Search results for: effective computing
8991 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1448990 A Web-Based Real Property Updating System for Efficient and Sustainable Urban Development: A Case Study in Ethiopia
Authors: Eyosiyas Aga
Abstract:
The development of information communication technology has transformed the paper-based mapping and land registration processes to a computerized and networked system. The computerization and networking of real property information system play a vital role in good governance and sustainable development of emerging countries through cost effective, easy and accessible service delivery for the customer. The efficient, transparent and sustainable real property system is becoming the basic infrastructure for the urban development thus improve the data management system and service delivery in the organizations. In Ethiopia, the real property administration is paper based as a result, it confronted problems of data management, illegal transactions, corruptions, and poor service delivery. In order to solve this problem and to facilitate real property market, the implementation of web-based real property updating system is crucial. A web-based real property updating is one of the automation (computerizations) methods to facilitate data sharing, reduce time and cost of the service delivery in real property administration system. In additions, it is useful for the integration of data onto different information systems and organizations. This system is designed by combining open source software which supported by open Geo-spatial consortium. The web-based system is mainly designed by using open source software with the help of open Geo-spatial Consortium. The Open Geo-spatial Consortium standards such as the Web Feature Service and Web Map Services are the most widely used standards to support and improves web-based real property updating. These features allow the integration of data from different sources, and it can be used to maintain consistency of data throughout transactions. The PostgreSQL and Geoserver are used to manage and connect a real property data to the flex viewer and user interface. The system is designed for both internal updating system (municipality); which is mainly updating of spatial and textual information, and the external system (customer) which focus on providing and interacting with the customer. This research assessed the potential of open source web applications and adopted this technology for real property updating system in Ethiopia through simple, cost effective and secured way. The system is designed by combining and customizing open source software to enhance the efficiency of the system in cost effective way. The existing workflow for real property updating is analyzed to identify the bottlenecks, and the new workflow is designed for the system. The requirement is identified through questionnaire and literature review, and the system is prototype for the study area. The research mainly aimed to integrate human resource with technology in designing of the system to reduce data inconsistency and security problems. In additions, the research reflects on the current situation of real property administration and contributions of effective data management system for efficient, transparent and sustainable urban development in Ethiopia.Keywords: cadaster, real property, sustainable, transparency, web feature service, web map service
Procedia PDF Downloads 2648989 Increasing the System Availability of Data Centers by Using Virtualization Technologies
Authors: Chris Ewe, Naoum Jamous, Holger Schrödl
Abstract:
Like most entrepreneurs, data center operators pursue goals such as profit-maximization, improvement of the company’s reputation or basically to exist on the market. Part of those aims is to guarantee a given quality of service. Quality characteristics are specified in a contract called the service level agreement. Central part of this agreement is non-functional properties of an IT service. The system availability is one of the most important properties as it will be shown in this paper. To comply with availability requirements, data center operators can use virtualization technologies. A clear model to assess the effect of virtualization functions on the parts of a data center in relation to the system availability is still missing. This paper aims to introduce a basic model that shows these connections, and consider if the identified effects are positive or negative. Thus, this work also points out possible disadvantages of the technology. In consequence, the paper shows opportunities as well as risks of data center virtualization in relation to system availability.Keywords: availability, cloud computing IT service, quality of service, service level agreement, virtualization
Procedia PDF Downloads 5348988 Renovation Planning Model for a Shopping Mall
Authors: Hsin-Yun Lee
Abstract:
In this study, the pedestrian simulation VISWALK integration and application platform ant algorithms written program made to construct a renovation engineering schedule planning mode. The use of simulation analysis platform construction site when the user running the simulation, after calculating the user walks in the case of construction delays, the ant algorithm to find out the minimum delay time schedule plan, and add volume and unit area deactivated loss of business computing, and finally to the owners and users of two different positions cut considerations pick out the best schedule planning. To assess and validate its effectiveness, this study constructed the model imported floor of a shopping mall floor renovation engineering cases. Verify that the case can be found from the mode of the proposed project schedule planning program can effectively reduce the delay time and the user's walking mall loss of business, the impact of the operation on the renovation engineering facilities in the building to a minimum.Keywords: pedestrian, renovation, schedule, simulation
Procedia PDF Downloads 4128987 Multicasting Characteristics of All-Optical Triode Based on Negative Feedback Semiconductor Optical Amplifiers
Authors: S. Aisyah Azizan, M. Syafiq Azmi, Yuki Harada, Yoshinobu Maeda, Takaomi Matsutani
Abstract:
We introduced an all-optical multi-casting characteristics with wavelength conversion based on a novel all-optical triode using negative feedback semiconductor optical amplifier. This study was demonstrated with a transfer speed of 10 Gb/s to a non-return zero 231-1 pseudorandom bit sequence system. This multi-wavelength converter device can simultaneously provide three channels of output signal with the support of non-inverted and inverted conversion. We studied that an all-optical multi-casting and wavelength conversion accomplishing cross gain modulation is effective in a semiconductor optical amplifier which is effective to provide an inverted conversion thus negative feedback. The relationship of received power of back to back signal and output signals with wavelength 1535 nm, 1540 nm, 1545 nm, 1550 nm, and 1555 nm with bit error rate was investigated. It was reported that the output signal wavelengths were successfully converted and modulated with a power penalty of less than 8.7 dB, which the highest is 8.6 dB while the lowest is 4.4 dB. It was proved that all-optical multi-casting and wavelength conversion using an optical triode with a negative feedback by three channels at the same time at a speed of 10 Gb/s is a promising device for the new wavelength conversion technology.Keywords: cross gain modulation, multicasting, negative feedback optical amplifier, semiconductor optical amplifier
Procedia PDF Downloads 6838986 A Weighted Sum Particle Swarm Approach (WPSO) Combined with a Novel Feasibility-Based Ranking Strategy for Constrained Multi-Objective Optimization of Compact Heat Exchangers
Authors: Milad Yousefi, Moslem Yousefi, Ricarpo Poley, Amer Nordin Darus
Abstract:
Design optimization of heat exchangers is a very complicated task that has been traditionally carried out based on a trial-and-error procedure. To overcome the difficulties of the conventional design approaches especially when a large number of variables, constraints and objectives are involved, a new method based on a well-stablished evolutionary algorithm, particle swarm optimization (PSO), weighted sum approach and a novel constraint handling strategy is presented in this study. Since, the conventional constraint handling strategies are not effective and easy-to-implement in multi-objective algorithms, a novel feasibility-based ranking strategy is introduced which is both extremely user-friendly and effective. A case study from industry has been investigated to illustrate the performance of the presented approach. The results show that the proposed algorithm can find the near pareto-optimal with higher accuracy when it is compared to conventional non-dominated sorting genetic algorithm II (NSGA-II). Moreover, the difficulties of a trial-and-error process for setting the penalty parameters is solved in this algorithm.Keywords: Heat exchanger, Multi-objective optimization, Particle swarm optimization, NSGA-II Constraints handling.
Procedia PDF Downloads 5548985 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 3698984 Investigating the Insecticidal Effects of the Hexanic Extracts of Thymus spp. and Eucalyptus spp. on Cotton Bollworm, Helicoverpa armigera (Hübner) (Lepidoptera: Noctuidae)
Authors: Reza Sadeghi, Maryam Nazarahari
Abstract:
Considering the effectiveness of plant pesticides in pest control, this group of pesticides can provide an efficient way to reduce the damage caused by pests in agriculture and maintain environmental health. Plant pesticides allow farmers to cultivate their crops by lowering the use of chemical pesticides and help improve the quality of agricultural products. In this research, various plant compounds were extracted from two different sources, thyme and eucalyptus, by using n-hexane solvent and investigated to control cotton bollworm in laboratory conditions. The mortality rates of cotton bollworm (Helicoverpa armigera) caused by different concentrations of hexanic extract formulations were evaluated. The results showed that the varied concentrations of the hexanic extract formulations of thyme and eucalyptus had significant effects on the mortality rates of cotton bollworm larvae during a 24-h exposure period. The hexanic extract of thyme as a plant pesticide can be an effective alternative in agriculture and plant pest control. The use of pesticides in agriculture can help the environment and reduce the problems related to chemical toxins. Also, this research revealed that the types and compounds of plant pesticides can be effective in pest control and help to develop more efficient agricultural strategies.Keywords: cotton bollworm, thyme, eucalyptus, extract formulation, toxicity
Procedia PDF Downloads 908983 The Quantitative Analysis of Tourism Carrying Capacity with the Approach of Sustainable Development Case Study: Siahsard Fountain
Authors: Masoumeh Tadayoni, Saeed Kamyabi, Alireza Entezari
Abstract:
Background and goal of the research: In planning and management system, the tourism carrying capacity is used as a holistic approach and supportive instrument. Evaluating the carrying capacity is used in quantitative the resource exploitation in line with sustainable development and as a foundation for identifying the changes in natural ecosystem and for the final evaluation and monitoring the tensions and decays in regressed ecosystem. Therefore, the present research tries to determine the carrying capacity of effective, physical and real range of Siahsard tourism region. Method: In the present research, the quantitative analysis of tourism carrying capacity is studied by used of effective or permissible carrying capacity (EPCC), real carrying capacity (PCC) and physical carrying capacity (RCC) in Siahsard fountain. It is analyzed based on the field survey and various resources were used for collecting information. Findings: The results of the analysis shows that, 3700 people use the Siahsard tourism region every day and 1350500 people use it annually. However, the evaluation of carrying capacity can be annually 1390650 people in this place. It can be an important tourism place along with other places in the region. Results: Siahsard’s tourism region has a little way to reach to its carrying capacity that needs to be analyzed. However, based on the results, some suggestions were offered for sustainable development of this region and as the most logical alternations for tourism management.Keywords: carrying capacity, evaluation, Siahsard, tourism
Procedia PDF Downloads 2708982 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays
Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal
Abstract:
Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).Keywords: fault tolerance, FPGA, single event upset, approximate computing
Procedia PDF Downloads 1988981 Advanced Digital Manufacturing: Case Study
Authors: Abdelrahman Abdelazim
Abstract:
Most industries are looking for technologies that are easy to use, efficient and fast to accomplish. To implement these, factories tend to use advanced systems that could alter complicity to simplicity and rudimentary to advancement. Cloud Manufacturing is a new movement that aims to mirror and integrate cloud computing into manufacturing. Amongst cloud manufacturing various advantages are decreasing the human involvements and increasing the dependency on automated machines, which in turns decreases human errors and increases efficiency. A reliable and extraordinary performance processes with minimum errors are highly desired factors of today’s manufacturers. At the glance it seems to be the best alternative, however, the implementation of a cloud system can be very challenging. This work investigates cloud manufacturing in details, it outlines its advantages and disadvantages by converting a local factory in Kuwait to a cloud-ready system. Initially the flow of the factory’s manufacturing process has been analyzed identifying the bottlenecks and illustrating how cloud manufacturing can eliminate them. Following this an automation process has been analyzed and implemented. A comparison between the process before and after the adaptation has been carried out showing the effects on the cost, the output and the efficiency of the process.Keywords: cloud manufacturing, automation, Kuwait industrial sector, advanced digital manufacturing
Procedia PDF Downloads 7708980 Current Medical and Natural Synchronization Methods in Small Ruminants
Authors: Mehmet Akoz, Mustafa Kul
Abstract:
Ewes and goats are seasonally polyestrus animals. Their reproductive activities are associated with the reduction or extending of daylight. Melatonin releasing from pineal gland regulates the sexual activities depending on daylight. In recent years, number of ewes decreased in our country. This situation dispatched to developing of some methods to increase productivity. Small ruminants can be synchronized with the natural and medical methods. known methods from natural light set with ram and goat participation. The most important natural methods of male influence, daylight is regulated and feed. On the other hand, progestagens, PGF2α, melatonin, and gonadotropins are commonly used for the purpose of estrus synchranization. But it is not effective PGF2α anestrous season The short-term and long-term progesterone treatment was effective to synchronize estrus in small ruminats during both breeding and anestrus seasons. Alternative choices of progesterone/progestagen have been controlled internal drug release (CIDR) devices, supplying natural progesterone, norgestomet implants, and orally active melengestrol acetate Melatonin anestrous season and should be applied during the transition period, but the season can be synchronized. Estrus synchronisation shortens anestrus season, decreases labor for mating/insemination and estrus pursuit, and induces multiple pregnancies.Keywords: ewes, goat, synchronization, progestagen, PGF2α
Procedia PDF Downloads 3408979 Effect of Shrinkage on Heat and Mass Transfer Parameters of Solar Dried Potato Samples of Variable Diameter
Authors: Kshanaprava Dhalsamant, Punyadarshini P. Tripathy, Shanker L. Shrivastava
Abstract:
Potato is chosen as the food product for carrying out the natural convection mixed-mode solar drying experiments since they are easily available and globally consumed. The convective heat and mass transfer coefficients along with effective diffusivity were calculated considering both shrinkage and without shrinkage for the potato cylinders of different geometry (8, 10 and 13 mm diameters and a constant length of 50 mm). The convective heat transfer coefficient (hc) without considering shrinkage effect were 24.28, 18.69, 15.89 W/m2˚C and hc considering shrinkage effect were 37.81, 29.21, 25.72 W/m2˚C for 8, 10 and 13 mm diameter samples respectively. Similarly, the effective diffusivity (Deff) without considering shrinkage effect were 3.20×10-9, 4.82×10-9, 2.48×10-8 m2/s and Deff considering shrinkage effect were 1.68×10-9, 2.56×10-9, 1.34×10-8 m2/s for 8, 10 and 13 mm diameter samples respectively and the mass transfer coefficient (hm) without considering the shrinkage effect were 5.16×10-7, 2.93×10-7, 2.59×10-7 m/s and hm considering shrinkage effect were 3.71×10-7, 2.04×10-7, 1.80×10-7 m/s for 8, 10 and 13 mm diameter samples respectively. Increased values of hc were obtained by considering shrinkage effect in all diameter samples because shrinkage results in decreasing diameter with time achieving in enhanced rate of water loss. The average values of Deff determined without considering the shrinkage effect were found to be almost double that with shrinkage effect. The reduction in hm values is due to the fact that with increasing sample diameter, the exposed surface area per unit mass decreases, resulting in a slower moisture removal. It is worth noting that considering shrinkage effect led to overestimation of hc values in the range of 55.72-61.86% and neglecting the shrinkage effect in the mass transfer analysis, the values of Deff and hm are overestimated in the range of 85.02-90.27% and 39.11-45.11%, respectively, for the range of sample diameter investigated in the present study.Keywords: shrinkage, convective heat transfer coefficient, effectivive diffusivity, convective mass transfer coefficient
Procedia PDF Downloads 2558978 Challenges in Developing a World Class Sustainable Food Organization
Authors: Baskar Kotte
Abstract:
Many organizations are constantly striving to implement numerous techniques for long-term sustainability, for food related organizations it is imperative to conceptualize the critical concepts which constitute food safety sustainability. This presentation provides three critical pillars to develop a sustainable organization. Financial sustainability, regulatory sustainability and excellence standards sustainability are the three components which practiced and implemented effectively with process performance metrics defined objectives and targets lead to sustainable and safe food organizations. The participants take away a well-developed concept diagram with all elements impacting sustainability. Proven disciplined path which worked to achieve desired results is presented for effective implementation. Effective implementation of this proven disciplined path positions organizations to achieve world class status with bottomline improvement. Additionally, this presentation highlights critical terms, principles and implementation difficulties related to using the proven disciplined path. This presentation is beneficial for business leaders, food safety compliance managers, food safety practitioners, financial managers, Lean & Six sigma continual improvement managers, BRC/SQF/ IFS / FSSC 22000 practitioners and food manufacturing personnel.Keywords: food safety, sustainability, regulatory, lean, six sigma, bottom-line improvement disciplined path
Procedia PDF Downloads 2778977 The Mediating Role of Store Personality in the Relationship Between Self-Congruity and Manifestations of Loyalty
Authors: María de los Ángeles Crespo López, Carmen García García
Abstract:
The highly competitive nature of today's globalised marketplace requires that brands and stores develop effective commercial strategies to ensure their economic survival. Maintaining the loyalty of existing customers constitutes one key strategy that yields the best results. Although the relationship between consumers' self-congruity and their manifestations of loyalty towards a store has been investigated, the role of store personality in this relationship remains unclear. In this study, multiple parallel mediation analysis was used to examine the effect of Store Personality on the relationship between Self-Congruity of consumers and their Manifestations of Loyalty. For this purpose, 457 Spanish consumers of the Fnac store completed three self-report questionnaires assessing Store Personality, Self-Congruity, and Store Loyalty. The data were analyzed using the SPSS macro PROCESS. The results revealed that three dimensions of Store Personality, namely Exciting, Close and Competent Store, positively and significantly mediated the relationship between Self-Congruity and Manifestations of Loyalty. The indirect effect of Competent Store was the greatest. This means that a consumer with higher levels of Self-Congruity with the store will exhibit more Manifestations of Loyalty when the store is perceived as Exciting, Close or Competent. These findings suggest that more attention should be paid to the perceived personality of stores for the development of effective marketing strategies to maintain or increase consumers' manifestations of loyalty towards stores.Keywords: multiple parallel mediation, PROCESS, self-congruence, store loyalty, store personality
Procedia PDF Downloads 1568976 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers
Authors: R. W. C. Devindi, S. M. Buddika Harshanath
Abstract:
E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis
Procedia PDF Downloads 1058975 Forming-Free Resistive Switching Effect in ZnₓTiᵧHfzOᵢ Nanocomposite Thin Films for Neuromorphic Systems Manufacturing
Authors: Vladimir Smirnov, Roman Tominov, Vadim Avilov, Oleg Ageev
Abstract:
The creation of a new generation micro- and nanoelectronics elements opens up unlimited possibilities for electronic devices parameters improving, as well as developing neuromorphic computing systems. Interest in the latter is growing up every year, which is explained by the need to solve problems related to the unstructured classification of data, the construction of self-adaptive systems, and pattern recognition. However, for its technical implementation, it is necessary to fulfill a number of conditions for the basic parameters of electronic memory, such as the presence of non-volatility, the presence of multi-bitness, high integration density, and low power consumption. Several types of memory are presented in the electronics industry (MRAM, FeRAM, PRAM, ReRAM), among which non-volatile resistive memory (ReRAM) is especially distinguished due to the presence of multi-bit property, which is necessary for neuromorphic systems manufacturing. ReRAM is based on the effect of resistive switching – a change in the resistance of the oxide film between low-resistance state (LRS) and high-resistance state (HRS) under an applied electric field. One of the methods for the technical implementation of neuromorphic systems is cross-bar structures, which are ReRAM cells, interconnected by cross data buses. Such a structure imitates the architecture of the biological brain, which contains a low power computing elements - neurons, connected by special channels - synapses. The choice of the ReRAM oxide film material is an important task that determines the characteristics of the future neuromorphic system. An analysis of literature showed that many metal oxides (TiO2, ZnO, NiO, ZrO2, HfO2) have a resistive switching effect. It is worth noting that the manufacture of nanocomposites based on these materials allows highlighting the advantages and hiding the disadvantages of each material. Therefore, as a basis for the neuromorphic structures manufacturing, it was decided to use ZnₓTiᵧHfzOᵢ nanocomposite. It is also worth noting that the ZnₓTiᵧHfzOᵢ nanocomposite does not need an electroforming, which degrades the parameters of the formed ReRAM elements. Currently, this material is not well studied, therefore, the study of the effect of resistive switching in forming-free ZnₓTiᵧHfzOᵢ nanocomposite is an important task and the goal of this work. Forming-free nanocomposite ZnₓTiᵧHfzOᵢ thin film was grown by pulsed laser deposition (Pioneer 180, Neocera Co., USA) on the SiO2/TiN (40 nm) substrate. Electrical measurements were carried out using a semiconductor characterization system (Keithley 4200-SCS, USA) with W probes. During measurements, TiN film was grounded. The analysis of the obtained current-voltage characteristics showed a resistive switching from HRS to LRS resistance states at +1.87±0.12 V, and from LRS to HRS at -2.71±0.28 V. Endurance test shown that HRS was 283.21±32.12 kΩ, LRS was 1.32±0.21 kΩ during 100 measurements. It was shown that HRS/LRS ratio was about 214.55 at reading voltage of 0.6 V. The results can be useful for forming-free nanocomposite ZnₓTiᵧHfzOᵢ films in neuromorphic systems manufacturing. This work was supported by RFBR, according to the research project № 19-29-03041 mk. The results were obtained using the equipment of the Research and Education Center «Nanotechnologies» of Southern Federal University.Keywords: nanotechnology, nanocomposites, neuromorphic systems, RRAM, pulsed laser deposition, resistive switching effect
Procedia PDF Downloads 1328974 Beyond Classic Program Evaluation and Review Technique: A Generalized Model for Subjective Distributions with Flexible Variance
Authors: Byung Cheol Kim
Abstract:
The Program Evaluation and Review Technique (PERT) is widely used for project management, but it struggles with subjective distributions, particularly due to its assumptions of constant variance and light tails. To overcome these limitations, we propose the Generalized PERT (G-PERT) model, which enhances PERT by incorporating variability in three-point subjective estimates. Our methodology extends the original PERT model to cover the full range of unimodal beta distributions, enabling the model to handle thick-tailed distributions and offering formulas for computing mean and variance. This maintains the simplicity of PERT while providing a more accurate depiction of uncertainty. Our empirical analysis demonstrates that the G-PERT model significantly improves performance, particularly when dealing with heavy-tail subjective distributions. In comparative assessments with alternative models such as triangular and lognormal distributions, G-PERT shows superior accuracy and flexibility. These results suggest that G-PERT offers a more robust solution for project estimation while still retaining the user-friendliness of the classic PERT approach.Keywords: PERT, subjective distribution, project management, flexible variance
Procedia PDF Downloads 178973 Piql Preservation Services - A Holistic Approach to Digital Long-Term Preservation
Authors: Alexander Rych
Abstract:
Piql Preservation Services (“Piql”) is a turnkey solution designed for secure, migration-free long- term preservation of digital data. Piql sets an open standard for long- term preservation for the future. It consists of equipment and processes needed for writing and retrieving digital data. Exponentially growing amounts of data demand for logistically effective and cost effective processes. Digital storage media (hard disks, magnetic tape) exhibit limited lifetime. Repetitive data migration to overcome rapid obsolescence of hardware and software bears accelerated risk of data loss, data corruption or even manipulation and adds significant repetitive costs for hardware and software investments. Piql stores any kind of data in its digital as well as analog form securely for 500 years. The medium that provides this is a film reel. Using photosensitive film polyester base, a very stable material that is known for its immutability over hundreds of years, secure and cost-effective long- term preservation can be provided. The film reel itself is stored in a packaging capable of protecting the optical storage medium. These components have undergone extensive testing to ensure longevity of up to 500 years. In addition to its durability, film is a true WORM (write once- read many) medium. It therefore is resistant to editing or manipulation. Being able to store any form of data onto the film makes Piql a superior solution for long-term preservation. Paper documents, images, video or audio sequences – all of those file formats and documents can be preserved in its native file structure. In order to restore the encoded digital data, only a film scanner, a digital camera or any appropriate optical reading device will be needed in the future. Every film reel includes an index section describing the data saved on the film. It also contains a content section carrying meta-data, enabling users in the future to rebuild software in order to read and decode the digital information.Keywords: digital data, long-term preservation, migration-free, photosensitive film
Procedia PDF Downloads 3908972 Spatial-Temporal Awareness Approach for Extensive Re-Identification
Authors: Tyng-Rong Roan, Fuji Foo, Wenwey Hseush
Abstract:
Recent development of AI and edge computing plays a critical role to capture meaningful events such as detection of an unattended bag. One of the core problems is re-identification across multiple CCTVs. Immediately following the detection of a meaningful event is to track and trace the objects related to the event. In an extensive environment, the challenge becomes severe when the number of CCTVs increases substantially, imposing difficulties in achieving high accuracy while maintaining real-time performance. The algorithm that re-identifies cross-boundary objects for extensive tracking is referred to Extensive Re-Identification, which emphasizes the issues related to the complexity behind a great number of CCTVs. The Spatial-Temporal Awareness approach challenges the conventional thinking and concept of operations which is labor intensive and time consuming. The ability to perform Extensive Re-Identification through a multi-sensory network provides the next-level insights – creating value beyond traditional risk management.Keywords: long-short-term memory, re-identification, security critical application, spatial-temporal awareness
Procedia PDF Downloads 1118971 Tourism Potential of Kyrgyzstan and Contribution of Ethics to It's Tourism Growth
Authors: Halil Koch
Abstract:
In this article, besides the current tourism potential of Kyrgyzstan, the factors that may affect the tourism potential of Kyrgyzstan were discussed. Kyrgyzstan is a unique country that can offer quite different alternatives for tourism with its unique nature, lakes, mountains, history, and rich culture. Despite having so many alternatives, today, Kyrgyzstan cannot use this unique wealth as it should. This article tried to deal with matters that can increase the tourism potential of Kyrgyzstan. In addition, the contribution of ethical rules to the tourism potential of Kyrgyzstan was discussed. A detailed literature review was carried out on the tourism industry and tourism potential of Kyrgyzstan. After the literature review, a survey was conducted with the businesses and employees of touristic businesses in the Issyk Kul region of Kyrgyzstan in order to determine the factors that might improve the tourism potential and the effect of ethical rules on the tourism of Kyrgyzstan. 100 people participated in the survey. According to the results of the survey, the participants of the survey think that the culture, touristic richness, and unique nature of Kyrgyzstan are not promoted effectively. Participants think that Kyrgyzstan's tourism capacity will increase with the effective implementation of ethical rules as well as the effective promotion of Kyrgyzstan's cultural and natural wealth. According to the results of the survey, participants think that the tourism sector in Kyrgyzstan will develop rapidly if the ethical rules are followed as much as possible from the first moment that the tourists who come to the country set foot in the country. Participants predict that ethical rules have a tremendous impact on Kyrgyzstan tourism. It has been revealed that there is no systematic approach to ethical rules.Keywords: tourism, ethics, growth, economy
Procedia PDF Downloads 1138970 Computational Agent-Based Approach for Addressing the Consequences of Releasing Gene Drive Mosquito to Control Malaria
Authors: Imran Hashmi, Sipkaduwa Arachchige Sashika Sureni Wickramasooriya
Abstract:
Gene-drive technology has emerged as a promising tool for disease control by influencing the population dynamics of disease-carrying organisms. Various gene drive mechanisms, derived from global laboratory experiments, aim to strategically manage and prevent the spread of targeted diseases. One prominent strategy involves population replacement, wherein genetically modified mosquitoes are introduced to replace the existing local wild population. To enhance our understanding and aid in the design of effective release strategies, we employ a comprehensive mathematical model. The utilized approach employs agent-based modeling, enabling the consideration of individual mosquito attributes and flexibility in parameter manipulation. Through the integration of an agent-based model and a meta-population spatial approach, the dynamics of gene drive mosquito spreading in a released site are simulated. The model's outcomes offer valuable insights into future population dynamics, providing guidance for the development of informed release strategies. This research significantly contributes to the ongoing discourse on the responsible and effective implementation of gene drive technology for disease vector control.Keywords: gene drive, agent-based modeling, disease-carrying organisms, malaria
Procedia PDF Downloads 658969 Optimize Study and Optical Characterization of Bilayer Structures from Silicon Nitride
Authors: Beddiaf Abdelaziz
Abstract:
The optical characteristics of thin films of silicon oxynitride SiOₓNy prepared by the Low-Pressure Chemical Vapor Deposition (LPCVD) technique have been studied. The films are elaborated from the SiH₂Cl₂, N₂O and NH₃ gaseous mixtures. The flows of SiH₂Cl₂ and (N₂O+NH₃) are 200 sccm and 160 sccm respectively. The deposited films have been characterized by ellipsometry, to model our silicon oxynitride SiOₓNy films. We have suggested two theoretical models (Maxwell Garnett and Bruggeman effective medium approximation (BEMA)). These models have been applied on silicon oxynitride considering the material as a heterogeneous medium formed by silicon oxide and silicon nitride. The model's validation was justified by the confrontation of theoretical spectra and those measured by ellipsometry. This result permits us to obtain the optical refractive coefficient of these films and their thickness. Ellipsometry analysis of the optical properties of the SiOₓNy films shows that the SiO₂ fraction decreases when the gaseous ratio NH₃/N₂O increases. Whereas the increase of this ratio leads to an increase of the silicon nitride Si3N4 fraction. The study also shows that the increasing gaseous ratio leads to a strong incorporation of nitrogen atoms in films. Also, the increasing of the SiOₓNy refractive coefficient until the SiO₂ value shows that this insulating material has good dielectric quality.Keywords: ellipsometry, silicon oxynitrde, model, refractive coefficient, effective medium
Procedia PDF Downloads 168968 Using Machine Learning as an Alternative for Predicting Exchange Rates
Authors: Pedro Paulo Galindo Francisco, Eli Dhadad Junior
Abstract:
This study addresses the Meese-Rogoff Puzzle by introducing the latest machine learning techniques as alternatives for predicting the exchange rates. Using RMSE as a comparison metric, Meese and Rogoff discovered that economic models are unable to outperform the random walk model as short-term exchange rate predictors. Decades after this study, no statistical prediction technique has proven effective in overcoming this obstacle; although there were positive results, they did not apply to all currencies and defined periods. Recent advancements in artificial intelligence technologies have paved the way for a new approach to exchange rate prediction. Leveraging this technology, we applied five machine learning techniques to attempt to overcome the Meese-Rogoff puzzle. We considered daily data for the real, yen, British pound, euro, and Chinese yuan against the US dollar over a time horizon from 2010 to 2023. Our results showed that none of the presented techniques were able to produce an RMSE lower than the Random Walk model. However, the performance of some models, particularly LSTM and N-BEATS were able to outperform the ARIMA model. The results also suggest that machine learning models have untapped potential and could represent an effective long-term possibility for overcoming the Meese-Rogoff puzzle.Keywords: exchage rate, prediction, machine learning, deep learning
Procedia PDF Downloads 308967 A Resource Optimization Strategy for CPU (Central Processing Unit) Intensive Applications
Authors: Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu
Abstract:
On the basis of traditional resource allocation strategies, the usage of resources on physical servers in cloud data center is great uncertain. It will cause waste of resources if the assignment of tasks is not enough. On the contrary, it will cause overload if the assignment of tasks is too much. This is especially obvious when the applications are the same type because of its resource preferences. Considering CPU intensive application is one of the most common types of application in the cloud, we studied the optimization strategy for CPU intensive applications on the same server. We used resource preferences to analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can predict the execution time for CPU intensive applications which run simultaneously. Based on the prediction model, we proposed the method to select the appropriate number of applications for a machine. Experiments show that the model can predict the execution time accurately for CPU intensive applications. To improve the execution efficiency of applications, we propose a scheduling model based on priority for CPU intensive applications. Extensive experiments verify the validity of the scheduling model.Keywords: cloud computing, CPU intensive applications, resource optimization, strategy
Procedia PDF Downloads 2768966 Avatar Creation for E-Learning
Authors: M. Najib Osman, Hanafizan Hussain, Sri Kusuma Wati Mohd Daud
Abstract:
Avatar was used as user’s symbol of identity in online communications such as Facebook, Twitter, online game, and portal community between unknown people. The development of this symbol is the use of animated character or avatar, which can engage learners in a way that draws them into the e-Learning experience. Immersive learning is one of the most effective learning techniques, and animated characters can help create an immersive environment. E-learning is an ideal learning environment using modern means of information technology, through the effective integration of information technology and the curriculum to achieve, a new learning style which can fully reflect the main role of the students to reform the traditional teaching structure thoroughly. Essential in any e-learning is the degree of interactivity for the learner, and whether the learner is able to study at any time, or whether there is a need for the learner to be online or in a classroom with other learners at the same time (synchronous learning). Ideally, e-learning should engage the learners, allowing them to interact with the course materials, obtaining feedback on their progress and assistance whenever it is required. However, the degree of interactivity in e-learning depends on how the course has been developed and is dependent on the software used for its development, and the way the material is delivered to the learner. Therefore, users’ accessibility that allows access to information at any time and places and their positive attitude towards e-learning such as having interacting with a good teacher and the creation of a more natural and friendly environment for e-learning should be enhanced. This is to motivate their learning enthusiasm and it has been the responsibility of educators to incorporate new technology into their ways of teaching.Keywords: avatar, e-learning, higher education, students' perception
Procedia PDF Downloads 4098965 A Genre Analysis of University Lectures
Authors: Lee Kok Yueh, Fatin Hamadah Rahman, David Hassell, Au Thien Wan
Abstract:
This work reports on a genre based study of lectures at a University in Brunei, Universiti Teknologi Brunei to explore the communicative functions and to gain insight into the discourse. It explores these in three different domains; Social Science, Engineering and Computing. Audio recordings from four lecturers comprising 20 lectures were transcribed and analysed, with the duration of each lecture varying between 20 to 90 minutes. This qualitative study found similar patterns and functions of lectures as those found in existing research amongst which include greetings, housekeeping, or recapping of previous lectures in the lecture introductions. In the lecture content, comprehension check and use of examples or analogies are very prevalent. However, the use of examples largely depend on the lecture content; and the more technical the content, the harder it was for lecturers to provide examples or analogies. Three functional moves are identified in the lecture conclusions; announcement, summary and future plan, all of which are optional. Despite the relatively small sample size, the present study shows that lectures are interactive and there are some consistencies with the delivery of lecture in relation to the communicative functions and genre of lecture.Keywords: communicative functions, genre analysis, higher education, lectures
Procedia PDF Downloads 1908964 Jeddah’s Hydraulic Protection Systems and the Management of Flood: An Assessment
Authors: Faouzi Ameur, Atef Belhaj Ali
Abstract:
Located in the South-west of Saudi Arabia, Jeddah is more than a harbor. It is a big city of the Red Sea and the second town of Saudi Arabia, after Riyadh the capital. Jeddah profits from several economic assets due especially to its transit position towards the high sacred places of Islam like Mecca and Medina. During summer, this metropolis is transformed into a political capital and a tourist resort for foreigners and Saudis alike. The city of Jeddah was affected by serious sudden floods; two great ones took place in 2009, and in 2011. The human and material tools were considerable, since these events caused the death to hundreds of people, damaged thousands of buildings built on basins slopes, which, however had the authorizations necessary. To cope with these natural disasters, several urban hydraulic measures were undertaken like building dams and canals to collect surface waters. These urban measures aimed at the protection of inhabitants and belongings against the risks of floods as well as the interception and the drainage of streams. Although these protection measures are important, expensive, and effective, they are no longer enough or effective to cope with the evolution of the natural disasters that the city of Jeddah is constantly exposed to. These protective hydraulic measures did not make it possible to reach risk zero situations. They transferred the damages towards other zones. This paper purports to study the protection network systems in Jeddah and to understand their various impacts during floods on the city and on its inhabitants.Keywords: Jeddah, Saudi Arabia, urbanization, hydraulic protection
Procedia PDF Downloads 2488963 Design and Development of Data Mining Application for Medical Centers in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: data mining, medical record system, systems programming, computing
Procedia PDF Downloads 2078962 Utilizing Radio as a Resource Alternative for Disseminating Information to University Students in Ibadan, Nigeria: A Study of Lead City FM and Diamond FM Radio Stations
Authors: Olufemi Sunday Onabajo
Abstract:
Radio according to communication scholars is a veritable instrument of mass education. However, its full potentials in boosting higher education have not been realized because of the commercial nature of radio stations in Nigeria. The licensing of campus radio for disseminating information on university curricular is aimed at reinforcing information shared during face to face teaching. This study anchored on Agenda Setting and Technology determinism theories seeks to find out the extent to which university students in Lead City University and University of Ibadan, Nigeria have keyed-in to the philosophy of their campus radio – Lead City FM and Diamond FM in making information dissemination in their domiciled universities less cumbersome. The study employs both qualitative and quantitative methods though the use of depth interview for ten (10) academic staff and five (5) radio personnel of both radio stations; and a questionnaire addressed to 200 students of both institutions using the systematic random sampling technique. The data collected was analyzed using simple percentage and chi-square one tail test, and it was discovered that students of both universities and their radio personnel are yet to realize the potentials of campus radio as a resource alternative to effective learning, and recommends the coming together of all stakeholders to articulate the way forward.Keywords: disseminating information, effective learning, resource alternative, utilizing radio
Procedia PDF Downloads 296