Search results for: soft computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1877

Search results for: soft computing

1667 Developing a Comprehensive Model for the Prevention of Tension Neck Syndrome: A Focus on Musculoskeletal Disorder Prevention Strategies

Authors: Behnaz Sohani, Ifeoluwa Joshua Adigun, Amir Rahmani, Khaled Goher

Abstract:

This paper provides initial results on the efficacy of the designed ergonomic-oriented neck support to mitigate and alleviate tension neck syndrome musculoskeletal disorder. This is done using both simulations and measurements. Tension Neck Syndrome Musculoskeletal Disorder (TNS MSD) causes discomfort in the muscles around the neck and shoulder. TNS MSD is one of the leading causes of early retirement. This research focuses on the design of an adaptive neck supporter by integrating a soft actuator massager to help deliver a soothing massage. The massager and adaptive neck supporter prototype were validated by finite element analysis prior to fabrication to envisage the feasibility of the design concept. Then a prototype for the massager was fabricated and tested for concept validation. Future work will be focused on fabricating the full-scale prototype and upgrading and optimizing the design concept for the adaptive neck supporter.

Keywords: adaptive neck supporter, tension neck syndrome, musculoskeletal disorder, soft actuator massager, soft robotics

Procedia PDF Downloads 78
1666 New Ethanol Method for Soft Tissue Imaging in Micro-CT

Authors: Matej Patzelt, Jan Dudak, Frantisek Krejci, Jan Zemlicka, Vladimir Musil, Jitka Riedlova, Viktor Sykora, Jana Mrzilkova, Petr Zach

Abstract:

Introduction: Micro-CT is well used for examination of bone structures and teeth. On the other hand visualization of the soft tissues is still limited. The goal of our study was to create a new fixation method for soft tissue imaging in micro-CT. Methodology: We used organs of 18 mice - heart, lungs, kidneys, liver and brain, which we fixated in ethanol after meticulous preparation. We fixated organs in different concentrations of ethanol and for different period of time. We used three types of ethanol concentration - 97%, 50% and ascending ethanol concentration (25%, 50%, 75%, 97% each for 12 hours). Fixated organs were scanned after 72 hours, 168 hours and 336 hours period of fixation. We scanned all specimens in micro-CT MARS (Medipix All Resolution System). Results: Ethanol method provided contrast enhancement in all studied organs in all used types of fixation. Fixation in 97% ethanol provided very fast fixation and the contrast among the tissues was visible already after 72 hours of fixation. Fixation for the period of 168 and 336 hours gave better details, especially in lung tissue, where alveoli were visualized. On the other hand, this type of fixation caused organs to petrify. Fixation in 50% ethanol provided best results in 336 hours fixation, details were visualized better than in 97% ethanol and samples were not as hard as in fixation in 97% ethanol. Best results were obtained in fixation in ascending ethanol concentration. All organs were visualized in great details, best-visualized organ was heart, where trabeculae and valves were visible. In this type of fixation, organs stayed soft for whole time. Conclusion: New ethanol method is a great option for soft tissue fixation as well as the method for enhancing contrast among tissues in organs. The best results were obtained with fixation of the organs in ascending ethanol concentration, the best visualized organ was the heart.

Keywords: x-ray imaging, small animals, ethanol, ex-vivo

Procedia PDF Downloads 297
1665 A Clinical Study on the Versatility of Lateral Supra Malleolar Flap in Lower Limb Wound Reconstruction

Authors: Animesh Gupta

Abstract:

Objective: The purpose of this study is to evaluate the versatility and outcome of lateral supra malleolar flap (LSMF) in soft tissue reconstruction of the regions including the distal leg, ankle, dorsal foot and heel. Methods: From March 2021 to April 2023, 18 patients with soft tissue defects in the regions, including the distal leg, ankle, dorsal foot and heel, who underwent LSMF repair for lower limb wound reconstruction were analyzed. The location, size of the defects, etiology, outcome, complications, and other alternative options were studied and presented. Results: The follow-up period of the cases was 3-6 months after surgery. All flaps were successful; however, one flap was complicated by venous congestion and was managed by loosening a few sutures and the patient was required to elevate the affected limb to resolve the issue. Conclusion: The LSMF has numerous advantages in repairing soft tissue defects in areas involving the ankle, distal leg, heel and dorsum of the foot. In comparison to reverse sural flaps for repairing defects in the heel and lower leg, LSMF offers shorter operation time, shorter hospitalization, lower cost, and fewer postoperative complications.

Keywords: lateral supra malleolar flap, LSMF, soft tissue reconstruction, lower leg defect

Procedia PDF Downloads 55
1664 Optimizing Telehealth Internet of Things Integration: A Sustainable Approach through Fog and Cloud Computing Platforms for Energy Efficiency

Authors: Yunyong Guo, Sudhakar Ganti, Bryan Guo

Abstract:

The swift proliferation of telehealth Internet of Things (IoT) devices has sparked concerns regarding energy consumption and the need for streamlined data processing. This paper presents an energy-efficient model that integrates telehealth IoT devices into a platform based on fog and cloud computing. This integrated system provides a sustainable and robust solution to address the challenges. Our model strategically utilizes fog computing as a localized data processing layer and leverages cloud computing for resource-intensive tasks, resulting in a significant reduction in overall energy consumption. The incorporation of adaptive energy-saving strategies further enhances the efficiency of our approach. Simulation analysis validates the effectiveness of our model in improving energy efficiency for telehealth IoT systems, particularly when integrated with localized fog nodes and both private and public cloud infrastructures. Subsequent research endeavors will concentrate on refining the energy-saving model, exploring additional functional enhancements, and assessing its broader applicability across various healthcare and industry sectors.

Keywords: energy-efficient, fog computing, IoT, telehealth

Procedia PDF Downloads 44
1663 Ductility Reduction Factors for Displacement Spectra Corresponding to Soft Soil Zone of the Valley of Mexico

Authors: Noé D. Lazos-Gallardo, Sonia E. Ruiz, Federico Valenzuela-Beltran

Abstract:

A simplified mathematical expression to estimate ductility reduction factors of the displacement spectra corresponding to the soft soil zone of Mexico City is proposed. The aim is to allow a better characterization of the displacement spectra and provide a simple expression to be used in displacement based design (DBD). Emphasis is on the Mexico City Building Code. The study is based on the analysis of single degree of freedom (SDOF) systems with elasto-plastic hysteretic behavior. Several seismic ground motions corresponding to subduction events with magnitudes equal to or greater than 6 and recorded in different stations of Mexico City are used. The proposed expression involves the ratio of elastic and inelastic pseudo-aceleration spectra, and depends on factors such the ductility demand and the vibration period of the structural system. The resulting ductility reduction factors obtained in this study are compared with others existing in the literature, and their advantages and disadvantages are discussed.

Keywords: displacement based design, displacements spectrum, ductility reduction factors, soft soil

Procedia PDF Downloads 152
1662 Negative Pressure Wound Therapy in Complex Injuries of the Limbs

Authors: Mihail Nagea, Olivera Lupescu, Nicolae Ciurea, Alexandru Dimitriu, Alina Grosu

Abstract:

Introduction: As severe open injuries are more and more frequent in modern traumatology, threatening not only the integrity of the affected limb but even the life of the patients, new methods desired to cope with the consequences of these traumas were described. Vacuum therapy is one such method which has been described as enhancing healing in trauma with extensive soft-tissue injuries, included those with septic complications. Material and methods: Authors prospectively analyze 15 patients with severe lower limb trauma with MESS less than 6, with considerable soft tissue loss following initial debridement and fracture fixation. The patients needed serial debridements and vacuum therapy was applied after delayed healing due to initial severity of the trauma, for an average period of 12 days (7 - 23 days).In 7 cases vacuum therapy was applied for septic complications. Results: Within the study group, there were no local complications; secondary debridements were performed for all the patients and vacuum system was re-installed after these debridements. No amputations were needed. Medical records were reviewed in order to compare the outcome of the patients: the hospital stay, anti-microbial therapy, time to healing of the bone and soft tissues (there is no standard group to be compared with) and the result showed considerable improvements in the outcome of the patients. Conclusion: Vacuum therapy improves healing of the soft tissues, including those infected; hospital stay and the number of secondary necessary procedures are reduced. Therefore it is considered a valuable support in treating trauma of the limbs with severe soft tissue injuries.

Keywords: complex injuries, negative pressure, open fractures, wound therapy

Procedia PDF Downloads 275
1661 Collision Detection Algorithm Based on Data Parallelism

Authors: Zhen Peng, Baifeng Wu

Abstract:

Modern computing technology enters the era of parallel computing with the trend of sustainable and scalable parallelism. Single Instruction Multiple Data (SIMD) is an important way to go along with the trend. It is able to gather more and more computing ability by increasing the number of processor cores without the need of modifying the program. Meanwhile, in the field of scientific computing and engineering design, many computation intensive applications are facing the challenge of increasingly large amount of data. Data parallel computing will be an important way to further improve the performance of these applications. In this paper, we take the accurate collision detection in building information modeling as an example. We demonstrate a model for constructing a data parallel algorithm. According to the model, a complex object is decomposed into the sets of simple objects; collision detection among complex objects is converted into those among simple objects. The resulting algorithm is a typical SIMD algorithm, and its advantages in parallelism and scalability is unparalleled in respect to the traditional algorithms.

Keywords: data parallelism, collision detection, single instruction multiple data, building information modeling, continuous scalability

Procedia PDF Downloads 260
1660 Soft Pneumatic Actuators Fabricated Using Soluble Polymer Inserts and a Single-Pour System for Improved Durability

Authors: Alexander Harrison Greer, Edward King, Elijah Lee, Safa Obuz, Ruhao Sun, Aditya Sardesai, Toby Ma, Daniel Chow, Bryce Broadus, Calvin Costner, Troy Barnes, Biagio DeSimone, Yeshwin Sankuratri, Yiheng Chen, Holly Golecki

Abstract:

Although a relatively new field, soft robotics is experiencing a rise in applicability in the secondary school setting through The Soft Robotics Toolkit, shared fabrication resources and a design competition. Exposing students outside of university research groups to this rapidly growing field allows for development of the soft robotics industry in new and imaginative ways. Soft robotic actuators have remained difficult to implement in classrooms because of their relative cost or difficulty of fabrication. Traditionally, a two-part molding system is used; however, this configuration often results in delamination. In an effort to make soft robotics more accessible to young students, we aim to develop a simple, single-mold method of fabricating soft robotic actuators from common household materials. These actuators are made by embedding a soluble polymer insert into silicone. These inserts can be made from hand-cut polystyrene, 3D-printed polyvinyl alcohol (PVA) or acrylonitrile butadiene styrene (ABS), or molded sugar. The insert is then dissolved using an appropriate solvent such as water or acetone, leaving behind a negative form which can be pneumatically actuated. The resulting actuators are seamless, eliminating the instability of adhering multiple layers together. The benefit of this approach is twofold: it simplifies the process of creating a soft robotic actuator, and in turn, increases its effectiveness and durability. To quantify the increased durability of the single-mold actuator, it was tested against the traditional two-part mold. The single-mold actuator could withstand actuation at 20psi for 20 times the duration when compared to the traditional method. The ease of fabrication of these actuators makes them more accessible to hobbyists and students in classrooms. After developing these actuators, they were applied, in collaboration with a ceramics teacher at our school, to a glove used to transfer nuanced hand motions used to throw pottery from an expert artist to a novice. We quantified the improvement in the users’ pottery-making skill when wearing the glove using image analysis software. The seamless actuators proved to be robust in this dynamic environment. Seamless soft robotic actuators created by high school students show the applicability of the Soft Robotics Toolkit for secondary STEM education and outreach. Making students aware of what is possible through projects like this will inspire the next generation of innovators in materials science and robotics.

Keywords: pneumatic actuator fabrication, soft robotic glove, soluble polymers, STEM outreach

Procedia PDF Downloads 102
1659 The Challenges of Cloud Computing Adoption in Nigeria

Authors: Chapman Eze Nnadozie

Abstract:

Cloud computing, a technology that is made possible through virtualization within networks represents a shift from the traditional ownership of infrastructure and other resources by distinct organization to a more scalable pattern in which computer resources are rented online to organizations on either as a pay-as-you-use basis or by subscription. In other words, cloud computing entails the renting of computing resources (such as storage space, memory, servers, applications, networks, etc.) by a third party to its clients on a pay-as-go basis. It is a new innovative technology that is globally embraced because of its renowned benefits, profound of which is its cost effectiveness on the part of organizations engaged with its services. In Nigeria, the services are provided either directly to companies mostly by the key IT players such as Microsoft, IBM, and Google; or in partnership with some other players such as Infoware, Descasio, and Sunnet. This action enables organizations to rent IT resources on a pay-as-you-go basis thereby salvaging them from wastages accruable on acquisition and maintenance of IT resources such as ownership of a separate data centre. This paper intends to appraise the challenges of cloud computing adoption in Nigeria, bearing in mind the country’s peculiarities’ in terms of infrastructural development. The methodologies used in this paper include the use of research questionnaires, formulated hypothesis, and the testing of the formulated hypothesis. The major findings of this paper include the fact that there are some addressable challenges to the adoption of cloud computing in Nigeria. Furthermore, the country will gain significantly if the challenges especially in the area of infrastructural development are well addressed. This is because the research established the fact that there are significant gains derivable by the adoption of cloud computing by organizations in Nigeria. However, these challenges can be overturned by concerted efforts in the part of government and other stakeholders.

Keywords: cloud computing, data centre, infrastructure, it resources, virtualization

Procedia PDF Downloads 327
1658 Participatory Culture and Value Perception Amongst the Korean and Chinese Drama International Fandom

Authors: Patricia P. M. C. Lourenco, Javier Bringué Sala, Anaisa D. A. de Sena

Abstract:

Almost everyone in Dramaland knows the names of big Korean stars that grace their computer screens on a roll through social media and video streaming platforms that enable awareness of Korean dramas and lifestyle at a click. A surface culture instilled with notions of belonging has redefined the meaning of friendship and challenged deep inner values. Not everyone, however, knows Chinese Dramas or their stars, which is a consequence of Dramaland's focus on Korean dramas and promoting the Korean experience. Despite a parity in terms of production quality, star power, scripts and compelling visual settings, Chinese Dramas have been playing catch up to their famous counterparts. While they might have a strong competitive soft power for international drama fans, the soft power of Korean dramas is imbued with substantial societal values that they want to share with others. Those values are portrayed in an artistic way that connects with audiences who experience loneliness in the non-virtual world contrary to the way Chinese Dramas are perceived.

Keywords: Chinese dramas, fandom, Korean dramas, participatory culture, value perception, soft power, surface culture

Procedia PDF Downloads 140
1657 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 217
1656 Knowledge and Skills Requirements for Software Developer Students

Authors: J. Liebenberg, M. Huisman, E. Mentz

Abstract:

It is widely acknowledged that there is a shortage of software developers, not only in South Africa, but also worldwide. Despite reports on a gap between industry needs and software education, the gap has mostly been explored in quantitative studies. This paper reports on the qualitative data of a mixed method study of the perceptions of professional software developers regarding what topics they learned from their formal education and the importance of these topics to their actual work. The analysis suggests that there is a gap between industry’s needs and software development education and the following recommendations are made: 1) Real-life projects must be included in students’ education; 2) Soft skills and business skills must be included in curricula; 3) Universities must keep the curriculum up to date; 4) Software development education must be made accessible to a diverse range of students.

Keywords: software development education, software industry, IT workforce, computing curricula

Procedia PDF Downloads 437
1655 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 295
1654 Rheology and Structural Arrest of Dense Dairy Suspensions: A Soft Matter Approach

Authors: Marjan Javanmard

Abstract:

The rheological properties of dairy products critically depend on the underlying organisation of proteins at multiple length scales. When heated and acidified, milk proteins form particle gel that is viscoelastic, solvent rich, ‘soft’ material. In this work recent developments on the rheology of soft particles suspensions were used to interpret and potentially define the properties of dairy gel structures. It is discovered that at volume fractions below random close packing (RCP), the Maron-Pierce-Quemada (MPQ) model accurately predicts the viscosity of the dairy gel suspensions without fitting parameters; the MPQ model has been shown previously to provide reasonable predictions of the viscosity of hard sphere suspensions from the volume fraction, solvent viscosity and RCP. This surprising finding demonstrates that up to RCP, the dairy gel system behaves as a hard sphere suspension and that the structural aggregates behave as discrete particulates akin to what is observed for microgel suspensions. At effective phase volumes well above RCP, the system is a soft solid. In this region, it is discovered that the storage modulus of the sheared AMG scales with the storage modulus of the set gel. The storage modulus in this regime is reasonably well described as a function of effective phase volume by the Evans and Lips model. Findings of this work has potential to aid in rational design and control of dairy food structure-properties.

Keywords: dairy suspensions, rheology-structure, Maron-Pierce-Quemada Model, Evans and Lips Model

Procedia PDF Downloads 192
1653 Run-Time Customisation of Soft-Core CPUs on Field Programmable Gate Array

Authors: Rehab Abdullah Shendi

Abstract:

The use of customised soft-core processors in which instructions can be integrated into a system in application hardware is increasing in the Field Programmable Gate Array (FPGA) field. Specifically, the partial run-time reconfiguration of FPGAs in specialised processors for a particular domain can be very beneficial. In this report, the design and implementation for the customisation of a soft-core MIPS processor using an FPGA and partial reconfiguration (PR) of FPGA technology will be addressed to achieve efficient resource use. This can be achieved using a PR design flow that helps the design fit into a smaller device. Moreover, the impact of static power consumption could be reduced due to runtime reconfiguration. This will be done by configurable custom instructions implemented in the hardware as an extension on the MIPS CPU. The aim of this project is to investigate the PR of FPGAs for run-time adaptations of the instruction set of a soft-core CPU, including the integration of custom instructions and the exploration of the potential to use the MultiBoot feature available in Xilinx FPGAs to carry out the PR process. The system will be evaluated and tested on a Nexus 3 development board featuring a Xilinx Spartran-6 FPGA. The system will be able to load reconfigurable custom instructions dynamically into user programs with the help of the trap handler when the custom instruction is called by the MIPS CPU. The results of this experiment demonstrate that custom instructions in hardware can speed up a certain function and many instructions can be saved when compared to a software implementation of the same function. Implementing custom instructions in hardware is perfectly possible and worth exploring.

Keywords: customisation, FPGA, MIPS, partial reconfiguration, PR

Procedia PDF Downloads 241
1652 Protecting Physicochemical Properties of Black Cumin Seed (Nigella sativa) Oil and Developing Value Added Products

Authors: Zeliha Ustun, Mustafa Ersoz

Abstract:

In the study, a traditional herbal supplement black cumin seed (Nigella sativa) oil properties has been studied to protect the main quality parameters by a new supplement application. Black cumin seed and its oil is used as a dietary supplement and preferred traditional remedy in Africa, Asia and Middle East for centuries. Now it has been consuming by millions of people in America and Europe as natural supplements and/or phytotherapeutic agents to support immune system, asthma, allergic rinnitis etc. by the scientists’ advices. With the study, it is aimed to prove that soft gelatin capsules are a new and more practical way of usage for Nigella sativa oil that has a longer stability. With the study soft gelatin capsules formulation has been developed to protect cold pressed black cumin seed oil physicochemical properties for a longer period. The product design has been developed in laboratory and implemented in pilot scale soft gelatin capsule manufacturing. Physicochemical properties (peroxide value, free fatty acids, fatty acid composition, refractive index, iodine value, saponification value, unsaponifiable matters) of Nigella sativa oil soft gelatin capsules and Nigella sativa oil in liquid form in amber glass bottles have been compared and followed for 8 months. The main parameters for capsules and liquid form found that for free fatty acids 2.29±0.03, 3.92±0.11 % oleic acid, peroxide 23.11±1.18, 27.85±2.50 meqO2/kg, refractive index at 20 0C 1.4738±0.00, 1.4737±0.00, soap 0 ppm, moisture and volatility 0.32±0.01, 0.36±0.01 %, iodine value 123.00±0.00, 122.00±0.00 wijs, saponification value 196.25±0.46, 194.13±0.35 mg KOH/g and unsaponifiable matter 7.72±0.13, 6.88±0.36 g/kg respectively. The main fatty acids are found that linoleic acid 56.17%, oleic acid 24.64%, palmitic acid 11,94 %. As a result, it is found that cold pressed Nigella sativa oil soft gelatin capsules physicochemical properties are more stable than the Nigella sativa oil stored in glass bottles.

Keywords: black cumin seed (Nigella sativa) oil, cold press, nutritional supplements, soft gelatin capsule

Procedia PDF Downloads 341
1651 Comparative Study of the Effect of Three Fungicides: Tilt and Artea Amistarxtra about Growing Wheat, Hard, and Soft and Their Impact on Grain Yield and Its Components in the Semi-Arid Zone of Setif

Authors: Cheniti Khalissa, Dekhili Mohamed

Abstract:

Several fungal diseases may infect hard and soft wheat, which directly affect the yield and thus the economy of the homeland. So, a treatment fungicide is one of means of diseases control. In this context, we studied two varieties of wheat; Waha for soft wheat and Hidhab for hard wheat, at the level of the Technical Institute of crops (ITGC) in the wilaya of Setif under semi-arid conditions. This study consists of a successive application of three fungicides (Tilt, Artea, and Armistarxtra) according to three treatments (T1, T2, and T3) in addition to the witness (T0) at different stages of plant development (respectively, Montaison, earing and after flowering) whose purpose is to test and determine the effectiveness of these products used sequentially. The study showed good efficacy when we use the sum of these pesticides The comparison between these different treatments indicates that the T3 treatment reduced yield losses significantly; which is evident in the main yield components such as fertility, grain yield and weight of 1000 grains. The various components of yield and final yield are all parameters to be taken into account in such a study. In general, the fungal treatment is an effective way of improving profitability. In general, the fungal treatment is an effective way of improving profitability and positioning interventions in time is one of the requirements for an appreciable efficiency.

Keywords: hard wheat, soft wheat, diseases, fungicide treatment, fertility, 1000-grain weight, semi-arid zone

Procedia PDF Downloads 378
1650 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network

Authors: Ziying Wu, Danfeng Yan

Abstract:

Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.

Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network

Procedia PDF Downloads 81
1649 Virtualizing Attendance and Reducing Impacts on the Environment with a Mobile Application

Authors: Paulo R. M. Andrade, Adriano B. Albuquerque, Otávio F. Frota, Robson V. Silveira, Fátima A. da Silva

Abstract:

Information technology has been gaining more and more space whether in industry, commerce or even for personal use, but the misuse of it brings harm to the environment and human health as a result. Contribute to the sustainability of the planet is to compensate the environment, all or part of what withdraws it. The green computing also came to propose practical for use in IT in an environmentally correct way in aid of strategic management and communication. This work focuses on showing how a mobile application can help businesses reduce costs and reduced environmental impacts caused by its processes, through a case study of a public company in Brazil.

Keywords: green computing, information technology, e-government, sustainable development, mobile computing

Procedia PDF Downloads 390
1648 Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet

Authors: Gurkirat Kaur, Manoj Kumar, Manju Bala

Abstract:

Ethernet is the most influential and widely used technology in the world. With the growing demand of low latency and high throughput technologies like InfiniBand and RoCE, unique features viz. RDMA (Remote Direct Memory Access) have evolved. RDMA is an effective technology which is used for reducing system load and improving performance. InfiniBand is a well known technology which provides high-bandwidth and low-latency and makes optimal use of in-built features like RDMA. With the rapid evolution of InfiniBand technology and Ethernet lacking the RDMA and zero copy protocol, the Ethernet community has came out with a new enhancements that bridges the gap between InfiniBand and Ethernet. By adding the RDMA and zero copy protocol to the Ethernet a new networking technology is evolved, called RDMA over Converged Ethernet (RoCE). RoCE is a standard released by the IBTA standardization body to define RDMA protocol over Ethernet. With the emergence of lossless Ethernet, RoCE uses InfiniBand’s efficient transport to provide the platform for deploying RDMA technology in mainstream data centres over 10GigE, 40GigE and beyond. RoCE provide all of the InfiniBand benefits transport benefits and well established RDMA ecosystem combined with converged Ethernet. In this paper, we evaluate the heterogeneous Linux cluster, having multi nodes with fast interconnects i.e. gigabit Ethernet and Soft RoCE. This paper presents the heterogeneous Linux cluster configuration and evaluates its performance using Intel’s MPI Benchmarks. Our result shows that Soft RoCE is performing better than Ethernet in various performance metrics like bandwidth, latency and throughput.

Keywords: ethernet, InfiniBand, RoCE, RDMA, MPI, Soft RoCE

Procedia PDF Downloads 437
1647 The Curvature of Bending Analysis and Motion of Soft Robotic Fingers by Full 3D Printing with MC-Cells Technique for Hand Rehabilitation

Authors: Chaiyawat Musikapan, Ratchatin Chancharoen, Saknan Bongsebandhu-Phubhakdi

Abstract:

For many recent years, soft robotic fingers were used for supporting the patients who had survived the neurological diseases that resulted in muscular disorders and neural network damages, such as stroke and Parkinson’s disease, and inflammatory symptoms such as De Quervain and trigger finger. Generally, the major hand function is significant to manipulate objects in activities of daily living (ADL). In this work, we proposed the model of soft actuator that manufactured by full 3D printing without the molding process and one material for use. Furthermore, we designed the model with a technique of multi cavitation cells (MC-Cells). Then, we demonstrated the curvature bending, fluidic pressure and force that generated to the model for assistive finger flexor and hand grasping. Also, the soft actuators were characterized in mathematics solving by the length of chord and arc length. In addition, we used an adaptive push-button switch machine to measure the force in our experiment. Consequently, we evaluated biomechanics efficiency by the range of motion (ROM) that affected to metacarpophalangeal joint (MCP), proximal interphalangeal joint (PIP) and distal interphalangeal joint (DIP). Finally, the model achieved to exhibit the corresponding fluidic pressure with force and ROM to assist the finger flexor and hand grasping.

Keywords: biomechanics efficiency, curvature bending, hand functional assistance, multi cavitation cells (MC-Cells), range of motion (ROM)

Procedia PDF Downloads 208
1646 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 339
1645 Identification and Characterization of Enterobacter cloacae, New Soft Rot Causing Pathogen of Radish in India

Authors: B. S. Chandrashekar, M. K. Prasannakumar, P. Buela Parivallal, Sahana N. Banakar, Swathi S. Patil, H. B. Mahesh, D. Pramesh

Abstract:

Bacterial soft rot is one of the most often seen diseases in many plant species globally, resulting in considerable yield loss. Radish roots with dark water-soaked lesions, maceration of tissue, and a foul odour were collected in the Kolar region, India. Two isolates were obtained from rotted samples that demonstrated morphologically unpigmented, white mucoid convex colonies on nutrient agar medium. The isolated bacteria (RDH1 and RDH3) were gram-negative, rod-shaped bacteria with biochemically distinct characteristics similar to the type culture of Enterobacter cloacae ATCC13047 and Bergy's handbook of determinative bacteriology. The 16s rRNA gene was used to identify Enterobacter species. On carrot, potato, tomato, chilli, bell pepper, knolkhol, cauliflower, cabbage, and cucumber slices, the Koch′s postulates were fulfilled, and the pathogen was also pathogenic on radish, cauliflower, and cabbage seedlings were grown in a glasshouse. After 36 hours, both isolates exhibited a hypersensitive sensitivity to Nicotianatabacum. Semi-quantitative analysis revealed that cell wall degrading enzymes (CWDEs) such as pectin lyase, polygalacturonase, and cellulase (p=1.4e09) contributed to pathogenicity, whereas isolates produced biofilms (p=4.3e-11) that help in host adhesion. This is the first report in India of radish soft rot caused by E. cloacae.

Keywords: soft rot, enterobacter cloacae, 16S rRNA, nicotiana tabacum, and pathogenicity

Procedia PDF Downloads 101
1644 Implementing a Neural Network on a Low-Power and Mobile Cluster to Aide Drivers with Predictive AI for Traffic Behavior

Authors: Christopher Lama, Alix Rieser, Aleksandra Molchanova, Charles Thangaraj

Abstract:

New technologies like Tesla’s Dojo have made high-performance embedded computing more available. Although automobile computing has developed and benefited enormously from these more recent technologies, the costs are still high, prohibitively high in some cases for broader adaptation, particularly for the after-market and enthusiast markets. This project aims to implement a Raspberry Pi-based low-power (under one hundred Watts) highly mobile computing cluster for a neural network. The computing cluster built from off-the-shelf components is more affordable and, therefore, makes wider adoption possible. The paper describes the design of the neural network, Raspberry Pi-based cluster, and applications the cluster will run. The neural network will use input data from sensors and cameras to project a live view of the road state as the user drives. The neural network will be trained to predict traffic behavior and generate warnings when potentially dangerous situations are predicted. The significant outcomes of this study will be two folds, firstly, to implement and test the low-cost cluster, and secondly, to ascertain the effectiveness of the predictive AI implemented on the cluster.

Keywords: CS pedagogy, student research, cluster computing, machine learning

Procedia PDF Downloads 62
1643 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 128
1642 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 395
1641 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures

Authors: Silvina Caíno-Lores, Jesús Carretero

Abstract:

Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.

Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing

Procedia PDF Downloads 230
1640 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model

Procedia PDF Downloads 137
1639 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 119
1638 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 164