Search results for: architecture of computers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2014

Search results for: architecture of computers

994 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 186
993 Enhancing Athlete Training using Real Time Pose Estimation with Neural Networks

Authors: Jeh Patel, Chandrahas Paidi, Ahmed Hambaba

Abstract:

Traditional methods for analyzing athlete movement often lack the detail and immediacy required for optimal training. This project aims to address this limitation by developing a Real-time human pose estimation system specifically designed to enhance athlete training across various sports. This system leverages the power of convolutional neural networks (CNNs) to provide a comprehensive and immediate analysis of an athlete’s movement patterns during training sessions. The core architecture utilizes dilated convolutions to capture crucial long-range dependencies within video frames. Combining this with the robust encoder-decoder architecture to further refine pose estimation accuracy. This capability is essential for precise joint localization across the diverse range of athletic poses encountered in different sports. Furthermore, by quantifying movement efficiency, power output, and range of motion, the system provides data-driven insights that can be used to optimize training programs. Pose estimation data analysis can also be used to develop personalized training plans that target specific weaknesses identified in an athlete’s movement patterns. To overcome the limitations posed by outdoor environments, the project employs strategies such as multi-camera configurations or depth sensing techniques. These approaches can enhance pose estimation accuracy in challenging lighting and occlusion scenarios, where pose estimation accuracy in challenging lighting and occlusion scenarios. A dataset is collected From the labs of Martin Luther King at San Jose State University. The system is evaluated through a series of tests that measure its efficiency and accuracy in real-world scenarios. Results indicate a high level of precision in recognizing different poses, substantiating the potential of this technology in practical applications. Challenges such as enhancing the system’s ability to operate in varied environmental conditions and further expanding the dataset for training were identified and discussed. Future work will refine the model’s adaptability and incorporate haptic feedback to enhance the interactivity and richness of the user experience. This project demonstrates the feasibility of an advanced pose detection model and lays the groundwork for future innovations in assistive enhancement technologies.

Keywords: computer vision, deep learning, human pose estimation, U-NET, CNN

Procedia PDF Downloads 16
992 Deep Learning for Image Correction in Sparse-View Computed Tomography

Authors: Shubham Gogri, Lucia Florescu

Abstract:

Medical diagnosis and radiotherapy treatment planning using Computed Tomography (CT) rely on the quantitative accuracy and quality of the CT images. At the same time, requirements for CT imaging include reducing the radiation dose exposure to patients and minimizing scanning time. A solution to this is the sparse-view CT technique, based on a reduced number of projection views. This, however, introduces a new problem— the incomplete projection data results in lower quality of the reconstructed images. To tackle this issue, deep learning methods have been applied to enhance the quality of the sparse-view CT images. A first approach involved employing Mir-Net, a dedicated deep neural network designed for image enhancement. This showed promise, utilizing an intricate architecture comprising encoder and decoder networks, along with the incorporation of the Charbonnier Loss. However, this approach was computationally demanding. Subsequently, a specialized Generative Adversarial Network (GAN) architecture, rooted in the Pix2Pix framework, was implemented. This GAN framework involves a U-Net-based Generator and a Discriminator based on Convolutional Neural Networks. To bolster the GAN's performance, both Charbonnier and Wasserstein loss functions were introduced, collectively focusing on capturing minute details while ensuring training stability. The integration of the perceptual loss, calculated based on feature vectors extracted from the VGG16 network pretrained on the ImageNet dataset, further enhanced the network's ability to synthesize relevant images. A series of comprehensive experiments with clinical CT data were conducted, exploring various GAN loss functions, including Wasserstein, Charbonnier, and perceptual loss. The outcomes demonstrated significant image quality improvements, confirmed through pertinent metrics such as Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) between the corrected images and the ground truth. Furthermore, learning curves and qualitative comparisons added evidence of the enhanced image quality and the network's increased stability, while preserving pixel value intensity. The experiments underscored the potential of deep learning frameworks in enhancing the visual interpretation of CT scans, achieving outcomes with SSIM values close to one and PSNR values reaching up to 76.

Keywords: generative adversarial networks, sparse view computed tomography, CT image correction, Mir-Net

Procedia PDF Downloads 133
991 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 441
990 Digital Storytelling for Community Culture

Authors: Sariyapa Kantawan, Muanfun Kongsomsawaeng

Abstract:

Chanthaburi River community is an old mixed-culture village established in the 16th century. The town advanced more rapidly than others due to the ease of transportation at the time, which used the river as a road. Therefore, the province's first road begins here, propelling it to become an important commercial and trading center for almost a century. As a result of diverse culture, the architecture has been affected by Western, Thai, Chinese, and Vietnamese, resulting in a new and distinctive style. To share the realm of memory, digital media enable the city to communicate its history and culture. This article describes a project that combines the concepts of digital storytelling and augmented reality and connects them to Chanthaburi River Community Culture by using QR codes as makers to display 3D models on mobile screens.

Keywords: digital storytelling, community culture, river community, cultural heritage, augmented reality

Procedia PDF Downloads 39
989 The Roman Fora in North Africa Towards a Supportive Protocol to the Decision for the Morphological Restitution

Authors: Dhouha Laribi Galalou, Najla Allani Bouhoula, Atef Hammouda

Abstract:

This research delves into the fundamental question of the morphological restitution of built archaeology in order to place it in its paradigmatic context and to seek answers to it. Indeed, the understanding of the object of the study, its analysis, and the methodology of solving the morphological problem posed, are manageable aspects only by means of a thoughtful strategy that draws on well-defined epistemological scaffolding. In this stream, the crisis of natural reasoning in archaeology has generated multiple changes in this field, ranging from the use of new tools to the integration of an archaeological information system where urbanization involves the interplay of several disciplines. The built archaeological topic is also an architectural and morphological object. It is also a set of articulated elementary data, the understanding of which is about to be approached from a logicist point of view. Morphological restitution is no exception to the rule, and the inter-exchange between the different disciplines uses the capacity of each to frame the reflection on the incomplete elements of a given architecture or on its different phases and multiple states of existence. The logicist sequence is furnished by the set of scattered or destroyed elements found, but also by what can be called a rule base which contains the set of rules for the architectural construction of the object. The knowledge base built from the archaeological literature also provides a reference that enters into the game of searching for forms and articulations. The choice of the Roman Forum in North Africa is justified by the great urban and architectural characteristics of this entity. The research on the forum involves both a fairly large knowledge base but also provides the researcher with material to study - from a morphological and architectural point of view - starting from the scale of the city down to the architectural detail. The experimentation of the knowledge deduced on the paradigmatic level, as well as the deduction of an analysis model, is then carried out on the basis of a well-defined context which contextualises the experimentation from the elaboration of the morphological information container attached to the rule base and the knowledge base. The use of logicist analysis and artificial intelligence has allowed us to first question the aspects already known in order to measure the credibility of our system, which remains above all a decision support tool for the morphological restitution of Roman Fora in North Africa. This paper presents a first experimentation of the model elaborated during this research, a model framed by a paradigmatic discussion and thus trying to position the research in relation to the existing paradigmatic and experimental knowledge on the issue.

Keywords: classical reasoning, logicist reasoning, archaeology, architecture, roman forum, morphology, calculation

Procedia PDF Downloads 132
988 Supplier Relationship Management Model for Sme’s E-Commerce Transaction Broker Case Study: Hotel Rooms Provider

Authors: Veronica S. Moertini, Niko Ibrahim, Verliyantina

Abstract:

As market intermediary firms, e-commerce transaction broker firms need to strongly collaborate with suppliers in order to develop brands seek by customers. Developing suitable electronic Supplier Relationship Management (e-SRM) system is the solution to the need. In this paper, we propose our concept of e-SRM for transaction brokers owned by small medium enterprises (SMEs), which includes the integrated e-SRM and e-CRM architecture, the e-SRM applications with their functions. We then discuss the customization and implementation of the proposed e-SRM model in a specific transaction broker selling hotel rooms, which owned by an SME, KlikHotel.com. The implementation of the e-SRM in KlikHotel.com has been successfully boosting the number of suppliers (hotel members) and hotel room sales.

Keywords: e-CRM, e-SRM, SME, transaction broker

Procedia PDF Downloads 478
987 The Relationship between Ruins and Vegetation: Different Approaches during the Centuries and within the Various Disciplinary Fields, Investigation of Writings and Projects

Authors: Rossana Mancini

Abstract:

The charm of a ruin colonised by wild plants and flowers is part of Western culture. The relationship between ruins and vegetation involves a wide range of different fields of research. During the first phase of the research the most important writings and projects about this argument were investigated, to understand how the perception of the co-existence of ruins and vegetation has changed over time and to investigate the various different approaches that these different fields have adopted when tackling this issue. The paper presents some practical examples of projects carried out from the early 1900s on. The major result is that specifically regards conservation, the best attitude is the management of change, an inevitable process when it comes to the co-existence of ruins and nature and, particularly, ruins and vegetation. Limiting ourselves to adopting measures designed to stop, or rather slow down, the increasing level of entropy (and therefore disorder) may not be enough.

Keywords: ruins, vegetation, conservation, archaeology, architecture

Procedia PDF Downloads 315
986 Cultural Heritage Management and Tourism in Kosovo

Authors: Valon Shkodra

Abstract:

In our paper, we will give an overview of the cultural heritage and tourism in Kosovo. Kosovo has a history, culture, tradition and architecture that are different from those of other countries in the region, and each country has its own characteristics and peculiarities. In this paper, we will mainly present the situation of cultural heritage and its interpretation. The research is based on fieldwork and the aim of the research is to live the situation of cultural heritage and tourism. The reason why we chose this topic is that cultural heritage and tourism are now the most important industry developing many countries in the world. Besides the benefits that tourism brings, it also has an impact on the preservation, protection and promotion of culture in general. Kosovo, with its cultural diversity and very good geographical location, is also very well suited to develop these two areas as a bridge to each other. The cultural heritage holds traces from the earliest eras and shows a diversity of different civilizations that have just begun to be explored and presented.

Keywords: cultural heritage, economy, tourism, development, institutions, protection

Procedia PDF Downloads 198
985 Analysis of Environmental Sustainability in Post- Earthquake Reconstruction : A Case of Barpak, Nepal

Authors: Sudikshya Bhandari, Jonathan K. London

Abstract:

Barpak in northern Nepal represents a unique identity expressed through the local rituals, values, lifeways and the styles of vernacular architecture. The traditional residential buildings and construction practices adopted by the dominant ethnic groups: Ghales and Gurungs, reflect environmental, social, cultural and economic concerns. However, most of these buildings did not survive the Gorkha earthquake in 2015 that made many residents skeptical about their strength to resist future disasters. This led Barpak residents to prefer modern housing designs primarily for the strength but additionally for convenience and access to earthquake relief funds. Post-earthquake reconstruction has transformed the cohesive community, developed over hundreds of years into a haphazard settlement with the imposition of externally-driven building models. Housing guidelines provided for the community reconstruction and earthquake resilience have been used as a singular template, similar to other communities on different geographical locations. The design and construction of these buildings do not take into account the local, historical, environmental, social, cultural and economic context of Barpak. In addition to the physical transformation of houses and the settlement, the consequences continue to develop challenges to sustainability. This paper identifies the major challenges for environmental sustainability with the construction of new houses in post-earthquake Barpak. Mixed methods such as interviews, focus groups, site observation, and documentation, and analysis of housing and neighborhood design have been used for data collection. The discernible changing situation of this settlement due to the new housing has included reduced climatic adaptation and thermal comfort, increased consumption of agricultural land and water, minimized use of local building materials, and an increase in energy demand. The research has identified that reconstruction housing practices happening in Barpak, while responding to crucial needs for disaster recovery and resilience, are also leading this community towards an unsustainable future. This study has also integrated environmental, social, cultural and economic parameters into an assessment framework that could be used to develop place-based design guidelines in the context of other post-earthquake reconstruction efforts. This framework seeks to minimize the unintended repercussions of unsustainable reconstruction interventions, support the vitality of vernacular architecture and traditional lifeways and respond to context-based needs in coordination with residents.

Keywords: earthquake, environment, reconstruction, sustainability

Procedia PDF Downloads 101
984 Validating the Contract between Microservices

Authors: Parveen Banu Ansari, Venkatraman Chinnappan, Paramasivam Shankar

Abstract:

Contract testing plays a pivotal role in the current landscape of microservices architecture. Testing microservices at the initial stages of development helps to identify and rectify issues before they escalate to higher levels, such as UI testing. By validating microservices through contract testing, you ensure the integration quality of APIs, enhancing the overall reliability and performance of the application. Contract testing, being a collaborative effort between testers and developers, ensures that the microservices adhere to the specified contracts or agreements. This proactive approach significantly reduces defects, streamlines the development process, and contributes to the overall efficiency and robustness of the application. In the dynamic and fast-paced world of digital applications, where microservices are the building blocks, embracing contract testing is indeed a strategic move for ensuring the quality and reliability of the entire system.

Keywords: validation, testing, contract, agreement, microservices

Procedia PDF Downloads 42
983 Path Planning for Collision Detection between two Polyhedra

Authors: M. Khouil, N. Saber, M. Mestari

Abstract:

This study aimed to propose, a different architecture of a Path Planning using the NECMOP. where several nonlinear objective functions must be optimized in a conflicting situation. The ability to detect and avoid collision is very important for mobile intelligent machines. However, many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.

Keywords: path planning, collision detection, convex polyhedron, neural network

Procedia PDF Downloads 425
982 Use of Information and Communication Technologies in Enhancing Health Care Delivery for Human Immunodeficiency Virus Patients in Bamenda Health District

Authors: Abanda Wilfred Chick

Abstract:

Background: According to World Health Organization (WHO), the role of Information and Communication Technologies (ICT) in health sectors of developing nations has been demonstrated to have had a great improvement of fifty percent reduction in mortality and or twenty-five-fifty percent increase in productivity. The objective of this study was to assess the use of information and communication technologies in enhancing health care delivery for Human Immunodeficiency Virus (HIV) patients in Bamenda Health District. Methods: This was a descriptive-analytical cross-sectional study in which 388 participants were consecutively selected amongst health personnel and HIV patients from public and private health institutions involved in Human Immunodeficiency Virus management. Data on socio-demographic variables, the use of information and communication technologies tools, and associated challenges were collected using structured questionnaires. Descriptive statistics with a ninety-five percent confidence interval were used to summarize findings, while Cramer’s V test, logistic regression, and Chi-square test were used to measure the association between variables, Epi info version7.2, MS Excel, and SPSS version 25.0 were utilized for data entry and statistical analysis respectively. Results: Of the participants, one-quarter were health personnel, and three-quarters were HIV patients. For both groups of participants, there was a significant relationship between the use of ICT and demographic information such as level of education, marital status, and age (p<0.05). For the impediments to using ICT tools, a greater proportion identified the high cost of airtime or internet bundles, followed by an average proportion that indicated inadequate training on ICT tools; for health personnel, the majority said inadequate training on ICT tools/applications and half said unavailability of electricity. Conclusion: Not up to half of the HIV patients effectively make use of ICT tools/applications to receive health care. Of health personnel, three quarters use ICTs, and only one quarter effectively use mobile phones and one-third of computers, respectively, to render care to HIV patients.

Keywords: ICT tools, HIV patients, health personnel, health care delivery

Procedia PDF Downloads 68
981 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 569
980 The Effect of Window Position and Ceiling Height on Cooling Load in Architectural Studio

Authors: Seyedehzahra Mirrahimi

Abstract:

This paper investigates the effect of variations in window and ceiling heights on cooling inside an architectural training studio with a full-width window. For architectural training, students use the studio more often than they use ordinary classrooms. Therefore, studio dimensions and size, and the window position, directly influence the cooling load. Energy for cooling is one of the most expensive costs in the studio because of the high activity levels of students during the warm season. The methodology of analysis involves measuring energy changes in the Energy Plus software in Kish Island. It was proved that the cooling energy in an architecture studio can be increased by changing window levels and ceiling heights to add a range of cooling energy.

Keywords: cooling energy, Energy Plus, studio classroom, window position

Procedia PDF Downloads 277
979 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 84
978 Architectural Thinking in a Time of Climate Emergency

Authors: Manoj Parmar

Abstract:

The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology.

Keywords: climate change, architectural theory, reflexivity, modernity

Procedia PDF Downloads 264
977 An Investigation on Opportunities and Obstacles on Implementation of Building Information Modelling for Pre-fabrication in Small and Medium Sized Construction Companies in Germany: A Practical Approach

Authors: Nijanthan Mohan, Rolf Gross, Fabian Theis

Abstract:

The conventional method used in the construction industries often resulted in significant rework since most of the decisions were taken onsite under the pressure of project deadlines and also due to the improper information flow, which results in ineffective coordination. However, today’s architecture, engineering, and construction (AEC) stakeholders demand faster and accurate deliverables, efficient buildings, and smart processes, which turns out to be a tall order. Hence, the building information modelling (BIM) concept was developed as a solution to fulfill the above-mentioned necessities. Even though BIM is successfully implemented in most of the world, it is still in the early stages in Germany, since the stakeholders are sceptical of its reliability and efficiency. Due to the huge capital requirement, the small and medium-sized construction companies are still reluctant to implement BIM workflow in their projects. The purpose of this paper is to analyse the opportunities and obstacles to implementing BIM for prefabrication. Among all other advantages of BIM, pre-fabrication is chosen for this paper because it plays a vital role in creating an impact on time as well as cost factors of a construction project. The positive impact of prefabrication can be explicitly observed by the project stakeholders and participants, which enables the breakthrough of the skepticism factor among the small scale construction companies. The analysis consists of the development of a process workflow for implementing prefabrication in building construction, followed by a practical approach, which was executed with two case studies. The first case study represents on-site prefabrication, and the second was done for off-site prefabrication. It was planned in such a way that the first case study gives a first-hand experience for the workers at the site on the BIM model so that they can make much use of the created BIM model, which is a better representation compared to the traditional 2D plan. The main aim of the first case study is to create a belief in the implementation of BIM models, which was succeeded by the execution of offshore prefabrication in the second case study. Based on the case studies, the cost and time analysis was made, and it is inferred that the implementation of BIM for prefabrication can reduce construction time, ensures minimal or no wastes, better accuracy, less problem-solving at the construction site. It is also observed that this process requires more planning time, better communication, and coordination between different disciplines such as mechanical, electrical, plumbing, architecture, etc., which was the major obstacle for successful implementation. This paper was carried out in the perspective of small and medium-sized mechanical contracting companies for the private building sector in Germany.

Keywords: building information modelling, construction wastes, pre-fabrication, small and medium sized company

Procedia PDF Downloads 95
976 Cilubaba: An Agriculture-Based Education Tool through Congklak Traditional Game as an Introduction of Home Garden for Children in Cibanteng, Bogor

Authors: Yoni Elviandri, Vivi Fitriyanti, Agung Surya Wijaya, Suryani Humayyah, Muhammad Alif Azizi

Abstract:

The massive development of computing power and internet access nowadays is marked by audiovisual games and computers which are known as electronic games, one of the examples is online games. This kind of game can be found everywhere in Indonesia, both in the cities and even the villages. In the present time, online games are becoming a popular games in various layers of the community, one of them does happen to elementary school students. As the online games spread over, the traditional games gradually fade away and even thought as an old-fashioned game. Contrary, traditional games actually have the better and higher educational values such as patience, honesty, integrity and togetherness value which cannot be found in online games which are more to individualist. A brand new set of education tools is necessary to provide a convenience, safe and fun place for children to play around but still contains educational values. One interesting example goes to Cilulaba is an agricultural-based playground. It is a good place for children to play and learn as it was planned to entertain children to play around as well as introducing agriculture to them. One of the games is a 1990’s well-known traditional game which its name is Congklak. Congklak is an agricultural-based traditional game and it also introduces the home garden to the children. Some of the Cilulaba’s aims are to protect the existence of nation’s cultural inheritance through Congklak traditional game, as a tool to introduce the agriculture to the children through the methods of Congklak traditional game and giving explanation related to the advantages of a “healthy home garden” to the children. The expected output from this place is to deliver a good understanding about agriculture to the children and make them begin to love it to make an aesthetic home garden and enhance the optimalisation usage of home garden that will support the availability of various edible plants in productive and health households. The proposed method in this Student Creative Program in Society Service is Participatory Rural Appraisal (PRA) method.

Keywords: Cilubaba, Congklak, traditional game, agricultural-based playground

Procedia PDF Downloads 422
975 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 340
974 Clinicians’ Experiences with IT Systems in a UK District General Hospital: A Qualitative Analysis

Authors: Sunny Deo, Eve Barnes, Peter Arnold-Smith

Abstract:

Introduction: Healthcare technology is a rapidly expanding field in healthcare, with enthusiasts suggesting a revolution in the quality and efficiency of healthcare delivery based on the utilisation of better e-healthcare, including the move to paperless healthcare. The role and use of computers and programmes for healthcare have been increasing over the past 50 years. Despite this, there is no standardised method of assessing the quality of hardware and software utilised by frontline healthcare workers. Methods and subjects: Based on standard Patient Related Outcome Measures, a questionnaire was devised with the aim of providing quantitative and qualitative data on clinicians’ perspectives of their hospital’s Information Technology (IT). The survey was distributed via the Institution’s Intranet to all contracted doctors, and the survey's qualitative results were analysed. Qualitative opinions were grouped as positive, neutral, or negative and further sub-grouped into speed/usability, software/hardware, integration, IT staffing, clinical risk, and wellbeing. Analysis was undertaken on the basis of doctor seniority and by specialty. Results: There were 196 responses, with 51% from senior doctors (consultant grades) and the rest from junior grades, with the largest group of respondents 52% coming from medicine specialties. Differences in the proportion of principle and sub-groups were noted by seniority and specialty. Negative themes were by far the commonest stated opinion type, occurring in almost 2/3’s of responses (63%), while positive comments occurred less than 1 in 10 (8%). Conclusions: This survey confirms strongly negative attitudes to the current state of electronic documentation and IT in a large single-centre cohort of hospital-based frontline physicians after two decades of so-called progress to a paperless healthcare system. Greater use would provide further insights and potentially optimise the focus of development and delivery to improve the quality and effectiveness of IT for clinicians and their patients.

Keywords: information technology, electronic patient records, digitisation, paperless healthcare

Procedia PDF Downloads 67
973 The Engineering Design of the Temple of Dendera in the City of Qena, Egypt

Authors: Shady Ahmed Emara

Abstract:

Introductory statement: The temple is characterized by a unique engineering design. This study aimed to explain the means that were used to reach this design. Background of the Study: Temple of Dandara consists of 24 columns with a height of 18m and a diameter of 2m. This paper is about the engineering method for constructing these huge columns. Two experiments were conducted at the temple. The first experiment used AutoCAD to compare the similarity of the columns in terms of dimensions. The second experiment used a laser rangefinder to measure the extent of the match between the heights between the columns. The Major Findings of the Study: (1) The method of constructing the columns was through several divided layers. It is divided into two halves and built opposite each other to maintain the integrity of the columns. (2) The match between the heights of the columns, which reached the error rate between one column and another, is only 1 mm. Concluding Statement: Both experiences will be explained through 2D and 3D.

Keywords: ancient, construction, architecture, building

Procedia PDF Downloads 85
972 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 484
971 Machine Learning Techniques to Predict Cyberbullying and Improve Social Work Interventions

Authors: Oscar E. Cariceo, Claudia V. Casal

Abstract:

Machine learning offers a set of techniques to promote social work interventions and can lead to support decisions of practitioners in order to predict new behaviors based on data produced by the organizations, services agencies, users, clients or individuals. Machine learning techniques include a set of generalizable algorithms that are data-driven, which means that rules and solutions are derived by examining data, based on the patterns that are present within any data set. In other words, the goal of machine learning is teaching computers through 'examples', by training data to test specifics hypothesis and predict what would be a certain outcome, based on a current scenario and improve that experience. Machine learning can be classified into two general categories depending on the nature of the problem that this technique needs to tackle. First, supervised learning involves a dataset that is already known in terms of their output. Supervising learning problems are categorized, into regression problems, which involve a prediction from quantitative variables, using a continuous function; and classification problems, which seek predict results from discrete qualitative variables. For social work research, machine learning generates predictions as a key element to improving social interventions on complex social issues by providing better inference from data and establishing more precise estimated effects, for example in services that seek to improve their outcomes. This paper exposes the results of a classification algorithm to predict cyberbullying among adolescents. Data were retrieved from the National Polyvictimization Survey conducted by the government of Chile in 2017. A logistic regression model was created to predict if an adolescent would experience cyberbullying based on the interaction and behavior of gender, age, grade, type of school, and self-esteem sentiments. The model can predict with an accuracy of 59.8% if an adolescent will suffer cyberbullying. These results can help to promote programs to avoid cyberbullying at schools and improve evidence based practice.

Keywords: cyberbullying, evidence based practice, machine learning, social work research

Procedia PDF Downloads 153
970 DNA Multiplier: A Design Architecture of a Multiplier Circuit Using DNA Molecules

Authors: Hafiz Md. Hasan Babu, Khandaker Mohammad Mohi Uddin, Nitish Biswas, Sarreha Tasmin Rikta, Nuzmul Hossain Nahid

Abstract:

Nanomedicine and bioengineering use biological systems that can perform computing operations. In a biocomputational circuit, different types of biomolecules and DNA (Deoxyribose Nucleic Acid) are used as active components. DNA computing has the capability of performing parallel processing and a large storage capacity that makes it diverse from other computing systems. In most processors, the multiplier is treated as a core hardware block, and multiplication is one of the time-consuming and lengthy tasks. In this paper, cost-effective DNA multipliers are designed using algorithms of molecular DNA operations with respect to conventional ones. The speed and storage capacity of a DNA multiplier are also much higher than a traditional silicon-based multiplier.

Keywords: biological systems, DNA multiplier, large storage, parallel processing

Procedia PDF Downloads 193
969 Rail-To-Rail Output Op-Amp Design with Negative Miller Capacitance Compensation

Authors: Muhaned Zaidi, Ian Grout, Abu Khari bin A’ain

Abstract:

In this paper, a two-stage op-amp design is considered using both Miller and negative Miller compensation techniques. The first op-amp design uses Miller compensation around the second amplification stage, whilst the second op-amp design uses negative Miller compensation around the first stage and Miller compensation around the second amplification stage. The aims of this work were to compare the gain and phase margins obtained using the different compensation techniques and identify the ability to choose either compensation technique based on a particular set of design requirements. The two op-amp designs created are based on the same two-stage rail-to-rail output CMOS op-amp architecture where the first stage of the op-amp consists of differential input and cascode circuits, and the second stage is a class AB amplifier. The op-amps have been designed using a 0.35mm CMOS fabrication process.

Keywords: op-amp, rail-to-rail output, Miller compensation, Negative Miller capacitance

Procedia PDF Downloads 324
968 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 435
967 Spatial Behavioral Model-Based Dynamic Data-Driven Diagram Information Model

Authors: Chiung-Hui Chen

Abstract:

Diagram and drawing are important ways to communicate and the reproduce of architectural design, Due to the development of information and communication technology, the professional thinking of architecture and interior design are also change rapidly. In development process of design, diagram always play very important role. This study is based on diagram theories, observe and record interaction between man and objects, objects and space, and space and time in a modern nuclear family. Construct a method for diagram to systematically and visualized describe the space plan of a modern nuclear family toward a intelligent design, to assist designer to retrieve information and check/review event pattern of past and present.

Keywords: digital diagram, information model, context aware, data analysis

Procedia PDF Downloads 322
966 A Prediction Model of Tornado and Its Impact on Architecture Design

Authors: Jialin Wu, Zhiwei Lian, Jieyu Tang, Jingyun Shen

Abstract:

Tornado is a serious and unpredictable natural disaster, which has an important impact on people's production and life. The probability of being hit by tornadoes in China was analyzed considering the principles of tornado formation. Then some suggestions on layout and shapes for newly-built buildings were provided combined with the characteristics of tornado wind fields. Fuzzy clustering and inverse closeness methods were used to evaluate the probability levels of tornado risks in various provinces based on classification and ranking. GIS was adopted to display the results. Finally, wind field single-vortex tornado was studied to discuss the optimized design of rural low-rise houses in Yancheng, Jiangsu as an example. This paper may provide enough data to support building and urban design in some specific regions.

Keywords: tornado probability, computational fluid dynamics, fuzzy mathematics, optimal design

Procedia PDF Downloads 116
965 Modeling Landscape Performance: Evaluating the Performance Benefits of the Olmsted Brothers’ Proposed Parkway Designs for Los Angeles

Authors: Aaron Liggett

Abstract:

This research focuses on the visionary proposal made by the Olmsted Brothers Landscape Architecture firm in the 1920s for a network of interconnected parkways in Los Angeles. Their envisioned parkways aimed to address environmental and cultural strains by providing green space for recreation, wildlife habitat, and stormwater management while serving as multimodal transportation routes. Although the parkways were never constructed, through an evidence-based approach, this research presents a framework for evaluating the potential functionality and success of the parkways by modeling and visualizing their quantitative and qualitative landscape performance and benefits. Historical documents and innovative digital modeling tools produce detailed analysis, modeling, and visualization of the parkway designs. A set of 1928 construction documents are used to analyze and interpret the design intent of the parkways. Grading plans are digitized in CAD and modeled in Sketchup to produce 3D visualizations of the parkway. Drainage plans are digitized to model stormwater performance. Planting plans are analyzed to model urban forestry and biodiversity. The EPA's Storm Water Management Model (SWMM) predicts runoff quantity and quality. The USDA Forests Service tools evaluate carbon sequestration and air quality. Spatial and overlay analysis techniques are employed to assess urban connectivity and the spatial impacts of the parkway designs. The study reveals how the integration of blue infrastructure, green infrastructure, and transportation infrastructure within the parkway design creates a multifunctional landscape capable of offering alternative spatial and temporal uses. The analysis demonstrates the potential for multiple functional, ecological, aesthetic, and social benefits to be derived from the proposed parkways. The analysis of the Olmsted Brothers' proposed Los Angeles parkways, which predated contemporary ecological design and resiliency practices, demonstrates the potential for providing multiple functional, ecological, aesthetic, and social benefits within urban designs. The findings highlight the importance of integrated blue, green, and transportation infrastructure in creating a multifunctional landscape that simultaneously serves multiple purposes. The research contributes new methods for modeling and visualizing landscape performance benefits, providing insights and techniques for informing future designs and sustainable development strategies.

Keywords: landscape architecture, ecological urban design, greenway, landscape performance

Procedia PDF Downloads 105