Search results for: aesthetic computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1380

Search results for: aesthetic computing

1230 Smart Disassembly of Waste Printed Circuit Boards: The Role of IoT and Edge Computing

Authors: Muhammad Mohsin, Fawad Ahmad, Fatima Batool, Muhammad Kaab Zarrar

Abstract:

The integration of the Internet of Things (IoT) and edge computing devices offers a transformative approach to electronic waste management, particularly in the dismantling of printed circuit boards (PCBs). This paper explores how these technologies optimize operational efficiency and improve environmental sustainability by addressing challenges such as data security, interoperability, scalability, and real-time data processing. Proposed solutions include advanced machine learning algorithms for predictive maintenance, robust encryption protocols, and scalable architectures that incorporate edge computing. Case studies from leading e-waste management facilities illustrate benefits such as improved material recovery efficiency, reduced environmental impact, improved worker safety, and optimized resource utilization. The findings highlight the potential of IoT and edge computing to revolutionize e-waste dismantling and make the case for a collaborative approach between policymakers, waste management professionals, and technology developers. This research provides important insights into the use of IoT and edge computing to make significant progress in the sustainable management of electronic waste

Keywords: internet of Things, edge computing, waste PCB disassembly, electronic waste management, data security, interoperability, machine learning, predictive maintenance, sustainable development

Procedia PDF Downloads 30
1229 Monstrous Beauty: Disability and Illness in Contemporary Pop Culture

Authors: Grzegorz Kubinski

Abstract:

In the proposed paper, we would like to present the phenomenon of disease and disability as an element of discourse redefining the contemporary canons of beauty and the category of normativity. In widely understood media, and above all in social media and fashion industry, the use of the disease as an aesthetic category has long been observed. There is an interesting case of promoting and maintaining a certain, ideal pattern of physical beauty, while at the same time very clear exploitation of various types of illnesses. The categories of disease and disabled body are shown as an element of the expression of the individuality and originality of one's own identity, while at the same time the disabled person is still experiencing social exclusion. Illness or body abnormality as an aesthetic category also functions as an ethical-political category. The analysis of the interrelations of these discourses will be presented on the example of selected projects present in social media, like Instagram or Facebook. We would like to present how old forms of 'curiosities' or 'abnormalities' turned into mainstream forms of a new aesthetic. For marginalized disabled people, there is a new form of expression and built their identity. But, there is an interesting point: are this contemporary forms of using disability and illness really new? Or maybe this is just another form of Wunderkammer or even cabinets of curiosities? We propose to analyze contemporary cultural and social context in order to clarify this issue. On the other hand, we would like to present some examples from personal interviews with disabled internet influencers and statements disabled persons concerning the role of the different body in society (e.g. #bodypositive, #perfeclyflawed).

Keywords: disability, new media, defect, fashion

Procedia PDF Downloads 188
1228 Reverse Twin Block with Expansion Screw for Treatment of Skeletal Class III Malocclusion in Growing Patient: Case Report

Authors: Alfrina Marwan, Erna Sulistyawati

Abstract:

Class III malocclusion shows both skeletal and dentoalveolar component. Sketal Class III malocclusion can have variants in different region, maxilla or mandibular. Skeletal Class III malocclusion during growth period is considered to treat to prevent its severity in adulthood. Orthopedics treatment of skeletal Class III malocclusion in growing patient can be treated by using reverse twin block with expansion screw to modify the growth pattern. The objective of this case report was to describe the functional correction of skeletal Class III maloclussion using reverse twin block with expansion screw in growing patient. A patient with concave profile came with a chief complaint of aesthetic problems. The cephalometric analysis showed that patient had skeletal Class III malocclusion (ANB -50, SNA 75º, Wits appraisal -3 mm) with anterior cross bite and deep bite (overjet -3 mm, overbite 6 mm). In this case report, the patient was treated with reverse twin block appliance with expansion screw. After three months of treatment, the skeletal problems have been corrected (ANB -1°), overjet, overbite and aesthetic were improved. Reverse twin block appliance with expansion screw can be used as orthopedics treatment for skeletal Class III malocclusion in growing patient and can improve the aesthetic with great satisfaction which was the main complaint in this patient.

Keywords: maxilla retrognatism, reverse twin block, skeletal class III malocclusion, growing patient

Procedia PDF Downloads 197
1227 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 142
1226 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 501
1225 Structuralism of Architectural Details in the Design of Modern High-Rise Buildings

Authors: Joanna Pietrzak, Anna Stefanska, Wieslaw Rokicki

Abstract:

Contemporary high-rise buildings constructed in recent years are often tremendous examples of original and unique architectural forms, being at the same time the affirmation of technical and technological progress accomplishments. The search for more efficient, sophisticated generations of structures also concerns the shaping of high-quality details. The concept of structural detail designing is connected with the rationalization of engineering solutions as well as through the optimisation and reduction of used material. Contemporary structural detail perceived through the development of building technologies is often a very aesthetic technical and material solution, which significantly influences the visual perception of architecture. Structural details are more often seen in shaping the forms of high-rise buildings, which are erected in many culturally different countries.

Keywords: aesthetic expression, high-rise buildings, structural detail, tall buildings

Procedia PDF Downloads 164
1224 Going Horizontal: Confronting the Challenges When Transitioning to Cloud

Authors: Harvey Hyman, Thomas Hull

Abstract:

As one of the largest cancer treatment centers in the United States, we continuously confront the challenge of how to leverage the best possible technological solutions, in order to provide the highest quality of service to our customers – the doctors, nurses and patients at Moffitt who are fighting every day for the prevention and cure of cancer. This paper reports on the transition from a vertical to a horizontal IT infrastructure. We discuss how the new frameworks and methods such as public, private and hybrid cloud, brokering cloud services are replacing the traditional vertical paradigm for computing. We also report on the impact of containers, micro services, and the shift to continuous integration/continuous delivery. These impacts and changes in delivery methodology for computing are driving how we accomplish our strategic IT goals across the enterprise.

Keywords: cloud computing, IT infrastructure, IT architecture, healthcare

Procedia PDF Downloads 380
1223 Transforming Art: A Cross-Cultural Study of Visual Art and Literature in Rainer Maria Rilke

Authors: Rosy Saikia, Krishna Barua

Abstract:

The evolution of visual art can be traced back from “pre-historic” humans, from the age of Paleolithic, Neolithic, and Metal Age. Mesopotamians and the Egyptians were the pioneers of art, in the first period of history. But the field of art first flourished in the west during the Renaissance. Since then, art represents a continuous yet varied tradition till present day. Until the early 19th century art focused chiefly on representational, religious and classical motifs, but gradually art became more abstract and conceptual approaches gained popularity. Rainer Maria Rilke (1875-1926) was one of the leading poets cum art critic of European modernism. This paper addresses the relationship between Rilke's poetry and visual art, which involves an intimate transference of aesthetic means and definitions of form in the creative process of writing. Rilke’s connection with Auguste Rodin made him learn that a person who can “see” things could realize the beauty of a “thing” and could subsequently write. To “see” the “thing” or “object” rather than representing emotion was considered as more important by Rodin and that was the way he cracked the old aesthetic mould. Rilke himself agreed that his correspondence with the artists made him acquainted nothing but a new way of seeing. Rilke admitted to the constant reference to the Bible, the books of the Danish poet Jens Peter Jacobsen and Auguste Rodin, who all had given him the experience of the essence of creativity, its depths and eternity. Rilke’s association with philosophers such as Nietzhche and artists, starting from Worpweders and Rodin to Cezanne’s paintings, made him almost an apprentice in visual art.

Keywords: seeing, gaze, aesthetic, beauty, visual art, Rilke

Procedia PDF Downloads 495
1222 A Study on How to Link BIM Services to Cloud Computing Architecture

Authors: Kim Young-Jin, Kim Byung-Kon

Abstract:

Although more efforts to expand the application of BIM (Building Information Modeling) technologies have be pursued in recent years than ever, it’s true that there have been various challenges in doing so, including a lack or absence of relevant institutions, lots of costs required to build BIM-related infrastructure, incompatible processes, etc. This, in turn, has led to a more prolonged delay in the expansion of their application than expected at an early stage. Especially, attempts to save costs for building BIM-related infrastructure and provide various BIM services compatible with domestic processes include studies to link between BIM and cloud computing technologies. Also in this study, the author attempted to develop a cloud BIM service operation model through analyzing the level of BIM applications for the construction sector and deriving relevant service areas, and find how to link BIM services to the cloud operation model, as through archiving BIM data and creating a revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources.

Keywords: construction IT, BIM (building information modeling), cloud computing, BIM service based cloud computing

Procedia PDF Downloads 487
1221 DNA PLA: A Nano-Biotechnological Programmable Device

Authors: Hafiz Md. HasanBabu, Khandaker Mohammad Mohi Uddin, Md. IstiakJaman Ami, Rahat Hossain Faisal

Abstract:

Computing in biomolecular programming performs through the different types of reactions. Proteins and nucleic acids are used to store the information generated by biomolecular programming. DNA (Deoxyribose Nucleic Acid) can be used to build a molecular computing system and operating system for its predictable molecular behavior property. The DNA device has clear advantages over conventional devices when applied to problems that can be divided into separate, non-sequential tasks. The reason is that DNA strands can hold so much data in memory and conduct multiple operations at once, thus solving decomposable problems much faster. Programmable Logic Array, abbreviated as PLA is a programmable device having programmable AND operations and OR operations. In this paper, a DNA PLA is designed by different molecular operations using DNA molecules with the proposed algorithms. The molecular PLA could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism, and extraordinary energy efficiency.

Keywords: biological systems, DNA computing, parallel computing, programmable logic array, PLA, DNA

Procedia PDF Downloads 129
1220 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 67
1219 Method and Apparatus for Optimized Job Scheduling in the High-Performance Computing Cloud Environment

Authors: Subodh Kumar, Amit Varde

Abstract:

Typical on-premises high-performance computing (HPC) environments consist of a fixed number and a fixed set of computing hardware. During the design of the HPC environment, the hardware components, including but not limited to CPU, Memory, GPU, and networking, are carefully chosen from select vendors for optimal performance. High capital cost for building the environment is a prime factor influencing the design environment. A class of software called “Job Schedulers” are critical to maximizing these resources and running multiple workloads to extract the maximum value for the high capital cost. In principle, schedulers work by preventing workloads and users from monopolizing the finite hardware resources by queuing jobs in a workload. A cloud-based HPC environment does not have the limitations of fixed (type of and quantity of) hardware resources. In theory, users and workloads could spin up any number and type of hardware resource. This paper discusses the limitations of using traditional scheduling algorithms for cloud-based HPC workloads. It proposes a new set of features, called “HPC optimizers,” for maximizing the benefits of the elasticity and scalability of the cloud with the goal of cost-performance optimization of the workload.

Keywords: high performance computing, HPC, cloud computing, optimization, schedulers

Procedia PDF Downloads 93
1218 Crow Search Algorithm-Based Task Offloading Strategies for Fog Computing Architectures

Authors: Aniket Ganvir, Ritarani Sahu, Suchismita Chinara

Abstract:

The rapid digitization of various aspects of life is leading to the creation of smart IoT ecosystems, where interconnected devices generate significant amounts of valuable data. However, these IoT devices face constraints such as limited computational resources and bandwidth. Cloud computing emerges as a solution by offering ample resources for offloading tasks efficiently despite introducing latency issues, especially for time-sensitive applications like fog computing. Fog computing (FC) addresses latency concerns by bringing computation and storage closer to the network edge, minimizing data travel distance, and enhancing efficiency. Offloading tasks to fog nodes or the cloud can conserve energy and extend IoT device lifespan. The offloading process is intricate, with tasks categorized as full or partial, and its optimization presents an NP-hard problem. Traditional greedy search methods struggle to address the complexity of task offloading efficiently. To overcome this, the efficient crow search algorithm (ECSA) has been proposed as a meta-heuristic optimization algorithm. ECSA aims to effectively optimize computation offloading, providing solutions to this challenging problem.

Keywords: IoT, fog computing, task offloading, efficient crow search algorithm

Procedia PDF Downloads 58
1217 A Polyphonic Look at Trends

Authors: Turquesa Topper

Abstract:

The reflection focuses on recording and explaining the considerations, conceptualizations and methodological approach with which from the University, that is to say, from the academic field, the study of Trends is addressed with the intention of training professionals in the area, an area that requires disciplinary boundaries and builds a polyphonic vision. When referring to the objective of our Laboratory the detection of aesthetic trends of consumption, we find ourselves in the requirement to define our object: trends, aesthetic trends of consumption, more specifically. The pages cover a conception of trends from a theoretical framework that incorporates contributions from linguistics, semiotics, sociology, cultural studies and project disciplines, in order to consolidate a polyphonic look. The text investigates in the pre-discursive aspect of the trends, in the circulation of the notion of style and in the dynamics of affirmation - denial as the constitutive dynamics of Fashion linked to any process of innovation. From such inquiry, it is presented to Fashion as a system that operates directly on the construction of socio-individual identities unfolding through the liquefaction of signs in trends.

Keywords: fashion, methodology, narrative, trends

Procedia PDF Downloads 250
1216 Sustainable and Aesthetic Features of Traditional Architectures in Central Part of Iran

Authors: Azadeh Rezafar

Abstract:

Iran is one of the oldest countries with traditional culture in the world. All over the history Iranians had traditional architectural designs, which were at the same time sustainable, ecological, functional and environmental consistent. These human scale architectures were built for maximum use, comfort, climate adaptation with available resources and techniques. Climate variability of the country caused developing of variety design methods. More of these methods such as windcatchers in Yazd City or Panam (Insulation) were scientific solutions at the same time. Renewable energy resources were used in these methods that featured in them. While climate and ecological issues were dominant parts of these traditional designs, aesthetic and beauty issues were not ignored. Conformity with the community’s culture caused more compact designs that the visual aesthetics of them can be seen inside of them. Different organizations of space were used for these visual aesthetic issues inside the houses as well as historical urban designs. For example dry and hot climates in central parts of the country designed with centralized organization. Most central parts of these designs functioned as a courtyard for temperate the air in the summer. This paper will give summary descriptive information about traditional Iranian architectural style by figures all around the country with different climate conditions, while focus of the paper is traditional architectural design of the central part of the country, with dry and hot climate condition. This information may be useful for contemporary architectural designs, which are designed without noticing to the vernacular condition and caused cities look like each other.

Keywords: architectural design, traditional design, Iran, sustainability

Procedia PDF Downloads 223
1215 Cranioplasty With Custom Implant Realized Using 3D Printing Technology

Authors: R. Trad Khodja, A. Guessmi, R. Ghoul, A. Mahtout, S. A. Benbouali, M. A. Boulahlib

Abstract:

Cranioplasty is a surgical act that aims to restore cranial bone losses in order to protect the brain from external aggressions and to improve the patient's aesthetic appearance. This objective can be achieved by taking advantage of the current technological development in computer science and biomechanics. The objective of this paper is to present an approach for the realization of high-precision biocompatible cranial implants using new 3D printing technologies at the lowest cost. The proposed method is to reproduce the missing part of the skull by referring to its healthy contralateral part. Once the model is validated by the neurosurgeons, a mold is 3D printed for the production of a biocompatible implant in Poly-Methyl-Methacrylate (PMMA) acrylic cement. Using this procedure, ten patients underwent this procedure with excellent aesthetic results.

Keywords: cranioplasty, cranial defect, PMMA, 3d printing, custom made implants

Procedia PDF Downloads 56
1214 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
1213 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 427
1212 Values That Should Be Taken into Account in the Arts: The Tension between Economic Influences and Cultural Values

Authors: Mohammad Mehdi Mazaheri, Mohammad Motiee Lahromi

Abstract:

Recently the two matters of how to evaluate art and what the influencing economic effects on cultural values are have attracted many researchers to investigate them. Therefore, in the present article the researcher made an attempt to answer the above questions. However, the fundamental distinction between this article and the other ones is in comparing the economic value (shown by monetary phrases) with cultural values (that reflects the aesthetic values and the importance of the artist). This article shows a different and trivial distinction that has a very clearly pivotal significance in the process of cultural policy making. The economic activities would be influenced when there are cultural values. The increase of commercial activities is measured by impact assessment. In other words, the value of culture is reflected in the satisfaction of the users of cultural activities. This kind of value is measured by “willingness to pay” researches. The researcher believes that these two values are dominant in the cultural policy but they include many aspects and are presented by different kinds of communities.

Keywords: economic influence, cultural values, monetary phrases, aesthetic values

Procedia PDF Downloads 483
1211 Parallel Computing: Offloading Matrix Multiplication to GPU

Authors: Bharath R., Tharun Sai N., Bhuvan G.

Abstract:

This project focuses on developing a Parallel Computing method aimed at optimizing matrix multiplication through GPU acceleration. Addressing algorithmic challenges, GPU programming intricacies, and integration issues, the project aims to enhance efficiency and scalability. The methodology involves algorithm design, GPU programming, and optimization techniques. Future plans include advanced optimizations, extended functionality, and integration with high-level frameworks. User engagement is emphasized through user-friendly interfaces, open- source collaboration, and continuous refinement based on feedback. The project's impact extends to significantly improving matrix multiplication performance in scientific computing and machine learning applications.

Keywords: matrix multiplication, parallel processing, cuda, performance boost, neural networks

Procedia PDF Downloads 58
1210 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment

Authors: Kim Byung-Kon, Kim Young-Jin

Abstract:

As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.

Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM

Procedia PDF Downloads 506
1209 ACO-TS: an ACO-based Algorithm for Optimizing Cloud Task Scheduling

Authors: Fahad Y. Al-dawish

Abstract:

The current trend by a large number of organizations and individuals to use cloud computing. Many consider it a significant shift in the field of computing. Cloud computing are distributed and parallel systems consisting of a collection of interconnected physical and virtual machines. With increasing request and profit of cloud computing infrastructure, diverse computing processes can be executed on cloud environment. Many organizations and individuals around the world depend on the cloud computing environments infrastructure to carry their applications, platform, and infrastructure. One of the major and essential issues in this environment related to allocating incoming tasks to suitable virtual machine (cloud task scheduling). Cloud task scheduling is classified as optimization problem, and there are several meta-heuristic algorithms have been anticipated to solve and optimize this problem. Good task scheduler should execute its scheduling technique on altering environment and the types of incoming task set. In this research project a cloud task scheduling methodology based on ant colony optimization ACO algorithm, we call it ACO-TS Ant Colony Optimization for Task Scheduling has been proposed and compared with different scheduling algorithms (Random, First Come First Serve FCFS, and Fastest Processor to the Largest Task First FPLTF). Ant Colony Optimization (ACO) is random optimization search method that will be used for assigning incoming tasks to available virtual machines VMs. The main role of proposed algorithm is to minimizing the makespan of certain tasks set and maximizing resource utilization by balance the load among virtual machines. The proposed scheduling algorithm was evaluated by using Cloudsim toolkit framework. Finally after analyzing and evaluating the performance of experimental results we find that the proposed algorithm ACO-TS perform better than Random, FCFS, and FPLTF algorithms in each of the makespaan and resource utilization.

Keywords: cloud Task scheduling, ant colony optimization (ACO), cloudsim, cloud computing

Procedia PDF Downloads 421
1208 A Type-2 Fuzzy Model for Link Prediction in Social Network

Authors: Mansoureh Naderipour, Susan Bastani, Mohammad Fazel Zarandi

Abstract:

Predicting links that may occur in the future and missing links in social networks is an attractive problem in social network analysis. Granular computing can help us to model the relationships between human-based system and social sciences in this field. In this paper, we present a model based on granular computing approach and Type-2 fuzzy logic to predict links regarding nodes’ activity and the relationship between two nodes. Our model is tested on collaboration networks. It is found that the accuracy of prediction is significantly higher than the Type-1 fuzzy and crisp approach.

Keywords: social network, link prediction, granular computing, type-2 fuzzy sets

Procedia PDF Downloads 326
1207 An Exploration of The Patterns of Transcendence in Indian and Hopkins’s Aesthetics

Authors: Lima Antony

Abstract:

In G. M. Hopkins’s poetics and aesthetics there is scope for a comparative study with Indian discourses on aesthetics, an area not adequately explored so far. This exploration will enrich the field of comparative study of diverse cultural expressions and their areas of similarity. A comparative study of aesthetic and religious experiences in diverse cultures will open up avenues for the discovery of similarities in self-experiences and their transcendence. Such explorations will reveal similar patterns in aesthetic and religious experiences. The present paper intends to prove this in the theories of Hopkins and Indian aesthetics. From the time of the Vedas Indian sages have believed that aesthetic enjoyment could develop into a spiritual realm. From the Natyasastra of Bharata, Indian aesthetics develops and reaches its culmination in later centuries into a consciousness of union with the mystery of the Ultimate Being, especially in Dhvanaāloka of Anandavardhana and Locana of Abhinavagupta. Dhvanyaloka elaborates the original ideas of rasa (mood or flavor) and dhvani (power of suggestion) in Indian literary theory and aesthetics. Hopkins was successful, like the ancient Indian alankarikas, in creating aesthetically superb patterns at various levels of sound and sense for which he coined the term ‘inscape’. So Hopkins’s aesthetic theory becomes suitable for transcultural comparative study with Indian aesthetics especially the dhvani theories of Anandavardhana and Abhinavagupta. Hopkins’s innovative approach to poetics and his selection of themes are quite suitable for analysis in the light of Indian literary theories. Indian philosophy views the ultimate reality called Brahman, as the 'soul,' or inner essence, of all reality. We see in Hopkins also a search for the essence of things and the chiming of their individuality with the Ultimate Being in multidimensional patterns of sound, sense and ecstatic experience. This search culminates in the realization of a synthesis of the individual self with the Ultimate Being. This is achieved through an act of surrender of the individuality of the self before the Supreme Being. Attempts to reconcile the immanent and transcendent aspects of the Ultimate Being can be traced in the Indian as well as Hopkins’s aesthetics which can contribute to greater understanding and harmony between cultures.

Keywords: Dhvani, Indian aesthetics, transcultural studies, Rasa

Procedia PDF Downloads 148
1206 The Communication Between Visual Aesthetic Criteria of Product with User Experience and Social Sustainability: A Study of Street Furniture

Authors: Hassan Sadeghi Naeini, Mozhgan Sabzehparvar, Mahdiye Jafarnezhad, Neda Brumandi, Mohammad Parsa Sabzehparvar

Abstract:

This study aims to discover the relationship between the factors of aesthetics, user experience, and social sustainability concerning the design of street furniture and the impact of these factors on the emotional arousal of citizens to encourage and make them prefer to use street furniture. The method used in this research included extracting indicators related to each of the factors of aesthetics, user experience, and social sustainability from the articles and then selecting indicators related to the purpose of the research in consultation with industrial design experts and architects. Finally, 9 variables for aesthetics, 7 variables for user experience, and 5 variables for evaluating social sustainability were selected. To identify the effect of each of these factors on street furniture and to recognize their relationship with each other. A 10-scale prioritization questionnaire, from 1, the least amount of importance, to 10, the most amount of importance, was answered by architects and industrial designers on the “Pors Line” online platform for three consecutive weeks, and a total of 82 people answered the questionnaire. The results showed that by using aesthetic factors in the design of street furniture and having a positive impact on users’ experience of using the product, we could expect the occurrence of behavioral factors, such as creating constructive interaction and product acceptance so that the satisfaction of the user in the use of street furniture and optimal interaction in the urban environment is formed, followed by that, the requirements of social sustainability will be met.

Keywords: visual aesthetic, user experience, social sustainability, street furniture

Procedia PDF Downloads 95
1205 Automated Facial Symmetry Assessment for Orthognathic Surgery: Utilizing 3D Contour Mapping and Hyperdimensional Computing-Based Machine Learning

Authors: Wen-Chung Chiang, Lun-Jou Lo, Hsiu-Hsia Lin

Abstract:

This study aimed to improve the evaluation of facial symmetry, which is crucial for planning and assessing outcomes in orthognathic surgery (OGS). Facial symmetry plays a key role in both aesthetic and functional aspects of OGS, making its accurate evaluation essential for optimal surgical results. To address the limitations of traditional methods, a different approach was developed, combining three-dimensional (3D) facial contour mapping with hyperdimensional (HD) computing to enhance precision and efficiency in symmetry assessments. The study was conducted at Chang Gung Memorial Hospital, where data were collected from 2018 to 2023 using 3D cone beam computed tomography (CBCT), a highly detailed imaging technique. A large and comprehensive dataset was compiled, consisting of 150 normal individuals and 2,800 patients, totaling 5,750 preoperative and postoperative facial images. These data were critical for training a machine learning model designed to analyze and quantify facial symmetry. The machine learning model was trained to process 3D contour data from the CBCT images, with HD computing employed to power the facial symmetry quantification system. This combination of technologies allowed for an objective and detailed analysis of facial features, surpassing the accuracy and reliability of traditional symmetry assessments, which often rely on subjective visual evaluations by clinicians. In addition to developing the system, the researchers conducted a retrospective review of 3D CBCT data from 300 patients who had undergone OGS. The patients’ facial images were analyzed both before and after surgery to assess the clinical utility of the proposed system. The results showed that the facial symmetry algorithm achieved an overall accuracy of 82.5%, indicating its robustness in real-world clinical applications. Postoperative analysis revealed a significant improvement in facial symmetry, with an average score increase of 51%. The mean symmetry score rose from 2.53 preoperatively to 3.89 postoperatively, demonstrating the system's effectiveness in quantifying improvements after OGS. These results underscore the system's potential for providing valuable feedback to surgeons and aiding in the refinement of surgical techniques. The study also led to the development of a web-based system that automates facial symmetry assessment. This system integrates HD computing and 3D contour mapping into a user-friendly platform that allows for rapid and accurate evaluations. Clinicians can easily access this system to perform detailed symmetry assessments, making it a practical tool for clinical settings. Additionally, the system facilitates better communication between clinicians and patients by providing objective, easy-to-understand symmetry scores, which can help patients visualize the expected outcomes of their surgery. In conclusion, this study introduced a valuable and highly effective approach to facial symmetry evaluation in OGS, combining 3D contour mapping, HD computing, and machine learning. The resulting system achieved high accuracy and offers a streamlined, automated solution for clinical use. The development of the web-based platform further enhances its practicality, making it a valuable tool for improving surgical outcomes and patient satisfaction in orthognathic surgery.

Keywords: facial symmetry, orthognathic surgery, facial contour mapping, hyperdimensional computing

Procedia PDF Downloads 27
1204 Scientific and Technical Basis for the Application of Textile Structures in Glass Using Pate De Verre Technique

Authors: Walaa Hamed Mohamed Hamza

Abstract:

Textile structures are the way in which the threading process of both thread and loom is done together to form the woven. Different methods of attaching the clothing and the flesh produce different textile structures, which differ in their surface appearance from each other, including so-called simple textile structures. Textile compositions are the basis of woven fabric, through which aesthetic values can be achieved in the textile industry by weaving threads of yarn with the weft at varying degrees that may reach the total control of one of the two groups on the other. Hence the idea of how art and design can be used using different textile structures under the modern techniques of pate de verre. In the creation of designs suitable for glass products employed in the interior architecture. The problem of research: The textile structures, in general, have a significant impact on the appearance of the fabrics in terms of form and aesthetic. How can we benefit from the characteristics of different textile compositions in different glass designs with different artistic values. The research achieves its goal by the investment of simple textile structures in innovative artistic designs using the pate de verre technique, as well as the use of designs resulting from the textile structures in the external architecture to add various aesthetic values. The importance of research in the revival of heritage using ancient techniques, as well as synergy between different fields of applied arts such as glass and textile, and also study the different and diverse effects resulting from each fabric composition and the possibility of use in various designs in the interior architecture. The research will be achieved that by investing in simple textile compositions, innovative artistic designs produced using pate de verre technology can be used in interior architecture.

Keywords: glass, interior architecture, pate de verre, textile structures

Procedia PDF Downloads 295
1203 Using High Performance Computing for Online Flood Monitoring and Prediction

Authors: Stepan Kuchar, Martin Golasowski, Radim Vavrik, Michal Podhoranyi, Boris Sir, Jan Martinovic

Abstract:

The main goal of this article is to describe the online flood monitoring and prediction system Floreon+ primarily developed for the Moravian-Silesian region in the Czech Republic and the basic process it uses for running automatic rainfall-runoff and hydrodynamic simulations along with their calibration and uncertainty modeling. It takes a long time to execute such process sequentially, which is not acceptable in the online scenario, so the use of high-performance computing environment is proposed for all parts of the process to shorten their duration. Finally, a case study on the Ostravice river catchment is presented that shows actual durations and their gain from the parallel implementation.

Keywords: flood prediction process, high performance computing, online flood prediction system, parallelization

Procedia PDF Downloads 493
1202 Contemporary Vision of Islamic Motifs in Decorating Products

Authors: Shuruq Ghazi Nahhas

Abstract:

Islamic art is a decorative art that depends on repeating motifs in various shapes to cover different surfaces. Each motif has its own characteristics and style that may reflect different Islamic periods, such as Umayyad, Abbasid, Fatimid, Seljuk, Nasrid, Ottoman, and Safavid. These periods were the most powerful periods which played an important role in developing the Islamic motifs. Most of these motifs of the Islamic heritage were not used in new applications. This research focused on reviving the vegetal Islamic motifs found on Islamic heritage and redesign them in a new format to decorate various products, including scarfs, cushions, coasters, wallpaper, wall art, and boxes. The scarf is chosen as one element of these decorative products because it is used as accessories to add aesthetic value to fashion. A descriptive-analytical method is used for this research. The process started with extracting and analyzing the original motifs. Then, creating the new motifs by simplifying, deleting, or adding elements based on the original structure. Then, creating repeated patterns and applying them to decorative products. The findings of this research indicated: repeating patterns based on different structures creates unlimited patterns. Also, changing the elements of the motifs of a pattern adds new characteristics to the pattern. Also, creating frames using elements from the repeated motifs adds aesthetic and contemporary value to decorative products. Finally, using various methods of combining colors creates unlimited variations of each pattern. At the end, reviving the Islamic motifs in contemporary vision enriches decorative products with aesthetic, artistic, and historical values of different Islamic periods. This makes the decorative products valuable that adds uniqueness to their surroundings.

Keywords: Islamic motifs, contemporary patterns, scarfs, decorative products

Procedia PDF Downloads 159
1201 DNA Multiplier: A Design Architecture of a Multiplier Circuit Using DNA Molecules

Authors: Hafiz Md. Hasan Babu, Khandaker Mohammad Mohi Uddin, Nitish Biswas, Sarreha Tasmin Rikta, Nuzmul Hossain Nahid

Abstract:

Nanomedicine and bioengineering use biological systems that can perform computing operations. In a biocomputational circuit, different types of biomolecules and DNA (Deoxyribose Nucleic Acid) are used as active components. DNA computing has the capability of performing parallel processing and a large storage capacity that makes it diverse from other computing systems. In most processors, the multiplier is treated as a core hardware block, and multiplication is one of the time-consuming and lengthy tasks. In this paper, cost-effective DNA multipliers are designed using algorithms of molecular DNA operations with respect to conventional ones. The speed and storage capacity of a DNA multiplier are also much higher than a traditional silicon-based multiplier.

Keywords: biological systems, DNA multiplier, large storage, parallel processing

Procedia PDF Downloads 214