Search results for: user datagram protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3324

Search results for: user datagram protocol

894 Computational Fluid Dynamics (CFD) Simulation Approach for Developing New Powder Dispensing Device

Authors: Revanth Rallapalli

Abstract:

Manually dispensing solids and powders can be difficult as it requires gradually pour and check the amount on the scale to be dispensed. Current systems are manual and non-continuous in nature and are user-dependent and difficult to control powder dispensation. Recurrent dosing of powdered medicines in precise amounts quickly and accurately has been an all-time challenge. Various new powder dispensing mechanisms are being designed to overcome these challenges. A battery-operated screw conveyor mechanism is being innovated to overcome the above problems faced. These inventions are numerically evaluated at the concept development level by employing Computational Fluid Dynamics (CFD) of gas-solids multiphase flow systems. CFD has been very helpful in development of such devices saving time and money by reducing the number of prototypes and testing. Furthermore, this paper describes a simulation of powder dispensation from the trocar’s end by considering the powder as secondary flow in air, is simulated by using the technique called Dense Discrete Phase Model incorporated with Kinetic Theory of Granular Flow (DDPM-KTGF). By considering the volume fraction of powder as 50%, the transportation of powder from the inlet side to trocar’s end side is done by rotation of the screw conveyor. Thus, the performance is calculated for a 1-sec time frame in an unsteady computation manner. This methodology will help designers in developing design concepts to improve the dispensation and also at the effective area within a quick turnaround time frame.

Keywords: DDPM-KTGF, gas-solids multiphase flow, screw conveyor, Unsteady

Procedia PDF Downloads 183
893 Deaf Inmates in Canadian Prisons: Addressing Discrimination through Staff Training Videos with Deaf Actors

Authors: Tracey Bone

Abstract:

Deaf inmates, whose first or preferred language is a Signed Language, experience barriers to accessing the necessary two-way communication with correctional staff, and the educational and social programs that will enhance their eligibility for conditional release from the federal prison system in Canada. The development of visual content to enhance the knowledge and skill development of correctional staff is a contemporary strategy intended to significantly improve the correctional experience for deaf inmates. This presentation reports on the development of two distinct training videos created to enhance staff’s understanding of the needs of deaf inmates; one a two-part simulation of an interaction with a deaf inmate, the second an interview with a deaf academic. Part one of video one demonstrates the challenges and misunderstandings inherent in communicating across languages without a qualified sign language interpreter; the second part demonstrates the ease of communication when communication needs are met. Video two incorporates the experiences of a deaf academic to provide the cultural grounding necessary to educate staff in the unique experiences associated with being a visual language user. Lack of staff understanding or awareness of deaf culture and language must not be acceptable reasons for the inadequate treatment of deaf visual language users in federal prisons. This paper demonstrates a contemporary approach to meeting the human rights and needs of this unique and often ignored inmate subpopulation. The deaf community supports this visual approach to enhancing staff understanding of the unique needs of this population. A study of its effectiveness is currently underway.

Keywords: accommodations, American Sign Language (ASL), deaf inmates, sensory deprivation

Procedia PDF Downloads 151
892 Consumption of Fat Burners Leads to Acute Liver Failure: A Systematic Review protocol

Authors: Anjana Aggarwal, Sheilja Walia

Abstract:

Prevalence of obesity and overweight is increasing due to sedentary lifestyles and busy schedules of people that spend less time on physical exercise. To reduce weight, people are finding easier and more convenient ways. The easiest solution is the use of dietary supplements and fat burners. These are products that decrease body weight by increasing the basal metabolic rate. Various reports have been published on the consumption of fat burners leading to heart palpitations, seizures, anxiety, depression, psychosis, bradycardia, insomnia, muscle contractions, hepatotoxicity, and even liver failure. Case reports and series are reporting that the ingredients present in the fat burners caused acute liver failure (ALF) and hepatic toxicity in many cases. Another contributing factor is the absence of regulations from the Food and Drug Administration on these products, leading to increased consumption and a higher risk of liver diseases among the population. This systematic review aims to attain a better understanding of the dietary supplements used globally to reduce weight and document the case reports/series of acute liver failure caused by the consumption of fat burners. Electronic databases like PubMed, Cochrane, Google Scholar, etc., will be systematically searched for relevant articles. Various websites of dietary products and brands that sell such supplements, Journals of Hepatology, National and international projects launched for ALF, and their reports, along with the review of grey literature, will also be done to get a better understanding of the topic. After discussing with the co-author, the selection and screening of the articles will be performed by the author. The studies will be selected based on the predefined inclusion and exclusion criteria. The case reports and case series that will be included in the final list of the studies will be assessed for methodological quality using the CARE guidelines. The results from this study will provide insights and a better understanding of fat burners. Since the supplements are easily available in the market without any restrictions on their sale, people are unaware of their adverse effects. The consumption of these supplements causes acute liver failure. Thus, this review will provide a platform for future larger studies to be conducted.

Keywords: acute liver failure, dietary supplements, fat burners, weight loss supplements

Procedia PDF Downloads 85
891 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model

Authors: Mohammed Nasser Al-Suqri

Abstract:

Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.

Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman

Procedia PDF Downloads 116
890 Predictive Analytics of Bike Sharing Rider Parameters

Authors: Bongs Lainjo

Abstract:

The evolution and escalation of bike-sharing programs (BSP) continue unabated. Since the sixties, many countries have introduced different models and strategies of BSP. These include variations ranging from dockless models to electronic real-time monitoring systems. Reasons for using this BSP include recreation, errands, work, etc. And there is all indication that complex, and more innovative rider-friendly systems are yet to be introduced. The objective of this paper is to analyze current variables established by different operators and streamline them identifying the most compelling ones using analytics. Given the contents of available databases, there is a lack of uniformity and common standard on what is required and what is not. Two factors appear to be common: user type (registered and unregistered, and duration of each trip). This article uses historical data provided by one operator based in the greater Washington, District of Columbia, USA area. Several variables including categorical and continuous data types were screened. Eight out of 18 were considered acceptable and significantly contribute to determining a useful and reliable predictive model. Bike-sharing systems have become popular in recent years all around the world. Although this trend has resulted in many studies on public cycling systems, there have been few previous studies on the factors influencing public bicycle travel behavior. A bike-sharing system is a computer-controlled system in which individuals can borrow bikes for a fee or free for a limited period. This study has identified unprecedented useful, and pragmatic parameters required in improving BSP ridership dynamics.

Keywords: sharing program, historical data, parameters, ridership dynamics, trip duration

Procedia PDF Downloads 139
889 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 475
888 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 111
887 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled

Authors: Rishabh Ambavanekar

Abstract:

Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.

Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis

Procedia PDF Downloads 119
886 Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development

Authors: Boon Yih Mah

Abstract:

Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style.

Keywords: WeCWI, literacy discovery, language discovery, cognitive discovery, psychological discovery

Procedia PDF Downloads 562
885 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station

Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner

Abstract:

A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.

Keywords: radio base station, maintenance, classification, detection, deep learning, automation

Procedia PDF Downloads 203
884 Agile Smartphone Porting and App Integration of Signal Processing Algorithms Obtained through Rapid Development

Authors: Marvin Chibuzo Offiah, Susanne Rosenthal, Markus Borschbach

Abstract:

Certain research projects in Computer Science often involve research on existing signal processing algorithms and developing improvements on them. Research budgets are usually limited, hence there is limited time for implementing the algorithms from scratch. It is therefore common practice, to use implementations provided by other researchers as a template. These are most commonly provided in a rapid development, i.e. 4th generation, programming language, usually Matlab. Rapid development is a common method in Computer Science research for quickly implementing and testing new developed algorithms, which is also a common task within agile project organization. The growing relevance of mobile devices in the computer market also gives rise to the need to demonstrate the successful executability and performance measurement of these algorithms on a mobile device operating system and processor, particularly on a smartphone. Open mobile systems such as Android, are most suitable for this task, which is to be performed most efficiently. Furthermore, efficiently implementing an interaction between the algorithm and a graphical user interface (GUI) that runs exclusively on the mobile device is necessary in cases where the project’s goal statement also includes such a task. This paper examines different proposed solutions for porting computer algorithms obtained through rapid development into a GUI-based smartphone Android app and evaluates their feasibilities. Accordingly, the feasible methods are tested and a short success report is given for each tested method.

Keywords: SMARTNAVI, Smartphone, App, Programming languages, Rapid Development, MATLAB, Octave, C/C++, Java, Android, NDK, SDK, Linux, Ubuntu, Emulation, GUI

Procedia PDF Downloads 478
883 Chatbots as Language Teaching Tools for L2 English Learners

Authors: Feiying Wu

Abstract:

Chatbots are computer programs that attempt to engage a human in a dialogue, which originated in the 1960s with MIT's Eliza. However, they have become widespread more recently as advances in language technology have produced chatbots with increasing linguistic quality and sophistication, leading to their potential to serve as a tool for Computer-Assisted Language Learning(CALL). The aim of this article is to assess the feasibility of using two chatbots, Mitsuku and CleverBot, as pedagogical tools for learning English as a second language by stimulating L2 learners with distinct English proficiencies. Speaking of the input of stimulated learners, they are measured by AntWordProfiler to match the user's expected vocabulary proficiency. Totally, there are four chat sessions as each chatbot will converse with both beginners and advanced learners. For evaluation, it focuses on chatbots' responses from a linguistic standpoint, encompassing vocabulary and sentence levels. The vocabulary level is determined by the vocabulary range and the reaction to misspelled words. Grammatical accuracy and responsiveness to poorly formed sentences are assessed for the sentence level. In addition, the assessment of this essay sets 25% lexical and grammatical incorrect input to determine chatbots' corrective ability towards different linguistic forms. Based on statistical evidence and illustration of examples, despite the small sample size, neither Mitsuku nor CleverBot is ideal as educational tools based on their performance through word range, grammatical accuracy, topic range, and corrective feedback for incorrect words and sentences, but rather as a conversational tool for beginners of L2 English.

Keywords: chatbots, CALL, L2, corrective feedback

Procedia PDF Downloads 80
882 A Computationally Intelligent Framework to Support Youth Mental Health in Australia

Authors: Nathaniel Carpenter

Abstract:

Web-enabled systems for supporting youth mental health management in Australia are pioneering in their field; however, with their success, these systems are experiencing exponential growth in demand which is straining an already stretched service. Supporting youth mental is critical as the lack of support is associated with significant and lasting negative consequences. To meet this growing demand, and provide critical support, investigations are needed on evaluating and improving existing online support services. Improvements should focus on developing frameworks capable of augmenting and scaling service provisions. There are few investigations informing best-practice frameworks when implementing e-mental health support systems for youth mental health; there are fewer which implement machine learning or artificially intelligent systems to facilitate the delivering of services. This investigation will use a case study methodology to highlight the design features which are important for systems to enable young people to self-manage their mental health. The investigation will also highlight the current information system challenges, to include challenges associated with service quality, provisioning, and scaling. This work will propose methods of meeting these challenges through improved design, service augmentation and automation, service quality, and through artificially intelligent inspired solutions. The results of this study will inform a framework for supporting youth mental health with intelligent and scalable web-enabled technologies to support an ever-growing user base.

Keywords: artificial intelligence, information systems, machine learning, youth mental health

Procedia PDF Downloads 110
881 Study of the Polymer Elastic Behavior in the Displacement Oil Drops at Pore Scale

Authors: Luis Prada, Jose Gomez, Arlex Chaves, Julio Pedraza

Abstract:

Polymeric liquids have been used in the oil industry, especially at enhanced oil recovery (EOR). From the rheological point of view, polymers have the particularity of being viscoelastic liquids. One of the most common and useful models to describe that behavior is the Upper Convected Maxwell model (UCM). The main characteristic of the polymer used in EOR process is the increase in viscosity which pushes the oil outside of the reservoir. The elasticity could contribute in the drag of the oil that stays in the reservoir. Studying the elastic effect on the oil drop at the pore scale, bring an explanation if the addition of elastic force could mobilize the oil. This research explores if the contraction and expansion of the polymer in the pore scale may increase the elastic behavior of this kind of fluid. For that reason, this work simplified the pore geometry and build two simple geometries with micrometer lengths. Using source terms with the user define a function this work introduces the UCM model in the ANSYS fluent simulator with the purpose of evaluating the elastic effect of the polymer in a contraction and expansion geometry. Also, using the Eulerian multiphase model, this research considers the possibility that extra elastic force will show a deformation effect on the oil; for that reason, this work considers an oil drop on the upper wall of the geometry. Finally, all the simulations exhibit that at the pore scale conditions exist extra vortices at UCM model but is not possible to deform the oil completely and push it outside of the restrictions, also this research find the conditions for the oil displacement.

Keywords: ANSYS fluent, interfacial fluids mechanics, polymers, pore scale, viscoelasticity

Procedia PDF Downloads 132
880 Innovation and Employment in Sub-Saharan Africa: Evidence from Uganda Microdata

Authors: Milton Ayoki, Edward Bbaale

Abstract:

This paper analyses the relationship between innovation and employment at firm level with the objective of understanding the contribution of the different innovation strategies in fostering employment growth in Uganda. We use National Innovation Survey (micro-data of 705 Ugandan firms) for the period 2011-2014 and follow closely Harrison et al. (2014) structured approach, and relate employment growth to process innovations and to the growth of sales separately due to innovative and unchanged products. We find positive effects of product innovation on employment at firm level, while process innovation has no discernable impact on employment. Although there is evidence to suggest displacement of labour in some cases where firms only introduce new process, this effect is compensated by growth in employment from new products, which for most firms are introduced simultaneously with new process. Results suggest that source of innovation as well as size of innovating firms or end users of innovation matter for job growth. Innovation that develops from within the firm itself (user) and involving larger firms has greater impact on employment than that developed from outside or coming from within smaller firms. In addition, innovative firms are one and half times more likely to survive in the innovation driven economy environment than those that do not innovate. These results have important implications for policymakers and stakeholders in innovation ecosystem. Supporting policies need to be correctly tailored since the impacts depend on the innovation strategy (type) and characteristics and sector of the innovative firms (small, large, industry, etc.). Policies to spur investment, particularly in innovative sectors and firms with high growth potential would have long lasting effects on job creation. JEL Classification: D24, J0, J20, L20, O30.

Keywords: employment, process innovation, product innovation, Sub-Saharan Africa

Procedia PDF Downloads 173
879 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 97
878 Development of a Nursing Care Program Based on Anthroposophic External Therapy for the Pediatric Hospital in Brazil and Germany

Authors: Karina Peron, Ricardo Ghelman, Monica Taminato, Katia R. Oliveira, Debora C. A. Rodrigues, Juliana R. C. Mumme, Olga K. M. Sunakozaua, Georg Seifert, Vicente O. Filho

Abstract:

The nurse is the most available health professional for the interventions of support in the integrative approach in hospital environment, therefore a professional group key to changes in the model of care. The central components in the performance of anthroposophic nursing procedures are direct physical contact, promotion of proper rhythm, thermal regulation and the construction of a calm and empathic atmosphere, safe for patients and their caregivers. The procedures of anthroposophic external therapies (AET), basically composed of the application of compresses and the use of natural products, provide an opportunity to intensify the therapeutic results through an innovative, complementary and integrative model in the university hospital. The objective of this work is to report the implementation of a program of nursing techniques (AET) through a partnership between the Pediatric Oncology Sector of the Department of Pediatrics of the Faculty of Medicine of the University of Sao Paulo and Charite University of Berlin, with lecturers from Berlin's Integrative Hospital Havelhöhe and Witten-Herdecke Integrative Hospital, both in Germany. Intensive training activities of the Hospital's nursing staff and a survey on AET needs were developed based on the most prevalent complaints in pediatric oncology patients in the three environments of the Hospital of Pediatric Oncology: Bone Marrow Transplantation Unit, Intensive Care Unit and Division of Internal Patients. We obtained the approval of the clinical protocol of external anthroposophic therapies for nursing care by the Ethics Committee and the Academic Council of the Hospital. With this project, we highlight the key AET needs that will be part of the standard program of pediatric oncology care with appropriate scientific support. The results of the prevalent symptoms were: vomiting, nausea, pain, difficulty in starting sleep, constipation, cold extremities, mood disorder and psychomotor agitation. This project was the pioneer within the Integrative Pediatrics Program, as an innovative concept of Medicine and Integrative Health presented at scientific meetings.

Keywords: integrative health care, integrative nursing, pediatric nursing, pediatric oncology

Procedia PDF Downloads 266
877 A Transient Coupled Numerical Analysis of the Flow of Magnetorheological Fluids in Closed Domains

Authors: Wael Elsaady, S. Olutunde Oyadiji, Adel Nasser

Abstract:

The non-linear flow characteristics of magnetorheological (MR) fluids in MR dampers are studied via a coupled numerical approach that incorporates a two-phase flow model. The approach couples the Finite Element (FE) modelling of the damper magnetic circuit, with the Computational Fluid Dynamics (CFD) analysis of the flow field in the damper. The two-phase flow CFD model accounts for the effect of fluid compressibility due to the presence of liquid and gas in the closed domain of the damper. The dynamic mesh model included in ANSYS/Fluent CFD solver is used to simulate the movement of the MR damper piston in order to perform the fluid excitation. The two-phase flow analysis is studied by both Volume-Of-Fluid (VOF) model and mixture model that are included in ANSYS/Fluent. The CFD models show that the hysteretic behaviour of MR dampers is due to the effect of fluid compressibility. The flow field shows the distributions of pressure, velocity, and viscosity contours. In particular, it shows the high non-Newtonian viscosity in the affected fluid regions by the magnetic field and the low Newtonian viscosity elsewhere. Moreover, the dependence of gas volume fraction on the liquid pressure inside the damper is predicted by the mixture model. The presented approach targets a better understanding of the complicated flow characteristics of viscoplastic fluids that could be applied in different applications.

Keywords: viscoplastic fluid, magnetic FE analysis, computational fluid dynamics, two-phase flow, dynamic mesh, user-defined functions

Procedia PDF Downloads 174
876 Glycerol-Based Bio-Solvents for Organic Synthesis

Authors: Dorith Tavor, Adi Wolfson

Abstract:

In the past two decades a variety of green solvents have been proposed, including water, ionic liquids, fluorous solvents, and supercritical fluids. However, their implementation in industrial processes is still limited due to their tedious and non-sustainable synthesis, lack of experimental data and familiarity, as well as operational restrictions and high cost. Several years ago we presented, for the first time, the use of glycerol-based solvents as alternative sustainable reaction mediums in both catalytic and non-catalytic organic synthesis. Glycerol is the main by-product from the conversion of oils and fats in oleochemical production. Moreover, in the past decade, its price has substantially decreased due to an increase in supply from the production and use of fatty acid derivatives in the food, cosmetics, and drugs industries and in biofuel synthesis, i.e., biodiesel. The renewable origin, beneficial physicochemical properties and reusability of glycerol-based solvents, enabled improved product yield and selectivity as well as easy product separation and catalyst recycling. Furthermore, their high boiling point and polarity make them perfect candidates for non-conventional heating and mixing techniques such as ultrasound- and microwave-assisted reactions. Finally, in some reactions, such as catalytic transfer-hydrogenation or transesterification, they can also be used simultaneously as both solvent and reactant. In our ongoing efforts to design a viable protocol that will facilitate the acceptance of glycerol and its derivatives as sustainable solvents, pure glycerol and glycerol triacetate (triacetin) as well as various glycerol-triacetin mixtures were tested as sustainable solvents in several representative organic reactions, such as nucleophilic substitution of benzyl chloride to benzyl acetate, Suzuki-Miyaura cross-coupling of iodobenzene and phenylboronic acid, baker’s yeast reduction of ketones, and transfer hydrogenation of olefins. It was found that reaction performance was affected by the glycerol to triacetin ratio, as the solubility of the substrates in the solvent determined product yield. Thereby, employing optimal glycerol to triacetin ratio resulted in maximum product yield. In addition, using glycerol-based solvents enabled easy and successful separation of the products and recycling of the catalysts.

Keywords: glycerol, green chemistry, sustainability, catalysis

Procedia PDF Downloads 624
875 Change of Taste Preference after Bariatric Surgery

Authors: Piotr Tylec, Julia Wierzbicka, Natalia Gajewska, Krzysztof Przeczek, Grzegorz Torbicz, Alicja Dudek, Magdalena Pisarska-Adamczyk, Mateusz Wierdak, Michal Pedziwiatr

Abstract:

Introduction: Many patients have described changes in taste perception after weight loss surgery. However, little data is available about short term changes in taste after surgery. Aim: We aimed to evaluate short-term changes in taste preference after bariatric surgeries in comparison to colorectal surgeries. Material and Methods: Between April 2018 and April 2019, a total of 121 bariatric patients and 63 controls participated. Bariatric patients underwent laparoscopic sleeve gastrectomy or Roux-en-Y gastric by-pass. Controls underwent oncological colorectal surgeries. Patients who developed clinical complications requiring restriction of oral intake after surgery or withdraw their consent were excluded from the study. In the end, 85 bariatric patients and 44 controls were included. In all of them, the 16-item ERAS Protocol was applied. Using 10-points Numeric Rating Scale (1-10) patients completed questionnaire and rated their appetite and thirst (1 - no appetite/not thirsty, 10 – normal appetite/very thirsty) and flavoured standardized liquids' taste (1- horrible, 10-very tasty) and food images for the 6 group of taste (sweet, umami, sour, spicy, bitter and salty) (1 - not appetizing, 10 - very appetizing) preoperatively and on the first postoperative day. Data were analysed with Statistica 13.0 PL. Results: Analysed group consist of 129 patients (85 bariatric, 44 controls). Mean age and BMI in a research group was 44.91 years old, 46.22 kg/m² and in control group 62.09 years old, 25.87 kg/m², respectively. Our analysis revealed significant differences in changes of appetite between both groups (research: -4.55 ± 3.76 vs. control: -0.85 ± 4.37; p < 0.05), ratings bitter (research: 0.60 ± 2.98 vs. control: -0.88 ± 2.58; p < 0.05) and salty (research: 1.20 ± 3.50 vs. control: -0.52 ± 2.90; p < 0.05) flavoured liquids and ratings for sweet (research: 1.62 ± 3.31 vs. control: 0.01 ± 2.63; p < 0.05) and bitter (research: 1.21 ± 3.15 vs. control: -0.09 ± 2.25; p < 0.05) food images. There were statistically significant results in the ratings of other images, but in comparison to the control group, they were not statistically significant. Conclusion: The study showed that bariatric surgeries quickly decreases appetite and desire to eat certain types of food, such as salty. Moreover, the bitter taste was more desirable in the research group in comparison to control group. Nevertheless, the sweet taste was more appetible in the bariatric group than in control.

Keywords: bariatric surgery, general surgery, obesity, taste preference

Procedia PDF Downloads 136
874 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).

Keywords: mininet, OpenFlow, POX controller, SDN

Procedia PDF Downloads 237
873 Whether Buffer Zone Community Forests’ Benefits Are Distributed Fairly to Low-Income Users: Reflection From the Buffer Zone Community Forests in Bardia National Park, Nepal

Authors: Keshav Raj Acharya, Thakur Silwal, Neelam C. Poudyal

Abstract:

Buffer zones, the peripheral areas around the national parks and wildlife reserves, are available for the purpose of benefitting the local inhabitants by providing forest products for subsistence needs of basic forest products outside the protected areas. The forest area within the buffer zone has been managed as a buffer zone community forest (BZCF) for the last 25 years after the approval of the buffer zone management regulation 1996. With a case study of select BZCF in Bardia National Park, this study aims to analyze whether the benefit provided by BZCF is equally available to poor users among other socioeconomic classes of the users. The findings are based on the analysis of cross-sectional data involving household surveys (n=305) and key informants’ interviews (n=10) as well as office records available at different 5 buffer zone community forest user groups offices. Results indicate that despite the provisions of subsidized rates for poor; poor households were more deprived due to higher forest products price particularly, the timber price in buffer zone. Evidence also indicate that due to the increased forest coverage, the incidence of wildlife damage has also increased and impacted the poor more due to lack of land ownership as well as limited alternatives. Clear community forest management guidelines with equitable benefit sharing and compensatory mechanisms to the users of poor socioeconomic class have been identified as a solution to increase the benefit to poor users in BZCFUGs.

Keywords: crop depredation, forest products, users, wellbeing ranking

Procedia PDF Downloads 56
872 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach

Authors: Hiroaki Fukuda

Abstract:

This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.

Keywords: aspect-oriented programming, concurrent, development process, rich internet application

Procedia PDF Downloads 301
871 Managing Organizational Change for a Transformation Project: The Billing and Customer Relationship Management Journey

Authors: Sharifah I. N. A. Syed Azmi, Nazarina Mohd Nasir

Abstract:

The Billing & Customer Relationship Management (BCRM) project is an important enabler towards realizing customer experience transformation. It involves technological shifts for future scalability, revision of multiple business processes and adoption of change by the users and impacted employees. This massive transition, if not managed properly, may result in the decline of business performance due to productivity drop. Organizational change management is an essential element in BCRM project implementation to ensure the system is well understood and embraced by all stakeholders. In order to move impacted employees from unaware state or denial mode to full-acceptance mindset and committing themselves in using the new system, their involvement in the whole change process starting from the initial stage is imperative. Through the BCRM Change Management Plan, a holistic approach was taken whereby the strategy and program for five key components namely executive sponsorship, continuous communication, process change readiness, organizational readiness and individual readiness were all carefully established. Roles of the project sponsor, change agents, change ambassadors and community of practice (CoP) were clearly defined in gaining high commitment and support across the entire organization. Continuous communication and engagement initiatives throughout project implementation have been carried out to reach all stakeholders. The business readiness was constantly monitored and assessed including effectiveness of end-user training, thorough review of process documentation and completion of roles realignment exercise.

Keywords: BCRM, change management, organizational change, transformation project

Procedia PDF Downloads 142
870 TimeTune: Personalized Study Plans Generation with Google Calendar Integration

Authors: Chevon Fernando, Banuka Athuraliya

Abstract:

The purpose of this research is to provide a solution to the students’ time management, which usually becomes an issue because students must study and manage their personal commitments. "TimeTune," an AI-based study planner that provides an opportunity to maneuver study timeframes by incorporating modern machine learning algorithms with calendar applications, is unveiled as the ideal solution. The research is focused on the development of LSTM models that connect to the Google Calendar API in the process of developing learning paths that would be fit for a unique student's daily life experience and study history. A key finding of this research is the success in building the LSTM model to predict optimal study times, which, integrating with the real-time data of Google Calendar, will generate the timetables automatically in a personalized and customized manner. The methodology encompasses Agile development practices and Object-Oriented Analysis and Design (OOAD) principles, focusing on user-centric design and iterative development. By adopting this method, students can significantly reduce the tension associated with poor study habits and time management. In conclusion, "TimeTune" displays an advanced step in personalized education technology. The fact that its application of ML algorithms and calendar integration is quite innovative is slowly and steadily revolutionizing the lives of students. The excellence of maintaining a balanced academic and personal life is stress reduction, which the applications promise to provide for students when it comes to managing their studies.

Keywords: personalized learning, study planner, time management, calendar integration

Procedia PDF Downloads 49
869 The Effect of Peripheral Fatigue and Visual Feedback on Postural Control and Strength in Obese People

Authors: Elham Azimzadeh, Saeedeh Sepehri, Hamidollah Hassanlouei

Abstract:

Obesity is associated with postural instability, might influence the quality of daily life, and could be considered a potential factor for falling in obese people. The fat body mass especially in the abdominal area may increase body sway. Furthermore, loss of visual feedback may induce a larger postural sway in obese people. Moreover, Muscle fatigue may impair the work capacity of the skeletal muscle and may alter joint proprioception. So, the purpose of this study was to investigate the effect of physical fatigue and visual feedback on body sway and strength of lower extremities in obese people. 12 obese (4 female, 8 male; BMI >30 kg/m2), and 12 normal weight (4 female, 8 male; BMI: 20-25 kg/m2) subjects aged 37- 47 years participated in this study. The postural stability test on the Biodex balance system was used to characterize postural control along the anterior-posterior (AP) and mediolateral (ML) directions in eyes open and eyes closed conditions and maximal voluntary contraction (MVC) of knee extensors and flexors were measured before and after the high-intensity exhausting exercise protocol on the ergometer bike to confirm the presence of fatigue. Results indicated that the obese group demonstrated significantly greater body sway, in all indices (ML, AP, overall) compared with the normal weight group (eyes open). However, when visual feedback was eliminated, fatigue impaired the balance in the overall and AP indicators in both groups; ML sway was higher only in the obese group after exerting the fatigue in the eyes closed condition. Also, maximal voluntary contraction of knee extensors was impaired in the fatigued normal group but, there was no significant impairment in knee flexors MVC in both group. According to the findings, peripheral fatigue was associated with altered postural control in upright standing when eyes were closed, and that mechanoreceptors of the feet may be less able to estimate the position of the body COM over the base of support in the loss of visual feedback. This suggests that the overall capability of the postural control system during upright standing especially in the ML direction could be lower due to fatigue in obese individuals and could be a predictor of future falls.

Keywords: maximal voluntary contraction, obesity, peripheral fatigue, postural control, visual feedback

Procedia PDF Downloads 93
868 Role of F18-FDG PET in Management of Differentiated Thyroid Cancers (TENIS) Patients

Authors: Seemab Safdar, Shazia Fatima, Ahmad Qureshy, M. Adnan Saeed, M. Faheem

Abstract:

Background: Thyroid cancer has 586,000 cases per year worldwide, and this translates to 3% of all tumor diagnoses. 90% of the cases fall under differentiated thyroid carcinoma (DTC), which includes follicular thyroid cancer (FTC) and papillary thyroid cancer (PTC). During their illness, 10% of patients develop distant metastases, and two-thirds of them develop resistance to radioactive iodine (RAI) treatment. It has been shown that in some circumstances, like DTC with high TG levels and negative 131I whole-body scintigraphy (TENIS), [18F] FDG-PET-CT is an effective imaging technique. This study determines the role of [18F] FDG-PET-CT in the treatment of TENIS patients. Methods: 16 patients (n = 12 female; 4 males, age 45 ± 15 years) with histologically proven thyroid cancer (Differentiated and poorly differentiated) and high TG with negative iodine scans were included in this prospective study from January 2024 to June 2024. They underwent scanning in state-of-the-art (GE Discovery MI) [18F] FDG-PET-CT for re-staging or diagnostics of recurrent disease using a standardized protocol. All DTC subtypes and PDTC were included. The referring physicians completed standardized questionnaires both before and after PET-CT to prospectively determine the examination's effect on clinical decision-making. Patient outcomes were measured by analysis of medical records. Moreover, after PET-CT, a change in the pre-PET-CT planned therapies was documented in 32% of cases and additional invasive diagnostic procedures could be waived in 37.5 % of cases. TG levels under TSH stimulation were significantly higher in patients showing PET-CT metastases compared to patients without such findings (68.75%). Results: Without PET-CT, physicians referring to the doctors had not established a complete treatment plan for 45% of patients with thyroid carcinoma. 12/16 patients showed FDG avidity in cervical lymph nodes that were not Iodine avid previously, 2 patients had FDG avid disease in the lungs. In the process, PET-CT helped plan patient management and created a clear plan for treatment in 68.75% of patients. Conclusions: This study confirms that [18F] FDG-PET-CT used in a routine clinical setting has a very important impact on the management of patients with thyroid cancer when TG levels are persistently high in the presence of negative Iodine Scans by initiating treatments and replacing additional imaging and invasive tests.

Keywords: PET-CT, TENIS, role, FDG

Procedia PDF Downloads 18
867 Effects of Vegetable Oils Supplementation on in Vitro Rumen Fermentation and Methane Production in Buffaloes

Authors: Avijit Dey, Shyam S. Paul, Satbir S. Dahiya, Balbir S. Punia, Luciano A. Gonzalez

Abstract:

Methane emitted from ruminant livestock not only reduces the efficiency of feed energy utilization but also contributes to global warming. Vegetable oils, a source of poly unsaturated fatty acids, have potential to reduce methane production and increase conjugated linoleic acid in the rumen. However, characteristics of oils, level of inclusion and composition of basal diet influences their efficacy. Therefore, this study was aimed to investigate the effects of sunflower (SFL) and cottonseed (CSL) oils on methanogenesis, volatile fatty acids composition and feed fermentation pattern by in vitro gas production (IVGP) test. Four concentrations (0, 0.1, 0.2 and 0.4ml /30ml buffered rumen fluid) of each oil were used. Fresh rumen fluid was collected before morning feeding from two rumen cannulated buffalo steers fed a mixed ration. In vitro incubation was carried out with sorghum hay (200 ± 5 mg) as substrate in 100 ml calibrated glass syringes following standard IVGP protocol. After 24h incubation, gas production was recorded by displacement of piston. Methane in the gas phase and volatile fatty acids in the fermentation medium were estimated by gas chromatography. Addition of oils resulted in increase (p<0.05) in total gas production and decrease (p<0.05) in methane production, irrespective of type and concentration. Although the increase in gas production was similar, methane production (ml/g DM) and its concentration (%) in head space gas was lower (p< 0.01) in CSL than in SFL at corresponding doses. Linear decrease (p<0.001) in degradability of DM was evident with increasing doses of oils (0.2ml onwards). However, these effects were more pronounced with SFL. Acetate production tended to decrease but propionate and butyrate production increased (p<0.05) with addition of oils, irrespective of type and doses. The ratio of acetate to propionate was reduced (p<0.01) with addition of oils but no difference between the oils was noted. It is concluded that both the oils can reduce methane production. However, feed degradability was also affected with higher doses. Cotton seed oil in small dose (0.1ml/30 ml buffered rumen fluid) exerted greater inhibitory effects on methane production without impeding dry matter degradability. Further in vivo studies need to be carried out for their practical application in animal ration.

Keywords: buffalo, methanogenesis, rumen fermentation, vegetable oils

Procedia PDF Downloads 407
866 Cellulose Nanocrystals from Melon Plant Residues: A Sustainable and Renewable Source

Authors: Asiya Rezzouq, Mehdi El Bouchti, Omar Cherkaoui, Sanaa Majid, Souad Zyade

Abstract:

In recent years, there has been a steady increase in the exploration of new renewable and non-conventional sources for the production of biodegradable nanomaterials. Nature harbours valuable cellulose-rich materials that have so far been under-exploited and can be used to create cellulose derivatives such as cellulose microfibres (CMFs) and cellulose nanocrystals (CNCs). These unconventional sources have considerable potential as alternatives to conventional sources such as wood and cotton. By using agricultural waste to produce these cellulose derivatives, we are responding to the global call for sustainable solutions to environmental and economic challenges. Responsible management of agricultural waste is increasingly crucial to reducing the environmental consequences of its disposal, including soil and water pollution, while making efficient use of these untapped resources. In this study, the main objective was to extract cellulose nanocrystals (CNC) from melon plant residues using methods that are both efficient and sustainable. To achieve this high-quality extraction, we followed a well-defined protocol involving several key steps: pre-treatment of the residues by grinding, filtration and chemical purification to obtain high-quality (CMF) with a yield of 52% relative to the initial mass of the melon plant residue. Acid hydrolysis was then carried out using phosphoric acid and sulphuric acid to convert (CMF) into cellulose nanocrystals. The extracted cellulose nanocrystals were subjected to in-depth characterization using advanced techniques such as transmission electron microscopy (TEM), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR) and X-ray diffraction. The resulting cellulose nanocrystals have exceptional properties, including a large specific surface area, high thermal stability and high mechanical strength, making them suitable for a variety of applications, including as reinforcements for composite materials. In summary, the study highlights the potential for recovering agricultural melon waste to produce high-quality cellulose nanocrystals with promising applications in industry, nanotechnology, and biotechnology, thereby contributing to environmental and economic sustainability.

Keywords: cellulose, melon plant residues, cellulose nanocrystals, properties, applications, composite materials

Procedia PDF Downloads 57
865 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling

Procedia PDF Downloads 18