Search results for: Dahlia Durga
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 39

Search results for: Dahlia Durga

9 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning

Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar

Abstract:

As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.

Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence

Procedia PDF Downloads 82
8 Formulation and Anticancer Evaluation of Beta-Sitosterol in Henna Methanolic Extract Embedded in Controlled Release Nanocomposite

Authors: Sanjukta Badhai, Durga Barik, Bairagi C. Mallick

Abstract:

In the present study, Beta-Sitosterol in Lawsonia methanolic leaf extract embedded in controlled release nanocomposite was prepared and evaluated for in vivo anticancer efficacy in dimethyl hydrazine (DMH) induced colon cancer. In the present study, colon cancer was induced by s.c injection of DMH (20 mg/kg b.wt) for 15 weeks. The animals were divided into five groups as follows control, DMH alone, DMH and Beta Sitosterol nanocomposite (50mg/kg), DMH and Beta Sitosterol nanocomposite (100 mg/kg) and DMH and Standard Silymarin (100mg/kg) and the treatment was carried out for 15 weeks. At the end of the study period, the blood was withdrawn, and serum was separated for haematological, biochemical analysis and tumor markers. Further, the colonic tissue was removed for the estimation of antioxidants and histopathological analysis. The results of the study displays that DMH intoxication elicits altered haematological parameters (RBC,WBC, and Hb), elevated lipid peroxidation and decreased antioxidants level (SOD, CAT, GPX, GST and GSH), elevated lipid profiles (cholesterol and triglycerides), tumor markers (CEA and AFP) and altered colonic tissue histology. Meanwhile, treatment with Beta Sitosterol nanocomposites significantly restored the altered biochemicals parameters in DMH induced colon cancer mediated by its anticancer efficacy. Further, Beta Sitosterol nanocomposite (100 mg/kg) showed marked efficacy.

Keywords: nanocomposites, herbal formulation, henna, beta sitosterol, colon cancer, dimethyl hydrazine, antioxidant, lipid peroxidation

Procedia PDF Downloads 134
7 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 80
6 The Nature and Impacts of 2015 Indian Unofficial Blockade in Nepal

Authors: Jhabakhar Aryal, Kesh Bahadur Rana, Durga Prasad Neupane

Abstract:

This research analyzes the nature and impacts of the 2015 unofficial blockade in Nepal, a significant event that triggered an economic and humanitarian crisis. While official channels denied claims of involvement, Nepal perceived the blockade as orchestrated by India due to concerns about the newly adopted constitution and Madheshi infringements. The study adopts a qualitative approach, utilizing semi-structured interviews, document analysis, and content analysis to gather data from various perspectives. Employing a "colonial hangover lens," it investigates if colonial legacies continue to influence postcolonial nation dynamics, focusing on India's potential attempt to exert influence over Nepal. The findings suggest that the 2015 blockade had profound consequences for Nepal, potentially reflecting lingering colonial power dynamics in the region. Despite India's denials, a significant portion of Nepalis perceived the blockade as an act of external pressure. Examining these perceptions offers valuable insights into postcolonial relations and their impact on regional stability. The 2015 unofficial blockade serves as a critical case study in understanding the complex interplay of internal dynamics, external influences, and historical legacies in shaping the geopolitics of the region. This research contributes to a deeper understanding of these factors and their ongoing implications for Nepal and its relationship with India.

Keywords: blockade, unofficial, constitution, Madhesis, India, Nepal, postcolonial, regional stability, geopolitics

Procedia PDF Downloads 26
5 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 157
4 Cost Benefit Analysis of Adoption of Climate Change Adaptation Options among Rural Rice Farmers in Nepal

Authors: Niranjan Devkota , Ram Kumar Phuya, Durga Lal Shreshta

Abstract:

This paper estimates cost and benefit of adoption of climate change adaptation options available to the rural rice farmers of Nepal. Adoption of adaptation strategies, intensity of use of adaptation options, identification of labor and non-labor cost and finally per unit cost and benefit analysis of climate change adaptation were made. Multi-stage sampling technique was used to source respondents for the study and used structured questionnaire techniques to collect data from 773 households from seven districts; 3 from Terai and 4 from Hilly region of Nepal. The result revealed that there are 13 major adaptation options rice farmers practice in order to protect themselves from climatic risk. Among the given adaptation options, the first three popular adaptation options practiced by rice farmers are (i) increasing use of chemical fertilizer (60.93%) (ii) use of climate smart verities (49.29%) and (iii) change in nursery date (32.08%). Adaptation cost is obvious, based on that, the first three costly adaptation options are the alternative irrigation practice which incurred average cost of US $69.95 (US$ 1 = 102.84 Nepalese Rupees) followed by a denser plantation of local seeds ($ 20.69) and using climate smart varieties ($ 18.06). 88% farmers practiced more than one adaptation strategies on the same farm with the aim of reducing the effect of extreme climatic conditions. Total cost and revenue revealed that per unit total cost ranges from $28.34 to $32.79 whereas per unit total revenue ranges $33.4 to $49.02. Surprisingly, it is observed that farmers who do not adopt any adaptation options are able to receive highest income from per unit production. As Net Present Value (NPV) is positive and Benefit Cost Ration (BCR) is greater than one for every adaptation options that indicates the available adaptation options are profitable to the rice farmers.

Keywords: climate change, adaptation options, cost benefit analysis, rural rice farmers, Nepal

Procedia PDF Downloads 231
3 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 209
2 The Importance of Urban Pattern and Planting Design in Urban Transformation Projects

Authors: Mustafa Var, Yasin Kültiğin Yaman, Elif Berna Var, Müberra Pulatkan

Abstract:

This study deals with real application of an urban transformation project in Trabzon, Turkey. It aims to highlight the significance of using native species in terms of planting design of transformation projects which will also promote sustainability of urban identity. Urban identity is a phenomenon shaped not only by physical, but also by natural, spatial, social, historical and cultural factors. Urban areas face with continuous change which can be whether positive or negative way. If it occurs in a negative way that may have some destructive effects on urban identity. To solve this problematic issue, urban renewal movements initally started after 1840s around the world especially in the cities with ports. This process later followed by the places where people suffered a lot from fires and has expanded to all over the world. In Turkey, those processes have been experienced mostly after 1980s as country experienced the worst effects of unplanned urbanization especially in 1950-1990 period. Also old squares, streets, meeting points, green areas, Ottoman bazaars have changed slowly. This change was resulted in alienation of inhabitants to their environments. As a solution, several actions were taken like Mass Housing Laws which was enacted in 1981 and 1984 or urban transformation projects. Although projects between 1990-2000 were tried to satisfy the expectations of local inhabitants by the help of several design solutions to promote cultural identity; unfortunately those modern projects has also been resulted in alienation of urban environments to the inhabitants. Those projects were initially done by TOKI (Housing Development Administration of Turkey) and later followed by the Ministry of Environment and Urbanization after 2011. Although they had significant potentials to create healthy urban environments, they could not use this opportunity in an effective way. The reason for their failure is that their architectural styles and planting designs are unrespectful to local identity and environments. Generally, it can be said that the most of the urban transformation projects implementing in Turkey nearly have no concerns about the locality. However, those projects can be used as a positive tool for enhanching the urban identity of cities by means of local planting material. For instance, Kyoto can be identified by Japanese Maple trees or Seattle can be specified by Dahlia. In the same way, in Turkey, Istanbul city can be identified by Judas and Stone Pine trees or Giresun city can be identified by Cherry trees. Thus, in this paper, the importance of conserving urban identity is discussed specificly with the help of using local planting elements. After revealing the mistakes that are made during urban transformation projects, the techniques and design criterias for preserving and promoting urban identity are examined. In the end, it is emphasized that every city should have their own original, local character and specific planting design which can be used for highlighting its identity as well as architectural elements.

Keywords: urban identity, urban transformation, planting design, landscape architecture

Procedia PDF Downloads 499
1 Charcoal Production from Invasive Species: Suggested Shift for Increased Household Income and Forest Plant Diversity in Nepal

Authors: Kishor Prasad Bhatta, Suman Ghimire, Durga Prasad Joshi

Abstract:

Invasive Alien Species (IAS) are considered waste forest resources in Nepal. The rapid expansion of IAS is one of the nine main drivers of forest degradation, though the extent and distribution of this species are not well known. Further, the knowledge of the impact of IAS removal on forest plant diversity is hardly known, and the possibilities of income generation from them at the grass-root communities are rarely documented. Systematic sampling of 1% with nested circular plots of 500 square meters was performed in IAS removed and non-removed area, each of 30 hectares in Udayapur Community Forest User Group (CFUG), Chitwan, central Nepal to observe whether the removal of IAS contributed to an increase in plant diversity. In addition, ten entrepreneurs of Udaypur CFUG, involved in the charcoal production, briquette making and marketing were interviewed and interacted as well as their record keeping booklets were reviewed to understand if the charcoal production contributed to their income and employment. The average annual precipitation and temperature of the study area is 2100 mm and 34 degree Celsius respectively with Shorea robusta as main tree species and Eupatorium odoratum as dominant IAS. All the interviewed households were from the ̔below-poverty-line’ category as per Community Forestry Guidelines. A higher Shannon-Weiner plant diversity index at regeneration level was observed in IAS removed areas (2.43) than in control site (1.95). Furthermore, the number of tree seedlings and saplings in the IAS harvested blocks were significantly higher (p < 0.005) compared to the unharvested one. The sale of charcoal produced through the pyrolysis of IAS in ̔ Bio-energy kilns’ contributed for an average increased income of 30.95 % (Nepalese rupees 31,000) of the involved households. Despite above factors, some operational policy hurdles related to charcoal transport and taxation existed at field level. This study suggests that plant diversity could be increased through the removal of IAS, and considerable economic benefits could be achieved if charcoal is substantially produced and utilized.

Keywords: briquette, economic benefits, pyrolysis, regeneration

Procedia PDF Downloads 237