gated recurrent units, caption generation, convolutional neural network, part-of-speech
Procedia PDF Downloads 1022403 Concentric Circle Detection based on Edge Pre-Classification and Extended RANSAC
Authors: Zhongjie Yu, Hancheng Yu
Abstract:
In this paper, we propose an effective method to detect concentric circles with imperfect edges. First, the gradient of edge pixel is coded and a 2-D lookup table is built to speed up normal generation. Then we take an accumulator to estimate the rough center and collect plausible edges of concentric circles through gradient and distance. Later, we take the contour-based method, which takes the contour and edge intersection, to pre-classify the edges. Finally, we use the extended RANSAC method to find all the candidate circles. The center of concentric circles is determined by the two circles with the highest concentricity. Experimental results demonstrate that the proposed method has both good performance and accuracy for the detection of concentric circles.Keywords: concentric circle detection, gradient, contour, edge pre-classification, RANSAC
Procedia PDF Downloads 1312402 A Review of Encryption Algorithms Used in Cloud Computing
Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele
Abstract:
Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.Keywords: cloud computing, data integrity, confidentiality, privacy, availability
Procedia PDF Downloads 133