Search results for: edge cloud
531 A Hybrid Data Mining Algorithm Based System for Intelligent Defence Mission Readiness and Maintenance Scheduling
Authors: Shivam Dwivedi, Sumit Prakash Gupta, Durga Toshniwal
Abstract:
It is a challenging task in today’s date to keep defence forces in the highest state of combat readiness with budgetary constraints. A huge amount of time and money is squandered in the unnecessary and expensive traditional maintenance activities. To overcome this limitation Defence Intelligent Mission Readiness and Maintenance Scheduling System has been proposed, which ameliorates the maintenance system by diagnosing the condition and predicting the maintenance requirements. Based on new data mining algorithms, this system intelligently optimises mission readiness for imminent operations and maintenance scheduling in repair echelons. With modified data mining algorithms such as Weighted Feature Ranking Genetic Algorithm and SVM-Random Forest Linear ensemble, it improves the reliability, availability and safety, alongside reducing maintenance cost and Equipment Out of Action (EOA) time. The results clearly conclude that the introduced algorithms have an edge over the conventional data mining algorithms. The system utilizing the intelligent condition-based maintenance approach improves the operational and maintenance decision strategy of the defence force.Keywords: condition based maintenance, data mining, defence maintenance, ensemble, genetic algorithms, maintenance scheduling, mission capability
Procedia PDF Downloads 297530 The State, Class and the Challenges of National Development in Nigeria since 1914
Authors: Eriba Christopher Inyila, Godwin Egena Oga
Abstract:
Statecraft appears to be one of the greatest cultural achievements in the history of man’s civilization. The state itself is often portrayed as the supreme community of the citizen’s collective goodness and will. However, history experience reveals that the state has often been held in captivity permanently in the hand of the political class to almost a total exclusion of the labouring class of workers, artisans and peasants. Consequently, the hallmark of the Nigerian state and society in contemporary era is state of permanent crisis characterized by poverty, unemployment and profound insecurity. A lasting solution to this state of anomie is often touted in terms of ethnic, religious and regional integration which border on non-material perception of realities. A neglected aspect of the approach to the study of recurrent problems in contemporary is the materialist conception of realties through class perspectives of the society. The cutting edge of the approach is found in the attempt to reconcile the contradiction between the productive forces and the social relation of production. In other words, the contemporary state is skewed in favour of ownership of properties/commanding height of economy predominantly in the hands of the few monopoly companies to the total exclusion of majority of Nigerian population classified as peasant, workers and artisan. The lopsided situation creates economic and social disequilibria.Keywords: national development, class, the state, Nigeria
Procedia PDF Downloads 382529 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 264528 A Study on Shock Formation over a Transonic Aerofoil
Authors: M. Fowsia, Dominic Xavier Fernando, Vinojitha, Rahamath Juliyana
Abstract:
Aerofoil is a primary element to be designed during the initial phase of creating any new aircraft. It is the component that forms the cross-section of the wing. The wing is used to produce lift force that balances the weight which is acting downwards. The lift force is created due to pressure difference over the top and bottom surface which is caused due to velocity variation. At sub-sonic velocities, for a real fluid, we obtain a smooth flow of air over both the surfaces. In this era of high speed travel, commercial aircraft that can travel faster than speed of sound barrier is required. However transonic velocities cause the formation of shock waves which can cause flow separation over the top and bottom surfaces. In the transonic range, shock waves move across the top and bottom surfaces of the aerofoil, until both the shock waves merge into a single shock wave that is formed near the leading edge of theaerofoil. In this paper, a transonic aerofoil is designed and its aerodynamic properties at different velocities in the Transonic range (M = 0.8; 0.9; 1; 1.1; 1.2) are studied with the help of CFD. The Pressure and Velocity distributions over the top and bottom surfaces of aerofoil are studied and the variations of shock patterns, at different velocities, are analyzed. The analysis can be used to determine the effect of drag divergence on the lift created by the aerofoil.Keywords: transonic aerofoil, cfd, drag divergence, shock formation, viscous flow
Procedia PDF Downloads 530527 A Simple Method for Evaluation of Uniformity for Gafchromic Sheets for Film Dosimetry
Authors: Fayzan Ahmed, Saad Bin Saeed, Abdul Qadir Jangda
Abstract:
Gafchromic™ sheet are extensively used for the QA of intensity modulated radiation therapy and other in-vivo dosimetry. Intra-sheet Non-uniformity of scanner as well as film causes undesirable fluctuations which are reflected in dosimetry The aim of this study is to define a systematic and robust method to investigate the intra-sheet uniformity of the unexposed Gafchromic Sheets and the region of interest (ROI) of the scanner. Sheets of lot No#: A05151201 were scanned before and after the expiry period with the EPSON™ XL10000 scanner in the transmission mode, landscape orientation, and 72 dpi resolution. ROI of (8’x 10’ inches) equal to the sheet dimension in the center of the scanner is used to acquire images with full transmission, block transmission and with sheets in place. 500 virtual grids, created in MATALB® are imported as a macros in ImageJ (1.49m Wayne Rasband) to analyze the images. In order to remove the edge effects, the outer 86 grids are excluded from the analysis. The standard deviation of the block transmission and full transmission are 0.38% and 0.66% confirming a higher uniformity of the scanner. Expired and non-expired sheets have standard deviations of 2.18% and 1.29%, show that uniformity decreases after expiry. The results are promising and indicate a good potential of this method to be used as a uniformity check for scanner and unexposed Gafchromic sheets.Keywords: IMRT, film dosimetry, virtual grids, uniformity
Procedia PDF Downloads 426526 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 225525 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 63524 Analyzing the Causes Behind Gas Turbine Blade Failure: A Comprehensive Case Study
Authors: Med. A. Djeridane, M. Ferhat, H. A. Benhorma, O. Bouledroua
Abstract:
This research is dedicated to exploring the failure of a turbine blade within a gas transportation plant, with a primary focus on conducting a comprehensive examination through advanced metallurgical and mechanical analyses of the identified failed blade. Crafted from the nickel superalloy Inconel IN738LC, the turbine engine had accumulated approximately 61,000 operational hours before the blades failed, causing severe damage to the transportation plant and necessitating a prolonged shutdown. The investigative procedure commenced with an in-depth visual inspection of the blade surfaces, succeeded by fractography analysis of the fracture surfaces, microstructural investigations, chemical analysis, and hardness measurements. The findings unveiled distinctive fatigue marks on the fracture surface. Critical microstructural changes were identified as a consequence of the blade's operation at high temperatures. The investigation determined that the crack initiation resulted from coating damage at the leading edge, subsequently propagating through fatigue. Ultimately, due to a reduction in cross-sectional area, the fracture was completed. This comprehensive analysis sheds light on the intricate factors contributing to turbine blade failure and offers valuable insights for enhancing operational reliability in similar environments.Keywords: gas turbine, blade failure, TCP phases, fatigue, quantitative analysis
Procedia PDF Downloads 61523 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 30522 Performance Evaluation of Pilot Rotating Biological Contactor for Decentralised Management of Domestic Sewage in Delhi
Authors: T. R. Sreekrishnan, Mukesh Khare, Dinesh Upadhyay
Abstract:
In a Rotating Biological Contactor (RBC), the biological film responsible for removal of pollutants is formed on the surface of discs. Evaluation studies of a pilot RBC designed to treat sewage of 150 persons with BOD Loading Rate: 8.2–26.7 g/m2/d, Discharge: 57.6 – 115.2 m3/day, HRT 1.25 – 2.5 hrs, at STP Yamuna Vihar Delhi. Removal of organic materials through use of fixed film reactors such as RBC is accomplished by means of a biological film on the fixed media. May and June in Delhi are dry summer months where the ambient temperature is in the range of 35oC to 45oC. July is a wet monsoon month that receives occasional precipitation, cloud cover, high humidity, with ambient temperature in the range of 30oC to 35oC. The organic and inorganic loads to the RBC employed in this study are actual city sewage conditions. Average in fluent BOD concentrations have been 330 mg/l, 245 mg/l and 160 mg/l and the average COD concentrations have been 670 mg/l, 500 mg/l, and 275 mg/l. The city sewage also has high concentration of ammonia, phosphorous, total suspended solids (TSS). pH of the city sewage is near neutral. Overall, the substrate conditions of city sewage are conducive for biological treatment though aerobic process. The presentation is a part of the ongoing collaborative research initiative between IIT Delhi and Karlsruhe Institute of Technology, Germany which is going on for last 15 years or so in the treatment of sewage waste of Delhi using semi-decentralized treatment system based on Rotating Biological Contactor.Keywords: Rotating Biological Contactor (RBC), COD, BOD, HRT, STP
Procedia PDF Downloads 389521 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures
Authors: Silvina Caíno-Lores, Jesús Carretero
Abstract:
Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing
Procedia PDF Downloads 259520 2D Surface Flow Model in The Biebrza Floodplain
Authors: Dorota Miroslaw-Swiatek, Mateusz Grygoruk, Sylwia Szporak
Abstract:
We applied a two-dimensional surface water flow model with irregular wet boundaries. In this model, flow equations are in the form of a 2-D, non-linear diffusion equations which allows to account spatial variations in flow resistance and topography. Calculation domain to simulate the flow pattern in the floodplain is congruent with a Digital Elevation Model (DEM) grid. The rate and direction of sheet flow in wetlands is affected by vegetation type and density, therefore the developed model take into account spatial distribution vegetation resistance to the water flow. The model was tested in a part of the Biebrza Valley, of an outstanding heterogeneity in the elevation and flow resistance distributions due to various ecohydrological conditions and management measures. In our approach we used the highest-possible quality of the DEM in order to obtain hydraulic slopes and vegetation distribution parameters for the modelling. The DEM was created from the cloud of points measured in the LiDAR technology. The LiDAR reflects both the land surface as well as all objects on top of it such as vegetation. Depending on the density of vegetation cover the ability of laser penetration is variable. Therefore to obtain accurate land surface model the “vegetation effect” was corrected using data collected in the field (mostly the vegetation height) and satellite imagery such as Ikonos (to distinguish different vegetation types of the floodplain and represent them spatially). Model simulation was performed for the spring thaw flood in 2009.Keywords: floodplain flow, Biebrza valley, model simulation, 2D surface flow model
Procedia PDF Downloads 499519 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things
Authors: Wei Hu, Wenguang Chen, Chong Dong
Abstract:
In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management
Procedia PDF Downloads 123518 Humanitarianism as the New Face of Religion Practice: A Nigerian Experience
Authors: Nicholas Okpe
Abstract:
As the world gets more and more engulfed in both man-made and natural disasters, the call for religious intervention becomes intrinsically louder to the extent that any religious inclination that does not devolve into societal or humanitarian adventures makes no meaning. Wars, conflicts, environmental disturbances have thrown new challenges hitherto unknown to the doorsteps of religious groups for intervention as the last hope of humanity. In Nigeria, since the last two decades, many things have fallen apart that have led to humanitarian crisis from the North to the South and from the East to the West. Over five million Nigerians live in internally displaced camps all over the country due to the various forms of social unrest as well as natural disasters, especially floods. These problems have brought forth the signifance of various religious groups who through their interventions have often shown to be the hope of the people. This paper examines the latent potentials of religion in not only making people to cope with difficult situations they find themselves in, but also giving sucure to the many who otherwise are despondent and at the edge of life. Many religious groups have well developed plans of interventions in various humanitarian situations. The efforts of religions such as christianity, Islam and the indigenous African religion is exrayed and assessed for proper evaluation. The paper finds out that the most potent and effective means of attending to humanitarian crisis today in Nigeria is through the various religious organization as governments at various levels have lost credibility in such exercises.Keywords: humanitarianism, religion. nigeria, society, practice
Procedia PDF Downloads 41517 Study of Launch Recovery Control Dynamics of Retro Propulsive Reusable Rockets
Authors: Pratyush Agnihotri
Abstract:
The space missions are very costly because the transportation to the space is highly expensive and therefore there is the need to achieve complete re-usability in our launch vehicles to make the missions highly economic by cost cutting of the material recovered. Launcher reusability is the most efficient approach to decreasing admittance to space access economy, however stays an incredible specialized hurdle for the aerospace industry. Major concern of the difficulties lies in guidance and control procedure and calculations, specifically for those of the controlled landing stage, which should empower an exact landing with low fuel edges. Although cutting edge ways for navigation and control are present viz hybrid navigation and robust control. But for powered descent and landing of first stage of launch vehicle the guidance control is need to enable on board optimization. At first the CAD model of the launch vehicle I.e. space x falcon 9 rocket is presented for better understanding of the architecture that needs to be identified for the guidance and control solution for the recovery of the launcher. The focus is on providing the landing phase guidance scheme for recovery and re usability of first stage using retro propulsion. After reviewing various GNC solutions, to achieve accuracy in pre requisite landing online convex and successive optimization are explored as the guidance schemes.Keywords: guidance, navigation, control, retro propulsion, reusable rockets
Procedia PDF Downloads 91516 Design and Validation of Cutting Performance of Ceramic Matrix Composites Using FEM Simulations
Authors: Zohaib Ellahi, Guolong Zhao
Abstract:
Ceramic matrix composite (CMC) material possesses high strength, wear resistance and anisotropy thus machining of this material is very difficult and demands high cost. In this research, FEM simulations and physical experiments have been carried out to assess the machinability of carbon fiber reinforced silicon carbide (C/SiC) using polycrystalline diamond (PCD) tool in slot milling process. Finite element model has been generated in Abaqus/CAE software and milling operation performed by using user defined material subroutine. Effect of different milling parameters on cutting forces and stresses has been calculated through FEM simulations and compared with experimental results to validate the finite element model. Cutting forces in x and y-direction were calculated through both experiments and finite element model and found a good agreement between them. With increase in cutting speed resultant cutting forces are decreased. Resultant cutting forces are increased with increased feed per tooth and depth of cut. When machining performed along the fiber direction stresses generated near the tool edge were minimum and increases with fiber cutting angle.Keywords: experimental & numerical investigation, C/SiC cutting performance analysis, milling of CMCs, CMC composite stress analysis
Procedia PDF Downloads 86515 Prospective Future of Frame Fire Tests
Authors: Chung-Hao Wu, Tung-Dju Lin, Ming-Chin Ho, Minehiro Nishiyama
Abstract:
This paper discusses reported fire tests of concrete beams and columns, future fire tests of beam/column frames, and an innovative concept for designing a beam/column furnace. The proposed furnace could be designed to maximize the efficiency of fire test procedures and minimize the cost of furnace construction and fuel consumption. ASTM E119 and ISO 834 standards were drafted based on prescriptive codes and have several weaknesses. The first involves a provision allowing the support regions of a test element to be protected from fire exposure. The second deals with the L/30 deflection end point instead of the structural end point (collapse) in order to protect the hydraulic rams from fire damage. Furthermore, designers commonly use the measured fire endurances of interior columns to assess fire ratings of edge and corner columns of the same building. The validity of such an engineering practice is theoretically unsound. Performance-Based Codes (PBC) require verification tests of structural frames including the beam/column joints to overcome these weaknesses but allow the use of element test data as reference only. In the last 30 years, PBC have gained global popularity because the innovative design and flexibility in achieving an ultimate performance goal.Keywords: fire resistance, concrete structure, beam/column frame, fire tests
Procedia PDF Downloads 330514 Enhancing Information Technologies with AI: Unlocking Efficiency, Scalability, and Innovation
Authors: Abdal-Hafeez Alhussein
Abstract:
Artificial Intelligence (AI) has become a transformative force in the field of information technologies, reshaping how data is processed, analyzed, and utilized across various domains. This paper explores the multifaceted applications of AI within information technology, focusing on three key areas: automation, scalability, and data-driven decision-making. We delve into how AI-powered automation is optimizing operational efficiency in IT infrastructures, from automated network management to self-healing systems that reduce downtime and enhance performance. Scalability, another critical aspect, is addressed through AI’s role in cloud computing and distributed systems, enabling the seamless handling of increasing data loads and user demands. Additionally, the paper highlights the use of AI in cybersecurity, where real-time threat detection and adaptive response mechanisms significantly improve resilience against sophisticated cyberattacks. In the realm of data analytics, AI models—especially machine learning and natural language processing—are driving innovation by enabling more precise predictions, automated insights extraction, and enhanced user experiences. The paper concludes with a discussion on the ethical implications of AI in information technologies, underscoring the importance of transparency, fairness, and responsible AI use. It also offers insights into future trends, emphasizing the potential of AI to further revolutionize the IT landscape by integrating with emerging technologies like quantum computing and IoT.Keywords: artificial intelligence, information technology, automation, scalability
Procedia PDF Downloads 17513 CFD Modeling of Insect Flight at Low Reynolds Numbers
Authors: Wu Di, Yeo Khoon Seng, Lim Tee Tai
Abstract:
The typical insects employ a flapping-wing mode of flight. The numerical simulations on free flight of a model fruit fly (Re=143) including hovering and are presented in this paper. Unsteady aerodynamics around a flapping insect is studied by solving the three-dimensional Newtonian dynamics of the flyer coupled with Navier-Stokes equations. A hybrid-grid scheme (Generalized Finite Difference Method) that combines great geometry flexibility and accuracy of moving boundary definition is employed for obtaining flow dynamics. The results show good points of agreement and consistency with the outcomes and analyses of other researchers, which validate the computational model and demonstrate the feasibility of this computational approach on analyzing fluid phenomena in insect flight. The present modeling approach also offers a promising route of investigation that could complement as well as overcome some of the limitations of physical experiments in the study of free flight aerodynamics of insects. The results are potentially useful for the design of biomimetic flapping-wing flyers.Keywords: free hovering flight, flapping wings, fruit fly, insect aerodynamics, leading edge vortex (LEV), computational fluid dynamics (CFD), Navier-Stokes equations (N-S), fluid structure interaction (FSI), generalized finite-difference method (GFD)
Procedia PDF Downloads 409512 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector
Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar
Abstract:
Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake
Procedia PDF Downloads 138511 Knowledge Diffusion via Automated Organizational Cartography (Autocart)
Authors: Mounir Kehal
Abstract:
The post-globalization epoch has placed businesses everywhere in new and different competitive situations where knowledgeable, effective and efficient behavior has come to provide the competitive and comparative edge. Enterprises have turned to explicit - and even conceptualizing on tacit - knowledge management to elaborate a systematic approach to develop and sustain the intellectual capital needed to succeed. To be able to do that, you have to be able to visualize your organization as consisting of nothing but knowledge and knowledge flows, whilst being presented in a graphical and visual framework, referred to as automated organizational cartography. Hence, creating the ability of further actively classifying existing organizational content evolving from and within data feeds, in an algorithmic manner, potentially giving insightful schemes and dynamics by which organizational know-how is visualized. It is discussed and elaborated on most recent and applicable definitions and classifications of knowledge management, representing a wide range of views from mechanistic (systematic, data driven) to a more socially (psychologically, cognitive/metadata driven) orientated. More elaborate continuum models, for knowledge acquisition and reasoning purposes, are being used for effectively representing the domain of information that an end user may contain in their decision making process for utilization of available organizational intellectual resources (i.e. Autocart). In this paper, we present an empirical research study conducted previously to try and explore knowledge diffusion in a specialist knowledge domain.Keywords: knowledge management, knowledge maps, knowledge diffusion, organizational cartography
Procedia PDF Downloads 307510 Solar and Wind Energy Potential Study of Lower Sindh, Pakistan for Power Generation
Authors: M. Akhlaque Ahmed, Sidra A. Shaikh, Maliha A. Siddiqui
Abstract:
Global and diffuse solar radiation on horizontal surface of Lower Sindh, namely Karachi, Hyderabad, Nawabshah were carried out using sunshine hour data of the area to assess the feasibility of solar energy utilization for power generation in Sindh province. The results obtained show a large variation in the direct and diffuse component of solar radiation in summer and winter months in Lower Sindh (50% direct and 50% diffuse for Karachi and Hyderabad). In Nawabshah area, the contribution of diffuse solar radiation is low during the monsoon months, July and August. The KT value of Nawabshah indicates a clear sky throughout almost the entire year. The percentage of diffuse radiation does not exceed more than 20%. In Nawabshah, the appearance of cloud is rare even during the monsoon months. The estimated values indicate that Nawabshah has high solar potential, whereas Karachi and Hyderabad have low solar potential. During the monsoon months the Lower part of Sindh can utilize the hybrid system with wind power. Near Karachi and Hyderabad, the wind speed ranges between 6.2 m/sec to 6.9 m/sec. A wind corridor exists near Karachi, Hyderabad, Gharo, Keti Bander and Shah Bander. The short fall of solar can be compensated by wind because in the monsoon months of July and August, wind speeds are higher in the Lower region of Sindh.Keywords: hybrid power system, lower Sindh, power generation, solar and wind energy potential
Procedia PDF Downloads 252509 Design and Implementation of a Counting and Differentiation System for Vehicles through Video Processing
Authors: Derlis Gregor, Kevin Cikel, Mario Arzamendia, Raúl Gregor
Abstract:
This paper presents a self-sustaining mobile system for counting and classification of vehicles through processing video. It proposes a counting and classification algorithm divided in four steps that can be executed multiple times in parallel in a SBC (Single Board Computer), like the Raspberry Pi 2, in such a way that it can be implemented in real time. The first step of the proposed algorithm limits the zone of the image that it will be processed. The second step performs the detection of the mobile objects using a BGS (Background Subtraction) algorithm based on the GMM (Gaussian Mixture Model), as well as a shadow removal algorithm using physical-based features, followed by morphological operations. In the first step the vehicle detection will be performed by using edge detection algorithms and the vehicle following through Kalman filters. The last step of the proposed algorithm registers the vehicle passing and performs their classification according to their areas. An auto-sustainable system is proposed, powered by batteries and photovoltaic solar panels, and the data transmission is done through GPRS (General Packet Radio Service)eliminating the need of using external cable, which will facilitate it deployment and translation to any location where it could operate. The self-sustaining trailer will allow the counting and classification of vehicles in specific zones with difficult access.Keywords: intelligent transportation system, object detection, vehicle couting, vehicle classification, video processing
Procedia PDF Downloads 322508 Domain specific Ontology-Based Knowledge Extraction Using R-GNN and Large Language Models
Authors: Andrey Khalov
Abstract:
The rapid proliferation of unstructured data in IT infrastructure management demands innovative approaches for extracting actionable knowledge. This paper presents a framework for ontology-based knowledge extraction that combines relational graph neural networks (R-GNN) with large language models (LLMs). The proposed method leverages the DOLCE framework as the foundational ontology, extending it with concepts from ITSMO for domain-specific applications in IT service management and outsourcing. A key component of this research is the use of transformer-based models, such as DeBERTa-v3-large, for automatic entity and relationship extraction from unstructured texts. Furthermore, the paper explores how transfer learning techniques can be applied to fine-tune large language models (LLaMA) for using to generate synthetic datasets to improve precision in BERT-based entity recognition and ontology alignment. The resulting IT Ontology (ITO) serves as a comprehensive knowledge base that integrates domain-specific insights from ITIL processes, enabling more efficient decision-making. Experimental results demonstrate significant improvements in knowledge extraction and relationship mapping, offering a cutting-edge solution for enhancing cognitive computing in IT service environments.Keywords: ontology mapping, R-GNN, knowledge extraction, large language models, NER, knowlege graph
Procedia PDF Downloads 16507 Effect of Pressure and Dissolved Oxygen on Stress Corrosion Cracking Susceptibility of Inconel 617 in Steam and Supercritical Water
Authors: Hasan Izhar Khan, Naiqiang Zhang, Hong Xu, Zhongliang Zhu, Dongfang Jiang
Abstract:
Inconel 617, a nickel-based alloy designed for high-temperature applications, got an excellent amalgamation of strength and oxidation resistance at high temperatures. For a better understanding of its suitability to be used in superheater and reheater tubes in ultra-supercritical power plants, stress corrosion cracking (SCC) susceptibility must be evaluated. In the present study, the effect of medium environment on SCC behavior of Inconel 617, in the form of a round bar tensile specimen, was tested via slow strain rate tensile tests in steam and supercritical water (SCW) at 650 °C. The results showed that SCC susceptibility has a linear relationship with exposed pressure and increases monotonically with an increase in pressure. A severe SCC susceptibility was observed in SCW followed by that in a steam environment. Fracture and gage surface showed apparent characteristics of brittle fracture. Intergranular cracks initiated from the edge region and propagated into the matrix through cross section until ductile rupture. When dissolved oxygen contents were decreased in SCW environment, it showed no noticeable effect on mechanical properties but SCC susceptibility slightly decreased. The research revealed the influence of environment on SCC susceptibility of Inconel 617 in steam and SCW.Keywords: Inconel 617, steam, supercritical water, stress corrosion cracking
Procedia PDF Downloads 156506 Thermal Performance of Fully Immersed Naturally Cooled Server
Authors: Yaser Al-Anii, Abdulmajeed Almaneea, Jonathan L. Summers, Harvey M. Thompson, Nikil Kapur
Abstract:
The natural convection cooling system of a fully immersed server in a dielectric liquid is studied numerically. In the present case study, the dielectric liquid represents working fluid and it is in contact with server inside capsule. The capsule includes electronic component and fluid which can be modeled as saturated porous media. This medium follow Darcy flow regime and assumed to be in balance between its components. The study focus is on role of spatial parameters on thermal behavior of convective heat transfer. Based on server known unit, which is 1U, two parameters Ly and S are changed to test their effect. Meanwhile, wide-range of modified Rayleigh number, which is 0.5 to 300, are covered to better understand thermal performance. Navier-Stokes equations are used to model physical domain. Furthermore, successive over-relaxation and time marching techniques are used to solve momentum and energy equation. From obtained correlation, the in-between distance S is more effective on Nusselt number than distance to edge Ly by approximately 14%. In addition, as S increases, the average Nusselt number of the upper unit increases sharply, whereas the lower one keeps on the same level.Keywords: convective cooling of server, Darcy flow, liquid-immersed server, porous media
Procedia PDF Downloads 401505 Analysis of Hard Turning Process of AISI D3-Thermal Aspects
Authors: B. Varaprasad, C. Srinivasa Rao
Abstract:
In the manufacturing sector, hard turning has emerged as vital machining process for cutting hardened steels. Besides many advantages of hard turning operation, one has to implement to achieve close tolerances in terms of surface finish, high product quality, reduced machining time, low operating cost and environmentally friendly characteristics. In the present study, three-dimensional CAE (Computer Aided Engineering) based simulation of hard turning by using commercial software DEFORM 3D has been compared to experimental results of stresses, temperatures and tool forces in machining of AISI D3 steel using mixed Ceramic inserts (CC6050). In the present analysis, orthogonal cutting models are proposed, considering several processing parameters such as cutting speed, feed, and depth of cut. An exhaustive friction modeling at the tool-work interfaces is carried out. Work material flow around the cutting edge is carefully modeled with adaptive re-meshing simulation capability. In process simulations, feed rate and cutting speed are constant (i.e.,. 0.075 mm/rev and 155 m/min), and analysis is focused on stresses, forces, and temperatures during machining. Close agreement is observed between CAE simulation and experimental values.Keywords: hard turning, computer aided engineering, computational machining, finite element method
Procedia PDF Downloads 454504 Solar and Wind Energy Potential Study of Sindh Province, Pakistan for Power Generation
Authors: M. Akhlaque Ahmed, Sidra A. Shaikh, Maliha A. Siddiqui, Adeel Tahir
Abstract:
Global and diffuse solar radiation on horizontal surface of southern sindh namely Karachi, Hyderabad, Nawabshah were carried out using sunshine hour data of the area to asses the feasibility of solar Energy utilization at Sindh province for power generation. From the observation, result is derived which shows a drastic variation in the diffuse and direct component of solar radiation for summer and winter for Southern Sindh that is both contributes 50% for Karachi and Hyderabad. In Nawabshah area, the contribution of diffuse solar radiation is low in monsoon months, July and August. The Kᴛ value of Nawabshah indicates a clear sky almost throughout the year. The percentage of diffuse radiation does not exceed more than 20%. In Nawabshah, the appearance of cloud is rare even in monsoon months. The estimated values indicate that Nawabshah has high solar potential whereas Karachi and Hyderabad has low solar potential. During the monsoon months, the southern part of Sind can utilize the hybrid system with wind power. Near Karachi and Hyderabad, the wind speed ranges between 6.2 to 6.9 m/sec. There exist a wind corridor near Karachi, Hyderabad, Gharo, Keti Bander and Shah Bander. The short fall of solar can be compensated by wind because in monsoon months July and August the wind speed are higher in the southern region of Sindh.Keywords: hybrid power system, power generation, solar and wind energy potential, southern Sindh
Procedia PDF Downloads 235503 Analysis of the 2023 Karnataka State Elections Using Online Sentiment
Authors: Pranav Gunhal
Abstract:
This paper presents an analysis of sentiment on Twitter towards the Karnataka elections held in 2023, utilizing transformer-based models specifically designed for sentiment analysis in Indic languages. Through an innovative data collection approach involving a combination of novel methods of data augmentation, online data preceding the election was analyzed. The study focuses on sentiment classification, effectively distinguishing between positive, negative, and neutral posts while specifically targeting the sentiment regarding the loss of the Bharatiya Janata Party (BJP) or the win of the Indian National Congress (INC). Leveraging high-performing transformer architectures, specifically IndicBERT, coupled with specifically fine-tuned hyperparameters, the AI models employed in this study achieved remarkable accuracy in predicting the INC’s victory in the election. The findings shed new light on the potential of cutting-edge transformer-based models in capturing and analyzing sentiment dynamics within the Indian political landscape. The implications of this research are far-reaching, providing invaluable insights to political parties for informed decision-making and strategic planning in preparation for the forthcoming 2024 Lok Sabha elections in the nation.Keywords: sentiment analysis, twitter, Karnataka elections, congress, BJP, transformers, Indic languages, AI, novel architectures, IndicBERT, lok sabha elections
Procedia PDF Downloads 84502 Radiation Protection Study for the Assessment of Mixed Fields Ionizing Radiation
Authors: Avram Irina, Coiciu Eugenia-Mihaela, Popovici Mara-Georgiana, Mitu Iani Octavian
Abstract:
ELI-NP stands as a cutting-edge facility globally, hosting unique radiological setups. It conducts experiments leveraging high-power lasers capable of producing extremely brief 10 PW pulses on two fronts. Moreover, it houses an exceptional gamma beam system with distinctive spectral characteristics. The facility hosts various experiments across designated experimental areas, encompassing ultra-short high-power laser tests, high-intensity gamma beam trials, and combined experiments utilizing both setups. The facility hosts a dosimetry laboratory, which recently obtained accreditation, where the radiation safety group employs a host of different types of detectors for monitoring the personnel, environment, and public exposure to ionizing radiation generated in experiments performed. ELI-NP's design was shaped by radiological protection assessments conducted through Monte Carlo simulations. The poster exemplifies an assessment conducted using the FLUKA code in an experimental area where a high-power laser system is implemented, and the future diagnostic system for variable energy gamma beams will soon be operational.Keywords: radiation protection, Monte Carlo simulation, FLUKA, dosimetry
Procedia PDF Downloads 74