Search results for: BIM service based cloud computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30237

Search results for: BIM service based cloud computing

29187 Community Arts-Based Learning for Interdisciplinary Pedagogy: Measuring Program Effectiveness Using Design Imperatives for 'a New American University'

Authors: Kevin R. Wilson, Roger Mantie

Abstract:

Community arts-based learning and participatory education are pedagogical techniques that serve to be advantageous for students, curriculum development, and local communities. Using an interpretive approach to examine the significance of this arts-informed research in relation to the eight ‘design imperatives’ proposed as the new model for measuring quality in scholarship for Arizona State University as ‘A New American University’, the purpose of this study was to investigate personal, social, and cultural benefits resulting from student engagement in interdisciplinary community-based projects. Students from a graduate level music education class at the ASU Tempe campus (n=7) teamed with students from an undergraduate level community development class at the ASU Downtown Phoenix campus (n=14) to plan, facilitate, and evaluate seven community-based projects in several locations around the Phoenix-metro area. Data was collected using photo evidence, student reports, and evaluative measures designed by the students. The effectiveness of each project was measured in terms of their ability to meet the eight design imperatives to: 1) leverage place; 2) transform society; 3) value entrepreneurship; 4) conduct use-inspired research; 5) enable student success; 6) fuse intellectual disciplines; 7) be socially embedded; and 8) engage globally. Results indicated that this community arts-based project sufficiently captured the essence of each of these eight imperatives. Implications for how the nature of this interdisciplinary initiative allowed for the eight imperatives to manifest are provided, and project success is expounded upon in relation to utility of each imperative. Discussion is also given for how this type of service learning project formatted within the ‘New American University’ model for measuring quality in academia can be a beneficial pedagogical tool in higher education.

Keywords: community arts-based learning, participatory education, pedagogy, service learning

Procedia PDF Downloads 388
29186 Artificial Intelligence for Generative Modelling

Authors: Shryas Bhurat, Aryan Vashistha, Sampreet Dinakar Nayak, Ayush Gupta

Abstract:

As the technology is advancing more towards high computational resources, there is a paradigm shift in the usage of these resources to optimize the design process. This paper discusses the usage of ‘Generative Design using Artificial Intelligence’ to build better models that adapt the operations like selection, mutation, and crossover to generate results. The human mind thinks of the simplest approach while designing an object, but the intelligence learns from the past & designs the complex optimized CAD Models. Generative Design takes the boundary conditions and comes up with multiple solutions with iterations to come up with a sturdy design with the most optimal parameter that is given, saving huge amounts of time & resources. The new production techniques that are at our disposal allow us to use additive manufacturing, 3D printing, and other innovative manufacturing techniques to save resources and design artistically engineered CAD Models. Also, this paper discusses the Genetic Algorithm, the Non-Domination technique to choose the right results using biomimicry that has evolved for current habitation for millions of years. The computer uses parametric models to generate newer models using an iterative approach & uses cloud computing to store these iterative designs. The later part of the paper compares the topology optimization technology with Generative Design that is previously being used to generate CAD Models. Finally, this paper shows the performance of algorithms and how these algorithms help in designing resource-efficient models.

Keywords: genetic algorithm, bio mimicry, generative modeling, non-dominant techniques

Procedia PDF Downloads 132
29185 Architecture - Performance Relationship in GPU Computing - Composite Process Flow Modeling and Simulations

Authors: Ram Mohan, Richard Haney, Ajit Kelkar

Abstract:

Current developments in computing have shown the advantage of using one or more Graphic Processing Units (GPU) to boost the performance of many computationally intensive applications but there are still limits to these GPU-enhanced systems. The major factors that contribute to the limitations of GPU(s) for High Performance Computing (HPC) can be categorized as hardware and software oriented in nature. Understanding how these factors affect performance is essential to develop efficient and robust applications codes that employ one or more GPU devices as powerful co-processors for HPC computational modeling. This research and technical presentation will focus on the analysis and understanding of the intrinsic interrelationship of both hardware and software categories on computational performance for single and multiple GPU-enhanced systems using a computationally intensive application that is representative of a large portion of challenges confronting modern HPC. The representative application uses unstructured finite element computations for transient composite resin infusion process flow modeling as the computational core, characteristics and results of which reflect many other HPC applications via the sparse matrix system used for the solution of linear system of equations. This work describes these various software and hardware factors and how they interact to affect performance of computationally intensive applications enabling more efficient development and porting of High Performance Computing applications that includes current, legacy, and future large scale computational modeling applications in various engineering and scientific disciplines.

Keywords: graphical processing unit, software development and engineering, performance analysis, system architecture and software performance

Procedia PDF Downloads 350
29184 Hotel and Service Industry in USA: Is It Leveraged? Case Study of Seven Important Hotel Chains

Authors: Azadeh Shahbazi

Abstract:

This study tries to find out the determinants of capital structure in hotel industry in 7 important hotel chains in USA within the period of 12 years of 2000 to 2012. The study is used a panel pooled regression to realize the relation among different variables. Results show that the variables which could make changes in the capital structure of firms are Non-Debt Tax Shield and Tangibility.

Keywords: capital structure, service industry, hospitality, finance

Procedia PDF Downloads 459
29183 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 192
29182 Fuzzy Set Approach to Study Appositives and Its Impact Due to Positional Alterations

Authors: E. Mike Dison, T. Pathinathan

Abstract:

Computing with Words (CWW) and Possibilistic Relational Universal Fuzzy (PRUF) are the two concepts which widely represent and measure the vaguely defined natural phenomenon. In this paper, we study the positional alteration of the phrases by which the impact of a natural language proposition gets affected and/or modified. We observe the gradations due to sensitivity/feeling of a statement towards the positional alterations. We derive the classification and modification of the meaning of words due to the positional alteration. We present the results with reference to set theoretic interpretations.

Keywords: appositive, computing with words, possibilistic relational universal fuzzy (PRUF), semantic sentiment analysis, set-theoretic interpretations

Procedia PDF Downloads 139
29181 Bag of Words Representation Based on Weighting Useful Visual Words

Authors: Fatma Abdedayem

Abstract:

The most effective and efficient methods in image categorization are almost based on bag-of-words (BOW) which presents image by a histogram of occurrence of visual words. In this paper, we propose a novel extension to this method. Firstly, we extract features in multi-scales by applying a color local descriptor named opponent-SIFT. Secondly, in order to represent image we use Spatial Pyramid Representation (SPR) and an extension to the BOW method which based on weighting visual words. Typically, the visual words are weighted during histogram assignment by computing the ratio of their occurrences in the image to the occurrences in the background. Finally, according to classical BOW retrieval framework, only a few words of the vocabulary is useful for image representation. Therefore, we select the useful weighted visual words that respect the threshold value. Experimentally, the algorithm is tested by using different image classes of PASCAL VOC 2007 and is compared against the classical bag-of-visual-words algorithm.

Keywords: BOW, useful visual words, weighted visual words, bag of visual words

Procedia PDF Downloads 417
29180 Peace through Environmental Stewardship

Authors: Elizabeth D. Ramos

Abstract:

Peace education supports a holistic appreciation for the value of life and the interdependence of all living systems. Peace education aims to build a culture of peace. One way of building a culture of peace is through environmental stewardship. This study sought to find out the environmental stewardship practices in selected Higher Education Institutions (HEIs) in the Philippines and how these environmental stewardship practices lead to building a culture of peace. The findings revealed that there is still room for improvement in implementing environmental stewardship in schools through academic service learning. In addition, the following manifestations are implemented very satisfactorily in schools: 1) waste reduction, reuse, and recycling, 2) community service, 3) clean and green surroundings. Administrators of schools in the study lead their staff and students in implementing environmental stewardship. It could be concluded that those involved in environmental stewardship display an acceptable culture of peace, particularly, solidarity, respect for persons, and inner peace.

Keywords: academic service learning, environmental stewardship, leadership support, peace, solidarity

Procedia PDF Downloads 487
29179 A Conceptual Analysis of Right of Taxpayers to Claim Refund in Nigeria

Authors: Hafsat Iyabo Sa'adu

Abstract:

A salient feature of the Nigerian Tax Law is the right of the taxpayer to demand for a refund where excess tax is paid. Section 23 of the Federal Inland Revenue Service (Establishment) Act, 2007 vests Federal Inland Revenue Services with the power to make tax refund as well as set guidelines and requirements for refund process from time to time. In addition, Section 61 of the Federal Inland Revenue Service (Establishment) Act, 2007, empowers the Federal Inland Revenue Services to issue information circular to acquaint stakeholders with the policy on the refund process. A Circular was issued to that effect to correct the position that until after the annual audit of the Service before such excess can be paid to the claimant/taxpayer. But it is amazing that such circular issuance does not feature under the states’ laws. Hence, there is an inconsistencies in the tax paying system in Nigeria. This study, therefore, sets an objective, to examine the trending concept of tax refund in Nigeria. In order to achieve this set objective, a doctrinal study went under way, wherein both federal and states laws were consulted including journals and textbooks. At the end of the research, it was revealed that the law should be specific as to the time frame within which to make the refund. It further revealed that it is essential to put up a legal framework for the tax system to recognize excess payment as debt due from the state. This would provide a foundational framework for the relationship between taxpayers and Federal Inland Revenue Service as well as promote effective tax administration in all the states of the federation. Several Recommendations were made especially relating to legislative passage of ‘’Refund Circular Bill at the states levels’ pursuant to the Federal Inland Revenue Service (Establishment) Act, 2007.

Keywords: claim, Nigeria, refund, right

Procedia PDF Downloads 103
29178 Building a Hierarchical, Granular Knowledge Cube

Authors: Alexander Denzler, Marcel Wehrle, Andreas Meier

Abstract:

A knowledge base stores facts and rules about the world that applications can use for the purpose of reasoning. By applying the concept of granular computing to a knowledge base, several advantages emerge. These can be harnessed by applications to improve their capabilities and performance. In this paper, the concept behind such a construct, called a granular knowledge cube, is defined, and its intended use as an instrument that manages to cope with different data types and detect knowledge domains is elaborated. Furthermore, the underlying architecture, consisting of the three layers of the storing, representing, and structuring of knowledge, is described. Finally, benefits as well as challenges of deploying it are listed alongside application types that could profit from having such an enhanced knowledge base.

Keywords: granular computing, granular knowledge, hierarchical structuring, knowledge bases

Procedia PDF Downloads 478
29177 Research into Factors Affecting the Attitudes of University Students towards WeChat Marketing Based on AISAS Mode

Authors: Du Zhiqin

Abstract:

WeChat is an instant messaging service similar to WhatsApp developed by Tencent, one of China's largest and most used Internet service portals. This paper investigates the penetration of WeChat among university students through a questionnaire, analyzes the effect of brand influence, information quality, interactivity, opinions of opinion-leaders, promotion, personal interests on the attitudes of university students towards WeChat marketing. This paper concludes that the penetration rate of WeChat marketing among university students is generally high enough, WeChat has generally been accepted by students as a way for businesses to market their products, and that all the above-mentioned five factors play a positive role in the process of WeChat marketing. It also proposes that businesses could maximize the effect of WeChat marketing by focusing more resources on the increase of brand influence, and the interactivity of WeChat contents and the use of opinions of opinion-leaders.

Keywords: WeChat, university students, marketing, AISAS

Procedia PDF Downloads 576
29176 The World of Great Wines: The Douro Valley Experience

Authors: A. Oliveira-Brochado, R. Silva, C. Paulino

Abstract:

The aim of this paper is to use an experiential view of wine tourism to develop a battery of items that can potentially capture the overall Douro Valley experience from the tourist’s perspective. The Douro Valley, a UNESCO World Heritage region located in Portugal, was the target of this study. The research took a mixed approach using both qualitative and quantitative designs. Firstly, we combine the literature review on service quality scales with a content analysis of five in-depth interviews with winery managers and a focus group with wine tourists to identify the main dimensions of the overall tourism experience and to develop a battery of items for each dimension. Eight dimensions of the overall wine tourism experience came out, as follows: winery service and staff, winery facilities, winery service, wine product, wine region environment, wine region accessibilities, wine region´s offerings, and the wine region and winery reputation.

Keywords: wine tourism, Douro region, survey, wineries, experience

Procedia PDF Downloads 276
29175 Analysis of Pavement Lifespan - Cost and Emissions of Greenhouse Gases: A Comparative Study of 10-year vs 30-year Design

Authors: Claudeny Simone Alves Santana, Alexandre Simas De Medeiros, Marcelino Aurélio Vieira Da Silva

Abstract:

The aim of the study was to assess the performance of pavements over time, considering the principles of Life Cycle Assessment (LCA) and the ability to withstand vehicle loads and associated environmental impacts. Within the study boundary, pavement design was conducted using the Mechanistic-Empirical Method, adopting criteria based on pavement cracking and wheel path rutting while also considering factors such as soil characteristics, material thickness, and the distribution of forces exerted by vehicles. The Ecoinvent® 3.6 database and SimaPro® software were employed to calculate emissions, and SICRO 3 information was used to estimate costs. Consequently, the study sought to identify the service that had the greatest impact on greenhouse gas emissions. The results were compared for design life periods of 10 and 30 years, considering structural performance and load-bearing capacity. Additionally, environmental impacts in terms of CO2 emissions per standard axle and construction costs in dollars per standard axle were analyzed. Based on the conducted analyses, it was possible to determine which pavement exhibited superior performance over time, considering technical, environmental, and economic criteria. One of the findings indicated that the mechanical characteristics of the soils used in the pavement layer directly influence the thickness of the pavement and the quantity of greenhouse gases, with a difference of approximately 7000 Kg CO2 Eq. The transportation service was identified as having the most significant negative impact. Other notable observations are that the study can contribute to future project guidelines and assist in decision-making regarding the selection of the most suitable pavement in terms of durability, load-bearing capacity, and sustainability.

Keywords: life cycle assessment, greenhouse gases, urban paving, service cost

Procedia PDF Downloads 54
29174 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 385
29173 A Novel Way to Create Qudit Quantum Error Correction Codes

Authors: Arun Moorthy

Abstract:

Quantum computing promises to provide algorithmic speedups for a number of tasks; however, similar to classical computing, effective error-correcting codes are needed. Current quantum computers require costly equipment to control each particle, so having fewer particles to control is ideal. Although traditional quantum computers are built using qubits (2-level systems), qudits (more than 2-levels) are appealing since they can have an equivalent computational space using fewer particles, meaning fewer particles need to be controlled. Currently, qudit quantum error-correction codes are available for different level qudit systems; however, these codes have sometimes overly specific constraints. When building a qudit system, it is important for researchers to have access to many codes to satisfy their requirements. This project addresses two methods to increase the number of quantum error correcting codes available to researchers. The first method is generating new codes for a given set of parameters. The second method is generating new error-correction codes by using existing codes as a starting point to generate codes for another level (i.e., a 5-level system code on a 2-level system). So, this project builds a website that researchers can use to generate new error-correction codes or codes based on existing codes.

Keywords: qudit, error correction, quantum, qubit

Procedia PDF Downloads 139
29172 Increasing Value Added and Competitive Advantage by Technology Adoption

Authors: Fidiana Suwitho

Abstract:

Research and community service is one of important lecturer assignment in Indonesia. This article was made to meet those needs by assisting home industry entrepreneurs of various chips in Banyuwangi. Community service in this scheme are intended to increase the revenue of craftsmen of chips by improving value added of chips through food engineering technology. Ibu Anisa has produced various kinds of chips that are breadfruit chips, banana chips, yam chips, and cassava chips. In business development, Ibu Anisa facing various problems both in terms of production and management aspects. The process of production and management and marketing are still conventional so that increased demand cannot be offset by production capacity. A researcher team of STIESIA has assist partners in the processing stage, from manually to the technologically. This activity has a positive impact to However, this process has not been reached on sustainable marketing aspect, which is where the partners are still difficult to reach a wider market because of limited access.

Keywords: food engineering technology, value added of chips, community service

Procedia PDF Downloads 257
29171 A Framework for Assessing and Implementing Ecological-Based Adaptation Solutions in Urban Areas of Shanghai

Authors: Xin Li

Abstract:

The uncertainty and the complexity of the urban environment combining with the threat of climate change are contributing factors to the vulnerability in multiple-dimensions in Chinese megacities, especially in Shanghai. The urban area occupied high valuable technological infrastructure and density buildings is under the threats of climate change and can provide insufficient ecological service to remain the trade-off on urban sustainable development. Urban ecological-based adaptation (UEbA) combines practices and theoretical work and integrates ecological services into multiple-layers of urban environment planning in order to reduce the impact of the complexity and uncertainty. To understand and to respond to the challenges in the urban level, this paper considers Shanghai as the research objective. It is necessary that its urban adaptation strategies should be reflected and contain the concept and knowledge of EbA. In this paper, we firstly use software to illustrates the visualizing patterns and trends of UEBA research in the current 10 years. Specifically, Citespace software was used for interpreting the significant hubs, landmarks points of peer-reviewed literature on the context of ecological service research in recent 10 years. Secondly, 135 evidence-based EbA literature were reviewed for categorizing the methodologies and framework of evidence-based EbA by the systematic map protocol. Finally, a conceptual framework combined with culture, economic and social components was developed in order to assess the current adaptation strategies in Shanghai. This research founds that the key to reducing urban vulnerability does not only focus on co-benefit arguments but also should pay more attention to the concept of trade-off. This research concludes that the designed framework can provide key knowledge and indicates the essential gap as a valuable tool against climate variability in the process of urban adaptation in Shanghai.

Keywords: urban ecological-based adaptation, climate change, sustainable development, climate variability

Procedia PDF Downloads 142
29170 A Computationally Intelligent Framework to Support Youth Mental Health in Australia

Authors: Nathaniel Carpenter

Abstract:

Web-enabled systems for supporting youth mental health management in Australia are pioneering in their field; however, with their success, these systems are experiencing exponential growth in demand which is straining an already stretched service. Supporting youth mental is critical as the lack of support is associated with significant and lasting negative consequences. To meet this growing demand, and provide critical support, investigations are needed on evaluating and improving existing online support services. Improvements should focus on developing frameworks capable of augmenting and scaling service provisions. There are few investigations informing best-practice frameworks when implementing e-mental health support systems for youth mental health; there are fewer which implement machine learning or artificially intelligent systems to facilitate the delivering of services. This investigation will use a case study methodology to highlight the design features which are important for systems to enable young people to self-manage their mental health. The investigation will also highlight the current information system challenges, to include challenges associated with service quality, provisioning, and scaling. This work will propose methods of meeting these challenges through improved design, service augmentation and automation, service quality, and through artificially intelligent inspired solutions. The results of this study will inform a framework for supporting youth mental health with intelligent and scalable web-enabled technologies to support an ever-growing user base.

Keywords: artificial intelligence, information systems, machine learning, youth mental health

Procedia PDF Downloads 93
29169 Cost-Effectiveness of a Certified Service or Hearing Dog Compared to a Regular Companion Dog

Authors: Lundqvist M., Alwin J., Levin L-A.

Abstract:

Background: Assistance dogs are dogs trained to assist persons with functional impairment or chronic diseases. The assistance dog concept includes different types: guide dogs, hearing dogs, and service dogs. The service dog can further be divided into subgroups of physical services dogs, diabetes alert dogs, and seizure alert dogs. To examine the long-term effects of health care interventions, both in terms of resource use and health outcomes, cost-effectiveness analyses can be conducted. This analysis can provide important input to decision-makers when setting priorities. Little is known when it comes to the cost-effectiveness of assistance dogs. The study aimed to assess the cost-effectiveness of certified service or hearing dogs in comparison to regular companion dogs. Methods: The main data source for the analysis was the “service and hearing dog project”. It was a longitudinal interventional study with a pre-post design that incorporated fifty-five owners and their dogs. Data on all relevant costs affected by the use of a service dog such as; municipal services, health care costs, costs of sick leave, and costs of informal care were collected. Health-related quality of life was measured with the standardized instrument EQ-5D-3L. A decision-analytic Markov model was constructed to conduct the cost-effectiveness analysis. Outcomes were estimated over a 10-year time horizon. The incremental cost-effectiveness ratio expressed as cost per gained quality-adjusted life year was the primary outcome. The analysis employed a societal perspective. Results: The result of the cost-effectiveness analysis showed that compared to a regular companion dog, a certified dog is cost-effective with both lower total costs [-32,000 USD] and more quality-adjusted life-years [0.17]. Also, we will present subgroup results analyzing the cost-effectiveness of physicals service dogs and diabetes alert dogs. Conclusions: The study shows that a certified dog is cost-effective in comparison with a regular companion dog for individuals with functional impairments or chronic diseases. Analyses of uncertainty imply that further studies are needed.

Keywords: service dogs, hearing dogs, health economics, Markov model, quality-adjusted, life years

Procedia PDF Downloads 125
29168 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 132
29167 Performance Evaluation of Distributed Deep Learning Frameworks in Cloud Environment

Authors: Shuen-Tai Wang, Fang-An Kuo, Chau-Yi Chou, Yu-Bin Fang

Abstract:

2016 has become the year of the Artificial Intelligence explosion. AI technologies are getting more and more matured that most world well-known tech giants are making large investment to increase the capabilities in AI. Machine learning is the science of getting computers to act without being explicitly programmed, and deep learning is a subset of machine learning that uses deep neural network to train a machine to learn  features directly from data. Deep learning realizes many machine learning applications which expand the field of AI. At the present time, deep learning frameworks have been widely deployed on servers for deep learning applications in both academia and industry. In training deep neural networks, there are many standard processes or algorithms, but the performance of different frameworks might be different. In this paper we evaluate the running performance of two state-of-the-art distributed deep learning frameworks that are running training calculation in parallel over multi GPU and multi nodes in our cloud environment. We evaluate the training performance of the frameworks with ResNet-50 convolutional neural network, and we analyze what factors that result in the performance among both distributed frameworks as well. Through the experimental analysis, we identify the overheads which could be further optimized. The main contribution is that the evaluation results provide further optimization directions in both performance tuning and algorithmic design.

Keywords: artificial intelligence, machine learning, deep learning, convolutional neural networks

Procedia PDF Downloads 186
29166 Study on the Pavement Structural Performance of Highways in the North China Region Based on Pavement Distress and Ground Penetrating Radar

Authors: Mingwei Yi, Liujie Guo, Zongjun Pan, Xiang Lin, Xiaoming Yi

Abstract:

With the rapid expansion of road construction mileage in China, the scale of road maintenance needs has concurrently escalated. As the service life of roads extends, the design of pavement repair and maintenance emerges as a crucial component in preserving the excellent performance of the pavement. The remaining service life of asphalt pavement structure is a vital parameter in the lifecycle maintenance design of asphalt pavements. Based on an analysis of pavement structural integrity, this study introduces a characterization and assessment of the remaining life of existing asphalt pavement structures. It proposes indicators such as the transverse crack spacing and the length of longitudinal cracks. The transverse crack spacing decreases with an increase in maintenance intervals and with the extended use of semi-rigid base layer structures, although this trend becomes less pronounced after maintenance intervals exceed 4 years. The length of longitudinal cracks increases with longer maintenance intervals, but this trend weakens after five years. This system can support the enhancement of standardization and scientific design in highway maintenance decision-making processes.

Keywords: structural integrity, highways, pavement evaluation, asphalt concrete pavement

Procedia PDF Downloads 47
29165 A Coordinate-Based Heuristic Route Search Algorithm for Delivery Truck Routing Problem

Authors: Ahmed Tarek, Ahmed Alveed

Abstract:

Vehicle routing problem is a well-known re-search avenue in computing. Modern vehicle routing is more focused with the GPS-based coordinate system, as the state-of-the-art vehicle, and trucking systems are equipped with digital navigation. In this paper, a new two dimensional coordinate-based algorithm for addressing the vehicle routing problem for a supply chain network is proposed and explored, and the algorithm is compared with other available, and recently devised heuristics. For the algorithms discussed, which includes the pro-posed coordinate-based search heuristic as well, the advantages and the disadvantages associated with the heuristics are explored. The proposed algorithm is studied from the stand point of a small supermarket chain delivery network that supplies to its stores in four different states around the East Coast area, and is trying to optimize its trucking delivery cost. Minimizing the delivery cost for the supply network of a supermarket chain is important to ensure its business success.

Keywords: coordinate-based optimal routing, Hamiltonian Circuit, heuristic algorithm, traveling salesman problem, vehicle routing problem

Procedia PDF Downloads 130
29164 Computer Assisted Instructions for a Better Achievement in and Attitude towards Agricultural Economics

Authors: Abiodun Ezekiel Adesina, Alice M. Olagunju

Abstract:

This study determined the effects of Computer Assisted Instructions (CAI) and Academic Self-Concepts (ASC) on pre-service teachers’ achievement in AE concepts in CoE in Southwest, Nigeria. The study adopted pretest-posttest, control group, quasi-experimental design. Six CoE with e-library facilities were purposively selected. Two hundred and thirty-two intact 200 level Agricultural education students offering introduction to AE course across the six CoE were participants. The participants were assigned to three groups (D&PM, 77, TM, 73 and control, 82). Treatment lasted eight weeks. The AE achievement test (r=0.76), pre-service teachers’ ASC Scale (r=0.81); instructional guides for tutorial (r=0.76), drill and practice (r=0.81) and conventional lecture modes (r=0.83), and teacher performance assessment sheet were used for data collection. Data were analysed using analysis of covariance and Scheffe post-hoc at 0.05 level of significance. The participants were 55.6% female with mean age of 20.8 years. Treatment had significant main effects on pre-service teachers’ achievement (F(2,207)=60.52; η²=0.21; p < 0.05). Participants in D&PM (x̄ =27.83) had the best achievement compared to those in TM (x̄ =25.41) and control (x̄ =18.64) groups. ASC had significant main effect on pre-service teachers’ achievement (F(1,207)=22.011; η²=0.166; p < 0.05). Participants with high ASC (x̄ =27.52) had better achievement compared to those with low ASC (x̄ =22.37). The drill and practice and tutorial instructional modes enhanced students’ achievement in Agricultural Economics concepts. Therefore, the two instructional modes should be adopted for improved learning outcomes in agricultural economics concepts among pre-service teachers.

Keywords: achievement in agricultural economics concepts, colleges of education in southwestern Nigeria, computer-assisted instruction, drill and practice instructional mode, tutorial instructional mode

Procedia PDF Downloads 186
29163 Service Quality Improvement in Ghana's Healthcare Supply Chain

Authors: Ammatu Alhassan

Abstract:

Quality healthcare delivery is a crucial indicator in assessing the overall developmental status of a country. There are many limitations in the Ghanaian healthcare supply chain due to the lack of studies about the correlation between quality health service and the healthcare supply chain. Patients who visit various healthcare providers face unpleasant experiences such as delays in the availability of their medications. In this study, an assessment of the quality of services provided to Ghanaian outpatients who visit public healthcare providers was investigated to establish its effect on the healthcare supply chain using a conceptual model. The Donabedian’s structure, process, and outcome theory for service quality evaluation were used to analyse 20 Ghanaian hospitals. The data obtained was tested using the structural equation model (SEM). The findings from this research will help us to improve the overall quality of the Ghanaian healthcare supply chain. The model which will be developed will help us to understand better the linkage between quality healthcare and the healthcare supply chain as well as serving as a reference tool for future healthcare research in Ghana.

Keywords: Ghana, healthcare, outpatients, supply chain

Procedia PDF Downloads 156
29162 A Bicycle Based Model of Prehospital Care Implanted in Northeast of the Brazil: Initial Experience

Authors: Odaleia de O. Farias, Suzelene C. Marinho, Ecleidson B. Fragoso, Daniel S. Lima, Francisco R. S. Lira, Lara S. Araújo, Gabriel dos S. D. Soares

Abstract:

In populous cities, prehospital care services that use vehicles alternative to ambulances are needed in order to reduce costs and improve response time to occurrences in areas with large concentration of people, such as leisure and tourism spaces. In this context, it was implanted a program called BIKE VIDA, that is innovative quick access and assistance program. The aim of this study is to describe the implantation and initial profile of occurrences performed by an urgency/emergency pre-hospital care service through paramedics on bicycles. It is a cross-sectional, descriptive study carried out in the city of Fortaleza, Ceara, Brazil. The data included service records from July to August 2017. Ethical aspects were respected. The service covers a perimeter of 4.5 km, divided into three areas with perimeter of 1.5 km for each paramedic, attending from 5 am to 9 pm. Materials transported by bicycles include External Automated Defibrillator - DEA, portable oxygen, oximeter, cervical collar, stethoscope, sphygmomanometer, dressing and immobilization materials and personal protective equipment. Occurrences are requested directly by calling the emergency number 192 or through direct approach to the professional. In the first month of the program, there were 93 emergencies/urgencies, mainly in the daytime period (71,0%), in males (59,7%), in the age range of 26 to 45 years (46,2%). The main nature was traumatic incidents (53.3%). Most of the cases (88,2%) did not require ambulance transport to the hospital, and there were two deaths. Pre-hospital service through bicycles is an innovative strategy in Brazil and has shown to be promising in terms of reducing costs and improving the quality of the services offered.

Keywords: emergency, response time, prehospital care, urgency

Procedia PDF Downloads 178
29161 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 242
29160 Development of mHealth Information in Community Based on Geographical Information: A Case Study from Saraphi District, Chiang Mai, Thailand

Authors: Waraporn Boonchieng, Ekkarat Boonchieng, Wilawan Senaratana, Jaras Singkaew

Abstract:

Geographical information system (GIS) is a designated system widely used for collecting and analyzing geographical data. Since the introduction of ultra-mobile, 'smart' devices, investigators, clinicians, and even the general public have had powerful new tools for collecting, uploading and accessing information in the field. Epidemiology paired with GIS will increase the efficacy of preventive health care services. The objective of this study is to apply GPS location services that are available on the common mobile device with district health systems, storing data on our private cloud system. The mobile application has been developed for use on iOS, Android, and web-based platforms. The system consists of two parts of district health information, including recorded resident data forms and individual health recorded data forms, which were developed and approved by opinion sharing and public hearing. The application's graphical user interface was developed using HTML5 and PHP with MySQL as a database management system (DBMS). The reporting module of the developed software displays data in a variety of views, from traditional tables to various types of high-resolution, layered graphics, incorporating map location information with street views from Google Maps. Multi-extension exporting is also supported, utilizing standard platforms such as PDF, PNG, JPG, and XLS. The data were collected in the database beginning in March 2013, by district health volunteers and district youth volunteers who had completed the application training program. District health information consisted of patients’ household coordinates, individual health data, social and economic information. This was combined with Google Street View data, collected in March 2014. Studied groups consisted of 16,085 (67.87%) and 47,811 (59.87%) of the total 23,701 households and 79,855 people were collected by the system respectively, in Saraphi district, Chiang Mai Province. The report generated from the system has had a major benefit directly to the Saraphi District Hospital. Healthcare providers are able to use the basic health data to provide a specific home health care service and also to create health promotion activities according to medical needs of the people in the community.

Keywords: health, public health, GIS, geographic information system

Procedia PDF Downloads 312
29159 AI-Based Autonomous Plant Health Monitoring and Control System with Visual Health-Scoring Models

Authors: Uvais Qidwai, Amor Moursi, Mohamed Tahar, Malek Hamad, Hamad Alansi

Abstract:

This paper focuses on the development and implementation of an advanced plant health monitoring system with an AI backbone and IoT sensory network. Our approach involves addressing the critical environmental factors essential for preserving a plant’s well-being, including air temperature, soil moisture, soil temperature, soil conductivity, pH, water levels, and humidity, as well as the presence of essential nutrients like nitrogen, phosphorus, and potassium. Central to our methodology is the utilization of computer vision technology, particularly a night vision camera. The captured data is then compared against a reference database containing different health statuses. This comparative analysis is implemented using an AI deep learning model, which enables us to generate accurate assessments of plant health status. By combining the AI-based decision-making approach, our system aims to provide precise and timely insights into the overall health and well-being of plants, offering a valuable tool for effective plant care and management.

Keywords: deep learning image model, IoT sensing, cloud-based analysis, remote monitoring app, computer vision, fuzzy control

Procedia PDF Downloads 24
29158 Signs-Only Compressed Row Storage Format for Exact Diagonalization Study of Quantum Fermionic Models

Authors: Michael Danilov, Sergei Iskakov, Vladimir Mazurenko

Abstract:

The present paper describes a high-performance parallel realization of an exact diagonalization solver for quantum-electron models in a shared memory computing system. The proposed algorithm contains a storage format for efficient computing eigenvalues and eigenvectors of a quantum electron Hamiltonian matrix. The results of the test calculations carried out for 15 sites Hubbard model demonstrate reduction in the required memory and good multiprocessor scalability, while maintaining performance of the same order as compressed row storage.

Keywords: sparse matrix, compressed format, Hubbard model, Anderson model

Procedia PDF Downloads 382