Search results for: natural computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6528

Search results for: natural computing

6318 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 74
6317 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 39
6316 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interface following the cloud computing concept that seeks to enable collaboration and communication among users for high performance computing. Given the development of remote desktop virtualization, it allows to shift the user’s desktop from the traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: virtualization, remote desktop, HTML5, cloud computing

Procedia PDF Downloads 326
6315 Natural Dyeing of Textile Cotton Fabric and Its Characterization

Authors: Rabia Almas

Abstract:

Today’s world is demanding natural and biological colorants on priority bases as an alternative to toxic and unsustainable synthetic dyes. Sustainable natural colors from plants and/or living organisms such as bacteria's and fungi attracted the world research scholars and textile industries recently due to the excitement and opportunities they covered. So, in the present study, natural colors from food waste, such as orange peels and peanuts, were extracted and applied to cotton fabric. The dyeing recipes were optimized in terms of dye concentration, processing temperature and time for higher color strength. The characterization of the dyes and fabric, such as Fourier transform infrared spectroscopy, Scanning Electron Microscopy, and fastness properties were measured for the identification of the chemical groups involved for a better understanding of the dyeing behavior. The results revealed that proper mordanting and concentration of dye on cotton fabric could give high color strength and good fastness to wash and light and these natural dyes can be used as an alternative to synthetic toxic colorants.

Keywords: textile, textile dyes, natural dyes, bio colors

Procedia PDF Downloads 68
6314 Cloud-Based Dynamic Routing with Feedback in Formal Methods

Authors: Jawid Ahmad Baktash, Mursal Dawodi, Tomokazu Nagata

Abstract:

With the rapid growth of Cloud Computing, Formal Methods became a good choice for the refinement of message specification and verification for Dynamic Routing in Cloud Computing. Cloud-based Dynamic Routing is becoming increasingly popular. We propose feedback in Formal Methods for Dynamic Routing and Cloud Computing; the model and topologies show how to send messages from index zero to all others formally. The responsibility of proper verification becomes crucial with Dynamic Routing in the cloud. Formal Methods can play an essential role in the routing and development of Networks, and the testing of distributed systems. Event-B is a formal technique that consists of describing the problem rigorously and introduces solutions or details in the refinement steps. Event-B is a variant of B, designed for developing distributed systems and message passing of the dynamic routing. In Event-B and formal methods, the events consist of guarded actions occurring spontaneously rather than being invoked.

Keywords: cloud, dynamic routing, formal method, Pro-B, event-B

Procedia PDF Downloads 400
6313 The Inequality Effects of Natural Disasters: Evidence from Thailand

Authors: Annop Jaewisorn

Abstract:

This study explores the relationship between natural disasters and inequalities -both income and expenditure inequality- at a micro-level of Thailand as the first study of this nature for this country. The analysis uses a unique panel and remote-sensing dataset constructed for the purpose of this research. It contains provincial inequality measures and other economic and social indicators based on the Thailand Household Survey during the period between 1992 and 2019. Meanwhile, the data on natural disasters, which are remote-sensing data, are received from several official geophysical or meteorological databases. Employing a panel fixed effects, the results show that natural disasters significantly reduce household income and expenditure inequality as measured by the Gini index, implying that rich people in Thailand bear a higher cost of natural disasters when compared to poor people. The effect on income inequality is mainly driven by droughts, while the effect on expenditure inequality is mainly driven by flood events. The results are robust across heterogeneity of the samples, lagged effects, outliers, and an alternative inequality measure.

Keywords: inequality, natural disasters, remote-sensing data, Thailand

Procedia PDF Downloads 105
6312 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 119
6311 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 101
6310 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 306
6309 Natural Law in the Mu’Tazilite Theology

Authors: Samaneh Khalili

Abstract:

Natural law theory, in moral philosophy, refers to a system of unchanging values held to be mutual to all humans and can be discovered through reason. The natural law theory is commonly associated with western Philosophers. In contrast, discussions on notions of natural law in Islamic intellectual history were relatively rare. This paper aims to show that the moral theory developed by the Mu'tazilite thinkers can be classified in the ideas of natural law. In doing so, this study will demonstrate that the objective and unchanging values, according to Mu'tazilite theologians, provide the guidelines for assessing the Islamic law rules in the field of human coexistence. The focus of the paper lies on ʿAbd al-Ğabbār, who was the most influential thinker in the late epoch of the Muʿtazila. Although ʿAbd al-Ǧabbār did not leave a text with a systematic discussion of natural law, his teaching of nature, human reason, and the moral values of actions are all scattered throughout his work -'al-Muġnī fī abwāb at-tawḥīd wa-l-'adl'. It is necessary to focus on ʿAbd al-Ǧabbār's theories on reason, nature, and ethics since natural law revolves around the basic concepts of nature, reason, and moral value. While analyzing the concept of the Nature, it will attempt to answer how he explains the world's physical structure and God's relationship to natural events. Moreover, from ʿAbd al-Ǧabbār's point of view, is nature a self-determined system that follows its inner principle in every kind of change, or is nature guided by an external power? Does causality govern natural events? About the concept of reason, an attempt is made to examine how human reason, according to ʿAbd al-Ǧabbār, conceives moral attributes. Finally, the Autor will discuss the concepts of objective values and the place of rights and duties derived from Islamic law in ʿAbd al-Ǧabbār's thought.

Keywords: Islamic law, Mu'tazilite theology, natural law in Islamic theology, objective and unchanging values.

Procedia PDF Downloads 76
6308 Numerical Modeling of Turbulent Natural Convection in a Square Cavity

Authors: Mohammadreza Sedighi, Mohammad Said Saidi, Hesamoddin Salarian

Abstract:

A numerical study has been performed to investigate the effect of using different turbulent models on natural convection flow field and temperature distributions in partially heated square cavity compare to benchmark. The temperature of the right vertical wall is lower than that of heater while other walls are insulated. The commercial CFD codes are used to model. Standard k-w model provided good agreement with the experimental data.

Keywords: Buoyancy, Cavity, CFD, Heat Transfer, Natural Convection, Turbulence

Procedia PDF Downloads 324
6307 Optimization of Robot Motion Planning Using Biogeography Based Optimization (Bbo)

Authors: Jaber Nikpouri, Arsalan Amralizadeh

Abstract:

In robotics manipulators, the trajectory should be optimum, thus the torque of the robot can be minimized in order to save power. This paper includes an optimal path planning scheme for a robotic manipulator. Recently, techniques based on metaheuristics of natural computing, mainly evolutionary algorithms (EA), have been successfully applied to a large number of robotic applications. In this paper, the improved BBO algorithm is used to minimize the objective function in the presence of different obstacles. The simulation represents that the proposed optimal path planning method has satisfactory performance.

Keywords: biogeography-based optimization, path planning, obstacle detection, robotic manipulator

Procedia PDF Downloads 276
6306 Crowdalert: An Android Application for Increasing the Awareness and Response Initiatives of the Citizens through Crowdsourcing

Authors: John Benedict Bernardo

Abstract:

Crowdsourcing is a way of collecting information provided by the volunteers. This crowdsourced information has the capacity to increase the people’s situational awareness in times of disasters. The research reflected in this paper strives to demonstrate the benefits of crowdsourcing during natural disasters and the ways of utilizing it for disaster response. Shared information regarding natural disasters from social media is often scattered as the inputs from these media are uncategorized. For this reason, the study aims to equip the citizens a medium that is solely intended for sharing and/or obtaining natural disaster-related information. Ergo, an android application was developed to gather and publicize this volunteered information. The capability of crowdsourcing and the effectiveness of the application were evaluated and the result shows overwhelming agreement that this study is indeed efficient in increasing the awareness and response initiatives of the citizens during natural disasters.

Keywords: crowdsourcing, natural disasters, mobile application, social media

Procedia PDF Downloads 301
6305 Problem of Services Selection in Ubiquitous Systems

Authors: Malika Yaici, Assia Arab, Betitra Yakouben, Samia Zermani

Abstract:

Ubiquitous computing is nowadays a reality through the networking of a growing number of computing devices. It allows providing users with context aware information and services in a heterogeneous environment, anywhere and anytime. Selection of the best context-aware service, between many available services and providers, is a tedious problem. In this paper, a service selection method based on Constraint Satisfaction Problem (CSP) formalism is proposed. The services are considered as variables and domains; and the user context, preferences and providers characteristics are considered as constraints. The Backtrack algorithm is used to solve the problem to find the best service and provider which matches the user requirements. Even though this algorithm has an exponential complexity, but its use guarantees that the service, that best matches the user requirements, will be found. A comparison of the proposed method with the existing solutions finishes the paper.

Keywords: ubiquitous computing, services selection, constraint satisfaction problem, backtrack algorithm

Procedia PDF Downloads 225
6304 The Role of Metallic Mordant in Natural Dyeing Process: Experimental and Quantum Study on Color Fastness

Authors: Bo-Gaun Chen, Chiung-Hui Huang, Mei-Ching Chiang, Kuo-Hsing Lee, Chia-Chen Ho, Chin-Ping Huang, Chin-Heng Tien

Abstract:

It is known that the natural dyeing of cloth results moderate color, but with poor color fastness. This study points out the correlation between the macroscopic color fastness of natural dye to the cotton fiber and the microscopic binding energy of dye molecule to the cellulose. With the additive metallic mordant, the new-formed coordination bond bridges the dye to the fiber surface and thus affects the color fastness as well as the color appearance. The density functional theory (DFT) calculation is therefore used to explore the most possible mechanism during the dyeing process. Finally, the experimental results reflect the strong effect of three different metal ions on the natural dyeing clothes.

Keywords: binding energy, color fastness, density functional theory (DFT), natural dyeing, metallic mordant

Procedia PDF Downloads 535
6303 Eco-Friendly Textiles: The Power of Natural Dyes

Authors: Bushra

Abstract:

This paper explores the historical significance, ecological benefits, and contemporary applications of natural dyes in textile dyeing, aiming to provide a comprehensive overview of their potential to contribute to a sustainable fashion industry while minimizing ecological footprints. This research explores the potential of natural dyes as a sustainable alternative to synthetic dyes in the textile industry, examining their historical context, sources, and environmental benefits. Natural dyes come from plants, animals, and minerals, including roots, leaves, bark, fruits, flowers, insects, and metal salts, used as mordants to fix dyes to fabrics. Natural dyeing involves extraction, mordanting, and dyeing techniques. Optimizing these processes can enhance the performance of natural dyes, making them viable for contemporary textile applications based on experimental research. Natural dyes offer eco-friendly benefits like biodegradability, non-toxicity, and resource renewables, reducing pollution, promoting biodiversity, and reducing reliance on petrochemicals. Natural dyes offer benefits but face challenges in color consistency, scalability, and performance, requiring industrial production to meet modern consumer standards for durability and colorfastness. Contemporary initiatives in the textile industry include fashion brands like Eileen Fisher and Patagonia incorporating natural dyes, artisans like India Flint's Botanical Alchemy promoting traditional dyeing techniques, and research projects like the European Union's Horizon 2020 program. Natural dyes offer a sustainable textile industry solution, reducing environmental impact and promoting harmony with nature. Research and innovation are paving the way for widespread adoption, transforming textile dyeing.

Keywords: historical significance, textile industry, natural dyes, sustainability

Procedia PDF Downloads 22
6302 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises

Authors: Indu Saini, Ashu Khanna, S. K. Peddoju

Abstract:

Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.

Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews

Procedia PDF Downloads 318
6301 Experimental Investigation of Natural Frequency and Forced Vibration of Euler-Bernoulli Beam under Displacement of Concentrated Mass and Load

Authors: Aref Aasi, Sadegh Mehdi Aghaei, Balaji Panchapakesan

Abstract:

This work aims to evaluate the free and forced vibration of a beam with two end joints subjected to a concentrated moving mass and a load using the Euler-Bernoulli method. The natural frequency is calculated for different locations of the concentrated mass and load on the beam. The analytical results are verified by the experimental data. The variations of natural frequency as a function of the location of the mass, the effect of the forced frequency on the vibrational amplitude, and the displacement amplitude versus time are investigated. It is discovered that as the concentrated mass moves toward the center of the beam, the natural frequency of the beam and the relative error between experimental and analytical data decreases. There is a close resemblance between analytical data and experimental observations.

Keywords: Euler-Bernoulli beam, natural frequency, forced vibration, experimental setup

Procedia PDF Downloads 251
6300 The Assessment of Natural Ventilation Performance for Thermal Comfort in Educational Space: A Case Study of Design Studio in the Arab Academy for Science and Technology, Alexandria

Authors: Alaa Sarhan, Rania Abd El Gelil, Hana Awad

Abstract:

Through the last decades, the impact of thermal comfort on the working performance of users and occupants of an indoor space has been a concern. Research papers concluded that natural ventilation quality directly impacts the levels of thermal comfort. Natural ventilation must be put into account during the design process in order to improve the inhabitant's efficiency and productivity. One example of daily long-term occupancy spaces is educational facilities. Many individuals spend long times receiving a considerable amount of knowledge, and it takes additional time to apply this knowledge. Thus, this research is concerned with user's level of thermal comfort in design studios of educational facilities. The natural ventilation quality in spaces is affected by a number of parameters including orientation, opening design, and many other factors. This research aims to investigate the conscious manipulation of the physical parameters of the spaces and its impact on natural ventilation performance which subsequently affects thermal comfort of users. The current research uses inductive and deductive methods to define natural ventilation design considerations, which are used in a field study in a studio in the university building in Alexandria (AAST) to evaluate natural ventilation performance through analyzing and comparing the current case to the developed framework and conducting computational fluid dynamics simulation. Results have proved that natural ventilation performance is successful by only 50% of the natural ventilation design framework; these results are supported by CFD simulation.

Keywords: educational buildings, natural ventilation, , mediterranean climate, thermal comfort

Procedia PDF Downloads 198
6299 The Geometry of Natural Formation: an Application of Geometrical Analysis for Complex Natural Order of Pomegranate

Authors: Anahita Aris

Abstract:

Geometry always plays a key role in natural structures, which can be a source of inspiration for architects and urban designers to create spaces. By understanding formative principles in nature, a variety of options can be provided that lead to freedom of formation. The main purpose of this paper is to analyze the geometrical order found in pomegranate to find formative principles explaining its complex structure. The point is how spherical arils of pomegranate pressed together inside the fruit and filled the space as they expand in the growing process, which made a self-organized system leads to the formation of each of the arils are unique in size, topology and shape. The main challenge of this paper would be using advanced architectural modeling techniques to discover these principles.

Keywords: advanced modeling techniques, architectural modeling, computational design, the geometry of natural formation, geometrical analysis, the natural order of pomegranate, voronoi diagrams

Procedia PDF Downloads 205
6298 Semi-Natural Vertical Gardens and Urban Ecology, the Sample of Bartın City

Authors: Yeliz Sarı Nayim, B. N. Nayim

Abstract:

Vertical natural gardens encountered in urban ecosystems are important elements contributing to urban ecology by raising the quality of urban life. This research covers the investigation of the semi-natural plant walls of Bartın city which is located on the western Black Sea coast of Turkey. Landscape analysis and evaluation as a result of land and office work have resulted in vertical garden ecosystems that have been processed in the urban habitat map, mostly in natural stone walls, wooden garden fences, garden entrance doors, historical buildings and building walls. Structural surfaces on old building facades, especially with abandoned or still in use with natural stone walls, have been found to have many natural vertical gardens over time. Parietaria judaica, Cymbalaria longipes and Hedera helix species were dominant, and other types of content were recorded, providing information on the current biotope potential, human activities and effects on them. It has been emphasized that the described vertical gardens together with the species they contain should be protected in terms of Bartin urban ecology and biodiversity. It has been stated that sustainable urban planning, design and management should be considered as a compensation for open and green area losses.

Keywords: semi-natural vertical gardens, urban ecology, sustainable urban planning and design, Bartın

Procedia PDF Downloads 336
6297 Cellular Automata Using Fractional Integral Model

Authors: Yasser F. Hassan

Abstract:

In this paper, a proposed model of cellular automata is studied by means of fractional integral function. A cellular automaton is a decentralized computing model providing an excellent platform for performing complex computation with the help of only local information. The paper discusses how using fractional integral function for representing cellular automata memory or state. The architecture of computing and learning model will be given and the results of calibrating of approach are also given.

Keywords: fractional integral, cellular automata, memory, learning

Procedia PDF Downloads 393
6296 A Quadratic Approach for Generating Pythagorean Triples

Authors: P. K. Rahul Krishna, S. Sandeep Kumar, Jayanthi Sunder Raj

Abstract:

The article explores one of the important relations between numbers-the Pythagorean triples (triplets) which finds its application in distance measurement, construction of roads, towers, buildings and wherever Pythagoras theorem finds its application. The Pythagorean triples are numbers, that satisfy the condition “In a given set of three natural numbers, the sum of squares of two natural numbers is equal to the square of the other natural number”. There are numerous methods and equations to obtain the triplets, which have their own merits and demerits. Here, quadratic approach for generating triples uses the hypotenuse leg difference method. The advantage is that variables are few and finally only three independent variables are present.

Keywords: arithmetic progression, hypotenuse leg difference method, natural numbers, Pythagorean triplets, quadratic equation

Procedia PDF Downloads 188
6295 Network Connectivity Knowledge Graph Using Dwave Quantum Hybrid Solvers

Authors: Nivedha Rajaram

Abstract:

Hybrid Quantum solvers have been given prime focus in recent days by computation problem-solving domain industrial applications. D’Wave Quantum Computers are one such paragon of systems built using quantum annealing mechanism. Discrete Quadratic Models is a hybrid quantum computing model class supplied by D’Wave Ocean SDK - a real-time software platform for hybrid quantum solvers. These hybrid quantum computing modellers can be employed to solve classic problems. One such problem that we consider in this paper is finding a network connectivity knowledge hub in a huge network of systems. Using this quantum solver, we try to find out the prime system hub, which acts as a supreme connection point for the set of connected computers in a large network. This paper establishes an innovative problem approach to generate a connectivity system hub plot for a set of systems using DWave ocean SDK hybrid quantum solvers.

Keywords: quantum computing, hybrid quantum solver, DWave annealing, network knowledge graph

Procedia PDF Downloads 104
6294 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben

Authors: Mentor Sulollari

Abstract:

Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.

Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben

Procedia PDF Downloads 276
6293 From E-Government to Cloud-Government Challenges of Jordanian Citizens' Acceptance for Public Services

Authors: Abeer Alkhwaldi, Mumtaz Kamala

Abstract:

On the inception of the third millennium, there is much evidence that cloud technologies have become the strategic trend for many governments not only developed countries (e.g., UK, Japan, and USA), but also developing countries (e.g. Malaysia and the Middle East region), who have launched cloud computing movements for enhanced standardization of IT resources, cost reduction, and more efficient public services. Therefore, cloud-based e-government services considered as one of the high priorities for government agencies in Jordan. Although of their phenomenal evolution, government cloud-services still suffering from the adoption challenges of e-government initiatives (e.g. technological, human-aspects, social, and financial) which need to be considered carefully by governments contemplating its implementation. This paper presents a pilot study to investigate the citizens' perception of the extent in which these challenges affect the acceptance and use of cloud computing in Jordanian public sector. Based on the data analysis collected using online survey some important challenges were identified. The results can help to guide successful acceptance of cloud-based e-government services in Jordan.

Keywords: challenges, cloud computing, e-government, acceptance, Jordan

Procedia PDF Downloads 412
6292 Data Security in Cloud Storage

Authors: Amir Rashid

Abstract:

Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.

Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key

Procedia PDF Downloads 276
6291 Touching Interaction: An NFC-RFID Combination

Authors: Eduardo Álvarez, Gerardo Quiroga, Jorge Orozco, Gabriel Chavira

Abstract:

AmI proposes a new way of thinking about computers, which follows the ideas of the Ubiquitous Computing vision of Mark Weiser. In these, there is what is known as a Disappearing Computer Initiative, with users immersed in intelligent environments. Hence, technologies need to be adapted so that they are capable of replacing the traditional inputs to the system by embedding these in every-day artifacts. In this work, we present an approach, which uses Radiofrequency Identification (RFID) and Near Field Communication (NFC) technologies. In the latter, a new form of interaction appears by contact. We compare both technologies by analyzing their requirements and advantages. In addition, we propose using a combination of RFID and NFC.

Keywords: touching interaction, ambient intelligence, ubiquitous computing, interaction, NFC and RFID

Procedia PDF Downloads 484
6290 Factorization of Computations in Bayesian Networks: Interpretation of Factors

Authors: Linda Smail, Zineb Azouz

Abstract:

Given a Bayesian network relative to a set I of discrete random variables, we are interested in computing the probability distribution P(S) where S is a subset of I. The general idea is to write the expression of P(S) in the form of a product of factors where each factor is easy to compute. More importantly, it will be very useful to give an interpretation of each of the factors in terms of conditional probabilities. This paper considers a semantic interpretation of the factors involved in computing marginal probabilities in Bayesian networks. Establishing such a semantic interpretations is indeed interesting and relevant in the case of large Bayesian networks.

Keywords: Bayesian networks, D-Separation, level two Bayesian networks, factorization of computation

Procedia PDF Downloads 509
6289 The Role of Natural Gas in Reducing Carbon Emissions

Authors: Abdulrahman Nami Almutairi

Abstract:

In the face of escalating climate change concerns, the concept of smart cities emerges as a promising approach to mitigate carbon emissions and move towards carbon neutrality. This paper provides a comprehensive review of the role of Natural Gas in achieving carbon neutrality. Natural gas has often been seen as a transitional fuel in the context of reducing carbon emissions. Its main role stems from being cleaner than coal and oil when burned for electricity generation and industrial processes. The urgent need to address this global issue has prompted a global shift towards cleaner energy sources and sustainable practices. In this endeavor, natural gas has emerged as a pivotal player, hailed for its potential to mitigate carbon emissions, and facilitate the transition to a low-carbon economy. With its lower carbon intensity compared to conventional fossil fuels, natural gas presents itself as a promising alternative for meeting energy demands while reducing environmental impact. As the world stands at a critical juncture in the fight against climate change, exploring the potential of natural gas as a transitional fuel offers insights into pathways towards a more sustainable and resilient future. By critically evaluating its opportunities and challenges, we can harness the potential of natural gas as a transitional fuel while advancing towards a cleaner, more resilient energy system. Through collaborative efforts and informed decision-making, we can pave the way for a future where energy is not only abundant but also environmentally sustainable and socially equitable.

Keywords: natural gas, clean fuel, carbon emissions, global warming, environmental protection

Procedia PDF Downloads 19