Search results for: Distributed computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2876

Search results for: Distributed computing

1676 Runoff Simulation by Using WetSpa Model in Garmabrood Watershed of Mazandaran Province, Iran

Authors: Mohammad Reza Dahmardeh Ghaleno, Mohammad Nohtani, Saeedeh Khaledi

Abstract:

Hydrological models are applied to simulation and prediction floods in watersheds. WetSpa is a distributed, continuous and physically model with daily or hourly time step that explains of precipitation, runoff and evapotranspiration processes for both simple and complex contexts. This model uses a modified rational method for runoff calculation. In this model, runoff is routed along the flow path using Diffusion-Wave Equation which depend on the slope, velocity and flow route characteristics. Garmabrood watershed located in Mazandaran province in Iran and passing over coordinates 53° 10´ 55" to 53° 38´ 20" E and 36° 06´ 45" to 36° 25´ 30"N. The area of the catchment is about 1133 km2 and elevations in the catchment range from 213 to 3136 m at the outlet, with average slope of 25.77 %. Results of the simulations show a good agreement between calculated and measured hydrographs at the outlet of the basin. Drawing upon Nash-Sutcliffe Model Efficiency Coefficient for calibration periodic model estimated daily hydrographs and maximum flow rate with an accuracy up to 61% and 83.17 % respectively.

Keywords: watershed simulation, WetSpa, runoff, flood prediction

Procedia PDF Downloads 331
1675 Investigation of Dynamic Characteristic of Planetary Gear Set Based On Three-Axes Torque Measurement

Authors: Masao Nakagawa, Toshiki Hirogaki, Eiichi Aoyama, Mohamed Ali Ben Abbes

Abstract:

A planetary gear set is widely used in hybrid vehicles as the power distribution system or in electric vehicles as the high reduction system, but due to its complexity with planet gears, its dynamic characteristic is not fully understood. There are many reports on two-axes driving or displacement of the planet gears under these conditions, but only few reports deal with three-axes driving. A three-axes driving condition is tested using three-axes torque measurement and focuses on the dynamic characteristic around the planet gears in this report. From experimental result, it was confirmed that the transition forces around the planet gears were balanced and the torques were also balanced around the instantaneous rotation center. The meshing frequency under these conditions was revealed to be the harmonics of two meshing frequencies; meshing frequency of the ring gear and that of the planet gears. The input power of the ring gear is distributed to the carrier and the sun gear in the dynamic sequential change of three fixed conditions; planet, star and solar modes.

Keywords: dynamic characteristic, gear, planetary gear set, torque measuring

Procedia PDF Downloads 376
1674 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria

Authors: Washima Tuleun

Abstract:

Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.

Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing

Procedia PDF Downloads 17
1673 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 179
1672 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios

Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão

Abstract:

Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.

Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario

Procedia PDF Downloads 187
1671 Physicochemical Characteristics of Rice Starch Chainat 1 Variety by Physical Modification

Authors: Orose Rugchati, Sarawut Wattanawongpitak

Abstract:

The Chainat 1 variety (CN1) of rice, which generally has high amylose starch, is distributed in the lower part of Northern Thailand. CN1 rice starch can be used in both food and non-food products. In this research, the CN1 rice starch from the wet-milling process was prepared by Pre-Gelatinization (Heat-Moisture Treatments, HMT) under different conditions: percentage of moisture contents (20% and 30%) and duration time in minutes (0, 30, 60, and 90) at a specific temperature 110°C. The physicochemical characteristics of CN1 rice starch modification, such as amylose content, viscosity, swelling, and solubility property, were evaluated and compared with native CN1 rice starch. The results showed that modification CN1 rice starch tends to have some characteristics better than native starch. The appearance color and starch granule of modified CN1 by HMT have more effective characteristics than native starch when increased duration time. The duration time and moisture content are significant factors to the CN1 starch characteristic by HMT. Moreover, physical modification of CN1 starch by HMT can be described as a modified rice starch providing in many applications and the advantage of biodegradability development.

Keywords: physicochemical characteristics, physical modification, pre-gelatinization, Heat-Moisture Treatments, rice starch, Chainat 1 variety (CN1)

Procedia PDF Downloads 145
1670 A Nexus between Financial Development and Its Determinants: A Panel Data Analysis from a Global Perspective

Authors: Bilal Ashraf, Qianxiao Zhang

Abstract:

This study empirically investigated the linkage amid financial development and its important determinants such as information and communication technology, natural resource rents, economic growth, current account balance, and gross savings in 107 economies. This paper preferred to employ the second-generation unit root tests to handle the issues of slope heterogeneity and “cross-sectional dependence” in panel data. The “Kao, Pedroni, and Westerlund tests” confirm the long-lasting connections among the variables under study, while the significant endings of “cross-sectionally augmented autoregressive distributed lag (CS-ARDL)” exposed that NRR, CAB, and S negatively affected the financial development while ICT and EG stimulates the procedure of FD. Further, the robustness analysis's application of FGLS supports the appropriateness and applicability of CS-ARDL. Finally, the findings of “DH causality analysis” endorse the bidirectional causality linkages amongst research factors. Based on the study's outcomes, we suggest some policy suggestions that empower the process of financial development, globally.

Keywords: determinants of financial developments, CS-ARDL, financial development, global sample, causality analysis

Procedia PDF Downloads 49
1669 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet

Authors: Azene Zenebe

Abstract:

Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.

Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science

Procedia PDF Downloads 146
1668 Motivating EFL Students to Speak English through Flipped Classroom Implantation

Authors: Mohamad Abdullah

Abstract:

Recent Advancements in technology have stimulated deep change in the language learning classroom. Flipped classroom as a new pedagogical method is at the center of this change. It turns the classroom into a student-centered environment and promotes interactive and autonomous learning. The present study is an attempt to examine the effectiveness of the Flipped Classroom Model (FCM) on students’ motivation level in English speaking performance. This study was carried out with 27 undergraduate female English majors who enrolled in the course of Advanced Communication Skills (ENGL 154) at Buraimi University College (BUC). Data was collected through Motivation in English Speaking Performance Questionnaire (MESPQ) which has been distributed among the participants of this study pre and post the implementation of FCM. SPSS was used for analyzing data. The Paired T-Test which was carried out on the pre-post of (MESPQ) showed a significant difference between them (p < .009) that revealed participants’ tendency to increase their motivation level in English speaking performance after the application of FCM. In addition, respondents of the current study reported positive views about the implementation of FCM.

Keywords: english speaking performance, motivation, flipped classroom model, learner-contentedness

Procedia PDF Downloads 124
1667 A Comparison of Brands Equity between Samsung and Apple in the View of Students of Management Science Faculty, Suan Sunandha Rajabhat University

Authors: Somsak Klaysung

Abstract:

This study aims to investigate the comparison of brands equity between Samsung and Apple from students of Suan Sunandha Rajabhat University. The research method will using quantitative research, data was collected by questionnaires distributed to communication of arts students in the faculty of management science of Suan Sunandha Rajabhat University for 100 samples by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and inferential statistic is t-test for hypothesis testing. The results showed that brands equity between Apple and Samsung brand have the ability to recognize brand from the customer by perceived value of the uniqueness of brand and recall when in a situation that must be purchased (Salience), which is the lowest level in branding and consumers can recognize the capacity of the product (Judgment) and opinions about the quality and reliability when it comes to mobile phones Apple and Samsung brand are not different.

Keywords: Apple and Samsung brand, brand equity, judgment, performance, resonance, salience

Procedia PDF Downloads 211
1666 Job Satisfaction among Public and Private Universities in Egypt Related to Organizational and Personal Aspects

Authors: Reem Alkadeem

Abstract:

This study aims at evaluating the overall satisfaction of faculty members and relating it to organizational and personal aspects in Egyptian public and private universities. These aspects are identified through an extensive study of all factors that might affect job satisfaction. The most influencing parameters selected are academics’ demographics, human resource management, organizational profile, workload, teamwork skills, recognition, autonomy, teaching activity, research activity, and motivation. A questionnaire of 94 questions was used to assess job satisfaction and the previously mentioned parameters. It was distributed among seven hundred members of different universities in Egypt. Two hundred and twenty-seven faculty members responded. This sample was gathered from twelve universities and The Supreme Council of Universities. The ANOVA showed a significant relationship (p < 0.05) between eight of the selected parameters and job satisfaction. These parameters are age, rank, human resource management, profile of organizational characteristics, workload, recognition, teaching activity, and motivation.

Keywords: job satisfaction, higher education, organizational profile, Egyptian universities

Procedia PDF Downloads 475
1665 An Empirical Analysis of the Impact of Selected Macroeconomic Variables on Capital Formation in Libya (1970–2010)

Authors: Khaled Ramadan Elbeydi

Abstract:

This study is carried out to provide an insight into the analysis of the impact of selected macro-economic variables on gross fixed capital formation in Libya using annual data over the period (1970-2010). The importance of this study comes from the ability to show the relative important factors that impact the Libyan gross fixed capital formation. This understanding would give indications to decision makers on which policy they must focus to stimulate the economy. An Auto-Regressive Distributed Lag (ARDL) modeling process is employed to investigate the impact of the gross domestic product, monetary base, and trade openness on gross fixed capital formation in Libya. The results of this study reveal that there is an equilibrium relationship between capital formation and its determinants. The results also indicate that GDP and trade openness largely explain the pattern of capital formation in Libya. The findings and recommendations provide vital information relevant for policy formulation and implementation aimed to improve capital formation in Libya.

Keywords: ARDL, bounds test, capital formation, co-integration, Libya

Procedia PDF Downloads 356
1664 Ethical Perspectives on Implementation of Computer Aided Design Curriculum in Architecture in Nigeria: A Case Study of Chukwuemeka Odumegwu Ojukwu University, Uli

Authors: Kelechi Ezeji

Abstract:

The use of Computer Aided Design (CAD) technologies has become pervasive in the Architecture, Engineering and Construction (AEC) industry. This has led to its inclusion as an important part of the training module in the curriculum for Architecture Schools in Nigeria. This paper examines the ethical questions that arise in the implementation of Computer Aided Design (CAD) Content of the curriculum for Architectural education. Using existing literature, it begins this scrutiny from the propriety of inclusion of CAD into the education of the architect and the obligations of the different stakeholders in the implementation process. It also examines the questions raised by the negative use of computing technologies as well as perceived negative influence of the use of CAD on design creativity. Survey methodology was employed to gather data from the Department of Architecture, Chukwuemeka Odumegwu Ojukwu University Uli, which has been used as a case study on how the issues raised are being addressed. The paper draws conclusions on what will make for successful ethical implementation.

Keywords: computer aided design, curriculum, education, ethics

Procedia PDF Downloads 407
1663 Study on the Demolition Waste Management in Malaysia Construction Industry

Authors: Gunalan Vasudevan

Abstract:

The Malaysia construction industry generates a large quantity of construction and demolition waste nowadays. In the handbook for demolition work only comprised small portion of demolition waste management. It is important to study and determine the ways to provide a practical guide for the professional in the building industry about handling the demolition waste. In general, demolition defined as tearing down or wrecking of structural work or architectural work of the building and other infrastructures work such as road, bridge and etc. It’s a common misconception that demolition is nothing more than taking down a structure and carrying the debris to a landfill. On many projects, 80-90% of the structure is kept for reuse or recycling which help the owner to save cost. Demolition contractors required a lot of knowledge and experience to minimize the impact of demolition work to the existing surrounding area. For data collecting method, postal questionnaires and interviews have been selected to collect data. Questionnaires have distributed to 80 respondents from the construction industry in Klang Valley. 67 of 80 respondents have replied the questionnaire while 4 people have interviewed. Microsoft Excel and Statistical Package for Social Science version 17.0 were used to analyze the data collected.

Keywords: demolition, waste management, construction material, Malaysia

Procedia PDF Downloads 433
1662 Investigation on Hand-Woven School Uniform Initiative and Sustainability: The Kerala Model from India

Authors: Abhilash Balan Paleri

Abstract:

Hand woven fabric embellishes an exceptional identity in the social milieu of Kerala; still, the artisans and handloom sector is undergoing crisis due to various reasons. The hand woven school uniform initiative of Govt. of Kerala launched in 2016 aims at enhancing the sector, ensuring sustainability at artisan and end-user levels. The Kerala Government already distributed 23 lakhs meters of cloth (for shirting, suiting, and skirting) woven by 4085 artisans in their traditional looms covering 4.5 lakhs of students in the public education sector which covers cover 3,701 schools in the state. The 2019-20 year production is expected to be 42 Lakhs meters of hand woven clothing catering 8.6 lakhs of students in the primary sector. This particular investigation unveils the upshots of the initiative, and the observations are derived through systematic enquiry with artisans, authorities, and end-users. The findings show a remarkable positive impact in the livelihood of artisans and the entire handloom sector.

Keywords: handloom school uniform initiative of Kerala, hand woven fabric, sustainability, handloom weavers

Procedia PDF Downloads 145
1661 Operation Strategy of Multi-Energy Storage System Considering Power System Reliability

Authors: Wook-Won Kim, Je-Seok Shin, Jin-O Kim

Abstract:

As the penetration of Energy Storage System (ESS) increases in the power system due to higher performance and lower cost than ever, ESS is expanding its role to the ancillary service as well as the storage of extra energy from the intermittent renewable energy resources. For multi-ESS with different capacity and SOC level each other, it is required to make the optimal schedule of SOC level use the multi-ESS effectively. This paper proposes the energy allocation method for the multiple battery ESS with reliability constraint, in order to make the ESS discharge the required energy as long as possible. A simple but effective method is proposed in this paper, to satisfy the power for the spinning reserve requirement while improving the system reliability. Modelling of ESS is also proposed, and reliability is evaluated by using the combined reliability model which includes the proposed ESS model and conventional generation one. In the case study, it can be observed that the required power is distributed to each ESS adequately and accordingly, the SOC is scheduled to improve the reliability indices such as Loss of Load Probability (LOLP) and Loss of Load Expectation (LOLE).

Keywords: multiple energy storage system (MESS), energy allocation method, SOC schedule, reliability constraints

Procedia PDF Downloads 360
1660 A Parallel Implementation of Artificial Bee Colony Algorithm within CUDA Architecture

Authors: Selcuk Aslan, Dervis Karaboga, Celal Ozturk

Abstract:

Artificial Bee Colony (ABC) algorithm is one of the most successful swarm intelligence based metaheuristics. It has been applied to a number of constrained or unconstrained numerical and combinatorial optimization problems. In this paper, we presented a parallelized version of ABC algorithm by adapting employed and onlooker bee phases to the Compute Unified Device Architecture (CUDA) platform which is a graphical processing unit (GPU) programming environment by NVIDIA. The execution speed and obtained results of the proposed approach and sequential version of ABC algorithm are compared on functions that are typically used as benchmarks for optimization algorithms. Tests on standard benchmark functions with different colony size and number of parameters showed that proposed parallelization approach for ABC algorithm decreases the execution time consumed by the employed and onlooker bee phases in total and achieved similar or better quality of the results compared to the standard sequential implementation of the ABC algorithm.

Keywords: Artificial Bee Colony algorithm, GPU computing, swarm intelligence, parallelization

Procedia PDF Downloads 369
1659 Analyze of Nanoscale Materials and Devices for Future Communication and Telecom Networks in the Gas Refinery

Authors: Mohamad Bagher Heidari, Hefzollah Mohammadian

Abstract:

New discoveries in materials on the nanometer-length scale are expected to play an important role in addressing ongoing and future challenges in the field of communication. Devices and systems for ultra-high speed short and long range communication links, portable and power efficient computing devices, high-density memory and logics, ultra-fast interconnects, and autonomous and robust energy scavenging devices for accessing ambient intelligence and needed information will critically depend on the success of next-generation emerging nonmaterials and devices. This article presents some exciting recent developments in nonmaterials that have the potential to play a critical role in the development and transformation of future intelligent communication and telecom networks in the gas refinery. The industry is benefiting from nanotechnology advances with numerous applications including those in smarter sensors, logic elements, computer chips, memory storage devices, optoelectronics.

Keywords: nonmaterial, intelligent communication, nanoscale, nanophotonic, telecom

Procedia PDF Downloads 326
1658 Factors Influencing Walking in Bandar Baru Bangi, Malaysia

Authors: Zeinab Aliyas

Abstract:

Walking is known as the most common type of physical activity that helps mental and physical health of people. In the recent years, promoting walking activity in neighborhood areas and cities become as one of the important issues in terms of sustainable cities. Therefore the study aimed to investigate the influence of fear of crime and personal barriers as social and personal factor respectively on neighborhood walking. 464 questionnaires in Bandar Baru Bangi in Malaysia was distributed to collect data, and finally, 424 questionnaires were qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that individual barriers and fear of crime both have significant influence on the level of walking behavior in the neighborhood area. It was found that fear of crime has higher influence on walking behavior in comparison to individual factors. The finding of this study can help urban researcher and planner to know the significant influence of crime safety and individual attitudes on the level of walking activity.

Keywords: fear of crime, neighborhood walking, personal barriers, residential neighborhood

Procedia PDF Downloads 174
1657 Experimental Study of the Infill Masonry Walls Response Subjected to Out-Of-Plane Static Loadings

Authors: André Furtado, Hugo Rodrigues, António Arêde, Humberto Varum

Abstract:

Besides characterized as non-structural elements, infill masonry (IM) walls have an important contribute in the structural response of reinforced concrete structures as proved by the damages observed recent earthquakes. In particular, the out-of-plane (OOP) collapse has been one of the most observed failure mechanism. The aim of this research is to contribute to the increase of understanding regarding the OOP behaviour of full-scale infill panels considering different variables such as panel support width and axial load on the top of columns. For this, it was carried out in the Laboratory of Earthquake and Structural Engineering (LESE) an experimental campaign of five full-scale IM walls subjected to OOP distributed cyclic loadings. Specimens with different variables such as previous in-plane damage, support conditions, axial load on the top of the columns were studied. The results will be presented and discussed along the manuscript in terms of force-displacement hysteretic curves, cracking pattern, initial stiffness, stiffness degradation and accumulative energy dissipation.

Keywords: infill masonry walls, experimental testing, out-of-plane, full-scale

Procedia PDF Downloads 375
1656 Comparison Between Genetic Algorithms and Particle Swarm Optimization Optimized Proportional Integral Derirative and PSS for Single Machine Infinite System

Authors: Benalia Nadia, Zerzouri Nora, Ben Si Ali Nadia

Abstract:

Abstract: Among the many different modern heuristic optimization methods, genetic algorithms (GA) and the particle swarm optimization (PSO) technique have been attracting a lot of interest. The GA has gained popularity in academia and business mostly because to its simplicity, ability to solve highly nonlinear mixed integer optimization problems that are typical of complex engineering systems, and intuitiveness. The mechanics of the PSO methodology, a relatively recent heuristic search tool, are modeled after the swarming or cooperative behavior of biological groups. It is suitable to compare the performance of the two techniques since they both aim to solve a particular objective function but make use of distinct computing methods. In this article, PSO and GA optimization approaches are used for the parameter tuning of the power system stabilizer and Proportional integral derivative regulator. Load angle and rotor speed variations in the single machine infinite bus bar system is used to measure the performance of the suggested solution.

Keywords: SMIB, genetic algorithm, PSO, transient stability, power system stabilizer, PID

Procedia PDF Downloads 71
1655 A Study on Application of Elastic Theory for Computing Flexural Stresses in Preflex Beam

Authors: Nasiri Ahmadullah, Shimozato Tetsuhiro, Masayuki Tai

Abstract:

This paper presents the step-by-step procedure for using Elastic Theory to calculate the internal stresses in composite bridge girders prestressed by the Preflexing Technology, called Prebeam in Japan and Preflex beam worldwide. Elastic Theory approaches preflex beams the same way as it does the conventional composite girders. Since preflex beam undergoes different stages of construction, calculations are made using different sectional and material properties. Stresses are calculated in every stage using the properties of the specific section. Stress accumulation gives the available stress in a section of interest. Concrete presence in the section implies prestress loss due to creep and shrinkage, however; more work is required to be done in this field. In addition to the graphical presentation of this application, this paper further discusses important notes of graphical comparison between the results of an experimental-only research carried out on a preflex beam, with the results of simulation based on the elastic theory approach, for an identical beam using Finite Element Modeling (FEM) by the author.

Keywords: composite girder, Elastic Theory, preflex beam, prestressing

Procedia PDF Downloads 275
1654 An Analysis of a Queueing System with Heterogeneous Servers Subject to Catastrophes

Authors: M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan

Abstract:

This study analyzed a queueing system with blocking and no waiting line. The customers arrive according to a Poisson process and the service times follow exponential distribution. There are two non-identical servers in the system. The queue discipline is FCFS, and the customers select the servers on fastest server first (FSF) basis. The service times are exponentially distributed with parameters μ1 and μ2 at servers I and II, respectively. Besides, the catastrophes occur in a Poisson manner with rate γ in the system. When server I is busy or blocked, the customer who arrives in the system leaves the system without being served. Such customers are called lost customers. The probability of losing a customer was computed for the system. The explicit time dependent probabilities of system size are obtained and a numerical example is presented in order to show the managerial insights of the model. Finally, the probability that arriving customer finds system busy and average number of server busy in steady state are obtained numerically.

Keywords: queueing system, blocking, poisson process, heterogeneous servers, queue discipline FCFS, busy period

Procedia PDF Downloads 497
1653 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 140
1652 Increasing the System Availability of Data Centers by Using Virtualization Technologies

Authors: Chris Ewe, Naoum Jamous, Holger Schrödl

Abstract:

Like most entrepreneurs, data center operators pursue goals such as profit-maximization, improvement of the company’s reputation or basically to exist on the market. Part of those aims is to guarantee a given quality of service. Quality characteristics are specified in a contract called the service level agreement. Central part of this agreement is non-functional properties of an IT service. The system availability is one of the most important properties as it will be shown in this paper. To comply with availability requirements, data center operators can use virtualization technologies. A clear model to assess the effect of virtualization functions on the parts of a data center in relation to the system availability is still missing. This paper aims to introduce a basic model that shows these connections, and consider if the identified effects are positive or negative. Thus, this work also points out possible disadvantages of the technology. In consequence, the paper shows opportunities as well as risks of data center virtualization in relation to system availability.

Keywords: availability, cloud computing IT service, quality of service, service level agreement, virtualization

Procedia PDF Downloads 528
1651 Renovation Planning Model for a Shopping Mall

Authors: Hsin-Yun Lee

Abstract:

In this study, the pedestrian simulation VISWALK integration and application platform ant algorithms written program made to construct a renovation engineering schedule planning mode. The use of simulation analysis platform construction site when the user running the simulation, after calculating the user walks in the case of construction delays, the ant algorithm to find out the minimum delay time schedule plan, and add volume and unit area deactivated loss of business computing, and finally to the owners and users of two different positions cut considerations pick out the best schedule planning. To assess and validate its effectiveness, this study constructed the model imported floor of a shopping mall floor renovation engineering cases. Verify that the case can be found from the mode of the proposed project schedule planning program can effectively reduce the delay time and the user's walking mall loss of business, the impact of the operation on the renovation engineering facilities in the building to a minimum.

Keywords: pedestrian, renovation, schedule, simulation

Procedia PDF Downloads 407
1650 Behaviors and Factors Affecting the Selection of Spa Services among Consumers in Amphawa, Samut Songkhram, Thailand

Authors: Chutima Klaysung

Abstract:

This research aims to study the factors that influence the decision to choose the spa service of consumers in Amphawa, Samut Songkhram, Thailand. The research method will use quantitative research; data were collected by questionnaires distributed to spa consumers, both female and male, aged between 20 years and 70 years in the Amphawa, Samut Songkhram area for 400 samples by convenience sampling method. The data were analyzed using descriptive statistics including percentage, mean, standard deviation and inferential statistics, including Pearson correlation for hypothesis testing. The results showed that the demographic variables including age, education, occupation, income and frequency of access to service spa were related to the decision to choose the spa service of consumers in Amphawa, Samut Songkhram. In addition, the researchers found the marketing mixed factors such as products, prices, places, promotion, personnel selling, physical evidence and processes were associated with the decision to choose the spa service of consumers in Amphawa, Samut Songkhram, Thailand.

Keywords: consumer in amphawa, samut songkhram, decision to choose the spa service, marketing mixed factor, spa service

Procedia PDF Downloads 233
1649 The Vicissitudes of Monetary Policy Rates and Macro-Economic Variables in the West African Monetary Zone

Authors: Jonathan Olusegun Famoroti, Mathew Ekundayo Rotimi, Mishelle Doorasamy

Abstract:

This study offers an empirical investigation into some selected macroeconomic drivers of the monetary policy rate in member countries of the West African Monetary Zone (WAMZ), considering both internal and external variables. We employed Autoregressive Distributed Lag (ARDL) to carry out the investigation between monetary policy and some macroeconomic variables in both the long-run and short-run relationship. The results suggest that the drivers of the policy rate in this zone, in the long run, include, among others, global oil price, exchange rate, inflation rate, and gross domestic product, while in the short run, federal fund rate, trade openness, exchange rate, inflation rate, and gross domestic product are core determinants of the policy rate. Therefore, in order to ensure long-run stability in the policy rate among the members’ states, these drivers should be given closer consideration so that the trajectory for effective structure can be designed and fused into the economic structure and policy frameworks accordingly.

Keywords: monetary policy rate, macroeconomic variables, WAMZ, ARDL

Procedia PDF Downloads 53
1648 3D Electromagnetic Mapping of the Signal Strength in Long Term Evolution Technology in the Livestock Department of ESPOCH

Authors: Cinthia Campoverde, Mateo Benavidez, Victor Arias, Milton Torres

Abstract:

This article focuses on the 3D electromagnetic mapping of the intensity of the signal received by a mobile antenna within the open areas of the Department of Livestock of the Escuela Superior Politecnica de Chimborazo (ESPOCH), located in the city of Riobamba, Ecuador. The transmitting antenna belongs to the mobile telephone company ”TUENTI”, and is analyzed in the 2 GHz bands, operating at a frequency of 1940 MHz, using Long Term Evolution (LTE). Power signal strength data in the area were measured empirically using the ”Network Cell Info” application. A total of 170 samples were collected, distributed in 19 concentric circles around the base station. 3 campaigns were carried out at the same time, with similar traffic, and average values were obtained at each point, which varies between -65.33 dBm to -101.67 dBm. Also, the two virtualization software used are Sketchup and Unreal. Finally, the virtualized environment was visualized through virtual reality using Oculus 3D glasses, where the power levels are displayed according to a range of powers.

Keywords: reception power, LTE technology, virtualization, virtual reality, power levels

Procedia PDF Downloads 82
1647 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 353