Search results for: Durga Devi D
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 127

Search results for: Durga Devi D

127 The Subaltern Woman and the Reproductive Body - A Reading of Devi's 'Breast Stories'

Authors: Sharon Lopez

Abstract:

Much of critical thought dismisses the notion of subaltern women engaging in resistance because of her complex colonial identity. She is seen in postcolonial theory as being "doubly effaced" and removed from exercising control to speak up and taking part in defiance. This line of reasoning suggests a critical area in which engaging with issues unavoidably excludes subaltern women from the emerging resistance discourse. A position like this also suggests a closed-minded view of human experience and a desire to maintain subalternity. The argument here is that subaltern women might be understood as achieving agency when they engage in resistance and speak out about their circumstances, whether aloud or in silence. Using deductions from Mahasweta Devi's literary narratives such as Imaginary Maps and Breast Stories, the study investigates the tactics Devi employs to engage marginalised women into resistance and establishes that the 'body' emerges in her stories not just as a site of oppression but also as an important motif of power and resistance.

Keywords: subaltern woman, reproductive docy, breast giver, devi

Procedia PDF Downloads 74
126 Impact of Brassinosteroid with GA3, CPPU on Yield and Quality of Newly Introduced Grape cv. Italia

Authors: Senthilkumar S, Vijayakumar R M , Soorianathasundaram K, Durga Devi D

Abstract:

A study was conducted to assess the influence of brassinosteroid and other bioregulators as pre-harvest sprays on yield and quality of newly introduced Californian grape cv. Italia. The vines were exposed to standardized pruning level of pruning 50% of the canes to 5-6 bud level for fruiting and 50% of the canes to two bud level for vegetative growth. The influence of brassinosteroid was assessed using BR (1 ppm) alone and in combination with GA3 and CPPU, sprayed at three different stages over the control (water spray) were given as treatments. The results revealed that the bunches treated with Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage i.e., 7-8 mm berry size, recorded the maximum values on yield characters like bunch weight (719.94 g), yield per vine (12.70 kg/vine) and yield per hectare (15.88 t). The berry characters and quality traits were also significantly influenced by the application of bioregulators. The maximum value for all those characters was registered under bunch sprays of Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage. The economic feasibility indicated that the treatment combination Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage (7-8 mm berry size) had registered the maximum benefit cost ratio of 3.13, as compared to 1.89 in control (water spray). Overall, it was observed that a combined bunch spray of Brassinosteroid (1 ppm) + GA3 (10 ppm) at pea stage (7-8 mm berry size) was adjudged as the best treatment for promoting the crop for better the bunch quality and yield.

Keywords: bioregulators, brassinosteroid, CPPU, GA3, Italia grape cultivar

Procedia PDF Downloads 214
125 Unveiling Bengali Women’s Appreciation of Modernizing Japan

Authors: Lopamudra Malek

Abstract:

It is known to all that Japan was closed till 1853 abruptly; Commodore Culbreath Matthew Perry has played a pivotal role in Japan’s exposure to modernization and facing the real world as an Asian entity. As Japan opened its door for the world, Indians, especially four women from Bengal, visited Japan. They were Hariprova Takeda, Sarojnalini Dutta, Santa Devi and Parul Devi. All of them were from different entities, but there were some bewildering similarities also in their depiction. How they penetrated their exposure to modernizing Japan is the motto of the research. It should be mentioned that two of them were directly influenced by Rabindranath Tagore. The methodology that has been followed while doing this research is depending on secondary source materials, like books, articles, etc. Japan was changing herself relentlessly towards modernization and westernization and these four women had witnessed the changing Japan and how the changing Japan has reflected in their write-ups and autobiography is the fundamental part of the research. As all of them were women, they had compared themselves with Japanese women. The finding of the research is, astonishingly, all of them found and comprehended Japan as a country where women were having more financial sovereignty and freedom of thought comparing to India in those days.

Keywords: empowerment, Japan, modernization, women

Procedia PDF Downloads 182
124 Challenging the Stereotypes: A Critical Study of Chotti Munda, His Arrow, and Sula

Authors: Khushboo Gokani, Renu Josan

Abstract:

Mahasweta Devi and Toni Morrison are the two stalwarts of the Indian-English and the Afro-American literature respectively. The writings of these two novelists are authentic and powerful records of the lives of the people because much of their personal experiences have gone into the making of their works. Devi, a representative force of the Indian English literature, is also a social activist working with the tribals of Bihar, Jharkhand, Orissa and West Bengal. Most of her works echo the lives and struggles of the subalterns as is evident in her 'best-beloved book' Chotti Munda and His Arrow. The novelist focuses on the struggle of the tribals against the colonial and the feudal powers to create their identity, thereby, embarking on the ideological project called Setting the Record Straight. The Nobel laureate Toni Morrison, on the other hand, brings to the fore the crucial issues of gender, race, and class in many of her significant works. In one of her representative works, Sula, the protagonist emerges as a non-conformist and directly confronts the notion of a ‘good woman’ nurtured by the community of the Blacks. In addition to this, the struggle of the Blacks against the White domination, also become an important theme of the text. The thrust of the paper lies in making a critical analysis of the portrayal of the heroic attempts of the subaltern protagonist and the artistic endeavor of the novelists in challenging the stereotypes.

Keywords: the struggle of the muted groups, subaltern, center and periphery, challenging the stereotypes

Procedia PDF Downloads 210
123 Earthquake Hazards in Manipur: Casual Factors and Remedial Measures

Authors: Kangujam Monika, Kiranbala Devi Thokchom, Soibam Sandhyarani Devi

Abstract:

Earthquake is a major natural hazard in India. Manipur, located in the North-Eastern Region of India, is one of the most affected location in the region prone to earthquakes since it lies in an area where Indian and Eurasian tectonic plates meet and is in seismic Zone V which is the most severe intensity zone, according to IS Code. Some recent earthquakes recorded in Manipur are M 6.7 epicenter at Tamenglong (January 4, 2016), M 5.2 epicenter at Churachandpur (February 24, 2017) and most recent M 4.4 epicenter at Thoubal (June 19, 2017). In these recent earthquakes, some houses and buildings were damaged, landslides were also occurred. A field study was carried out. An overview of the various causal factors involved in triggering of earthquake in Manipur has been discussed. It is found that improper planning, poor design, negligence, structural irregularities, poor quality materials, construction of foundation without proper site soil investigation and non-implementation of remedial measures, etc., are possibly the main causal factors for damage in Manipur during earthquake. The study also suggests, though the proper design of structure and foundation along with soil investigation, ground improvement methods, use of modern techniques of construction, counseling with engineer, mass awareness, etc., might be effective solution to control the hazard in many locations. An overview on the analysis pertaining to earthquake in Manipur together with on-going detailed site specific geotechnical investigation were presented.

Keywords: Manipur, earthquake, hazard, structure, soil

Procedia PDF Downloads 185
122 Accumulation of PM10 and Associated Metals Due to Opencast Coal Mining Activities and Their Impact on Human Health

Authors: Arundhuti Devi, Gitumani Devi, Krishna G. Bhattacharyya

Abstract:

The goal of this study was to assess the characteristics of the airborne dust created by opencast coal mining and its relation to population hospitalization risk for skin and lung diseases in Margherita Coalfield, Assam, India. Air samples were collected for 24 h in three 8-h periods. For the collection of particulate matter (PM10) and total suspended particulate matter (SPM) samples, respiratory dust samplers with glass microfiber filter papers were used. PM10 was analyzed for Cu, Cd, Cr, Mn, Zn, Ni, Fe and Pb with Flame Atomic Absorption Spectrophotometer (FAAS). SPM and PM10 concentrations were respectively found to be as high as 1,035 and 265.85 μg/m³ in work zone air. The concentration of metals associated with PM10 showed values higher than the permissible limits. It was observed that the average concentrations of the metals Fe, Pb, Ni, Zn, and Cu were very high during the winter month of December, those of Cd and Cr were high during the month of May and Mn was high during February. The morphology of the particles studied with scanning electron microscopy (SEM) gave significant results. Due to opencast coal mining, the air in the work zone, as well as the general ambient air, was found to be highly polluted with respect to dust. More than 8000 patient records maintained by the hospital authority were collected from three hospitals in the area. The highest percentage of people suffering from lung diseases are found in Margherita Civil Hospital (~26.77%) whereas most people suffering from skin diseases reported for treatment in the ESIC hospital (47.47%). Both PM10 and SPM were alarmingly high, and the results were in conformity with the high incidence of lung and other respiratory diseases in the study area.

Keywords: heavy metals, open cast coal mining, PM10, respiratory diseases

Procedia PDF Downloads 285
121 A Study on Unix Process Crash Based on Efficient Process Management Method

Authors: Guo Haonan, Chen Peiyu, Zhao Hanyu, Burra Venkata Durga Kumar

Abstract:

Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions.

Keywords: process management, daemon, login-bash and non-login bash, process group

Procedia PDF Downloads 101
120 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 180
119 Synthesis, Characterization, Validation of Resistant Microbial Strains and Anti Microbrial Activity of Substitted Pyrazoles

Authors: Rama Devi Kyatham, D. Ashok, K. S. K. Rao Patnaik, Raju Bathula

Abstract:

We have shown the importance of pyrazoles as anti-microbial chemical entities. These compounds have generally been considered significant due to their wide range of pharmacological acivities and their discovery motivates new avenues of research.The proposed pyrazoles were synthesized and evaluated for their anti-microbial activities. The Synthesized compounds were analyzed by different spectroscopic methods.

Keywords: pyrazoles, validation, resistant microbial strains, anti-microbial activities

Procedia PDF Downloads 136
118 Excitonic Refractive Index Change in High Purity GaAs Modulator at Room Temperature for Optical Fiber Communication Network

Authors: Durga Prasad Sapkota, Madhu Sudan Kayastha, Koichi Wakita

Abstract:

In this paper, we have compared and analyzed the electron absorption properties between with and without excitonic effect bulk in high purity GaAs spatial light modulator for an optical fiber communication network. The electroabsorption properties such as absorption spectra, change in absorption spectra, change in refractive index and extinction ratio have been calculated. We have also compared the result of absorption spectra and change in absorption spectra with the experimental results and found close agreement with experimental results.

Keywords: exciton, refractive index change, extinction ratio, GaAs

Procedia PDF Downloads 549
117 A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology

Authors: Kang Zijian, Zhang Tingyu, Burra Venkata Durga Kumar

Abstract:

This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem.

Keywords: virtual machine, pre-copy technology, memory migration process, downtime, dirty pages migration method

Procedia PDF Downloads 92
116 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 476
115 Variation in Orbital Elements of Mars and Jupiter Due to the Sun Oblateness by Using Secular Theory

Authors: Avaneesh Vaishwar, Badam Singh Kushvah, Devi Prasad Mishra

Abstract:

We studied the variation in orbital elements of Mars and Jupiter for a time span of 200 thousand years by using secular theory. Here we took Sun oblateness into account and considered the first two zonal gravity constants (J2 and J4) for showing the effect of Sun oblateness on the orbital elements of Mars and Jupiter. We found that in both cases (with and without Sun oblateness) the variation in orbital elements of Mars and Jupiter is periodic moreover in case of the Sun oblateness, the period of variation in orbital elements is decreasing for both the planets.

Keywords: lagrange's planetary equation, orbital elements, planetary system, secular theory

Procedia PDF Downloads 188
114 Lentil Protein Fortification in Cranberry Squash

Authors: Sandhya Devi A

Abstract:

The protein content of the cranberry squash (protein: 0g) may be increased by extracting protein from the lentils (9 g), which is particularly linked to a lower risk of developing heart disease. Using the technique of alkaline extraction from the lentils flour, protein may be extracted. Alkaline extraction of protein from lentil flour was optimized utilizing response surface approach in order to maximize both protein content and yield. Cranberry squash may be taken if a protein fortification syrup is prepared and processed into the squash.

Keywords: alkaline extraction, cranberry squash, protein fortification, response surface methodology

Procedia PDF Downloads 80
113 Spectrum of Dry Eye Disease in Computer Users of Manipur India

Authors: Somorjeet Sharma Shamurailatpam, Rabindra Das, A. Suchitra Devi

Abstract:

Computer and video display users might complain about Asthenopia, burning, dry eyes etc. The management of dry eyes is often not in the lines of severity. Following systematic evaluation and grading, dry eye disease is one condition that can be practiced at all levels of ophthalmic care. In the present study, different spectrum causing dry eye and prevalence of dry eye disease in computer users of Manipur, India are determined with 600 individuals (300 cases and 300 control). Individuals between 15 and 50 years who used computers for more than 3 hrs a day for 1 year or more were included. Tear break up time (TBUT) and Schirmer’s test were conducted. It shows that 33 (20.4%) out of 164 males and 47 (30.3%) out of 136 females have dry eye. Possible explanation for the observed result is discussed.

Keywords: asthenopia, computer vision syndrome, dry eyes, Schirmer's test, TBUT

Procedia PDF Downloads 344
112 Pattern Identification in Statistical Process Control Using Artificial Neural Networks

Authors: M. Pramila Devi, N. V. N. Indra Kiran

Abstract:

Control charts, predominantly in the form of X-bar chart, are important tools in statistical process control (SPC). They are useful in determining whether a process is behaving as intended or there are some unnatural causes of variation. A process is out of control if a point falls outside the control limits or a series of point’s exhibit an unnatural pattern. In this paper, a study is carried out on four training algorithms for CCPs recognition. For those algorithms optimal structure is identified and then they are studied for type I and type II errors for generalization without early stopping and with early stopping and the best one is proposed.

Keywords: control chart pattern recognition, neural network, backpropagation, generalization, early stopping

Procedia PDF Downloads 337
111 Multi-Criteria Geographic Information System Analysis of the Costs and Environmental Impacts of Improved Overland Tourist Access to Kaieteur National Park, Guyana

Authors: Mark R. Leipnik, Dahlia Durga, Linda Johnson-Bhola

Abstract:

Kaieteur is the most iconic National Park in the rainforest-clad nation of Guyana in South America. However, the magnificent 226-meter-high waterfall at its center is virtually inaccessible by surface transportation, and the occasional charter flights to the small airstrip in the park are too expensive for many tourists and residents. Thus, the largest waterfall in all of Amazonia, where the Potaro River plunges over a single free drop twice as high as Victoria Falls, remains preserved in splendid isolation inside a 57,000-hectare National Park established by the British in 1929, in the deepest recesses of a remote jungle canyon. Kaieteur Falls are largely unseen firsthand, but images of the falls are depicted on the Guyanese twenty dollar note, in every Guyanese tourist promotion, and on many items in the national capital of Georgetown. Georgetown is only 223-241 kilometers away from the falls. The lack of a single mileage figure demonstrates there is no single overland route. Any journey, except by air, involves changes of vehicles, a ferry ride, and a boat ride up a jungle river. It also entails hiking for many hours to view the falls. Surface access from Georgetown (or any city) is thus a 3-5 day-long adventure; even in the dry season, during the two wet seasons, travel is a particularly sticky proposition. This journey was made overland by the paper's co-author Dahlia Durga. This paper focuses on potential ways to improve overland tourist access to Kaieteur National Park from Georgetown. This is primarily a GIS-based analysis, using multiple criteria to determine the least cost means of creating all-weather road access to the area near the base of the falls while minimizing distance and elevation changes. Critically, it also involves minimizing the number of new bridges required to be built while utilizing the one existing ferry crossings of a major river. Cost estimates are based on data from road and bridge construction engineers operating currently in the interior of Guyana. The paper contains original maps generated with ArcGIS of the potential routes for such an overland connection, including the one deemed optimal. Other factors, such as the impact on endangered species habitats and Indigenous populations, are considered. This proposed infrastructure development is taking place at a time when Guyana is undergoing the largest boom in its history due to revenues from offshore oil and gas development. Thus, better access to the most important tourist attraction in the country is likely to happen eventually in some manner. But the questions of the most environmentally sustainable and least costly alternatives for such access remain. This paper addresses those questions and others related to access to this magnificent natural treasure and the tradeoffs such access will have on the preservation of the currently pristine natural environment of Kaieteur Falls.

Keywords: nature tourism, GIS, Amazonia, national parks

Procedia PDF Downloads 110
110 Interlingual Translation of Manipuri Folktales with the Ideas of André Lefevere's Translation

Authors: Thoudam Jomita Devi

Abstract:

This paper is an attempt to analyze the problems of translating Manipuri folktales into English and the strategies deployed. In Manipuri, folktales are known as Fungawari/Phungawari, which is similar to a western bed time story. The work is with the special reference to folktales of Meetei community. Meetei are the majority ethnic group of Manipur, India. For this paper’s purpose, two folktales Shandrembi Cheisra and Pebet will be chosen for analysis and discussion. The translation of folktales can contribute to intercultural communication and bridge the gap between the generations. Translating Manipuri Folktales is problematic on both cultural and linguistic levels. Therefore, the aim of this analysis is to understand, how the idea of André Lefevere (1992) translation could be implicated in translating Manipuri folktales.

Keywords: cultural, folktales, intercultural, interlingual, translation

Procedia PDF Downloads 158
109 Analysis of Collision Avoidance System

Authors: N. Gayathri Devi, K. Batri

Abstract:

The advent of technology has increased the traffic hazards and the road accidents take place. Collision detection system in automobile aims at reducing or mitigating the severity of an accident. This project aims at avoiding Vehicle head on collision by means of collision detection algorithm. This collision detection algorithm predicts the collision and the avoidance or minimization have to be done within few seconds on confirmation. Under critical situation collision minimization is made possible by turning the vehicle to the desired turn radius so that collision impact can be reduced. In order to avoid the collision completely, the turning of the vehicle should be achieved at reduced speed in order to maintain the stability.

Keywords: collision avoidance system, time to collision, time to turn, turn radius

Procedia PDF Downloads 522
108 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
107 Synthesis, Spectral, Thermal, Optical and Dielectric Studies of Some Organic Arylidene Derivatives

Authors: S. Sathiyamoorthi, P. Srinivasan, K. Suganya Devi

Abstract:

Arylidene derivatives are the subclass of chalcone derivatives. Chalcone derivatives are studied widely for the past decade because of its nonlinearity. To seek new organic group of crystals which suit for fabrication of optical devices, three-member organic arylidene crystals were synthesized by using Claisen–Schmidt condensation reaction. Good quality crystals were grown by slow evaporation method. Functional groups were identified by FT-IR and FT-Raman spectrum. Optical transparency and optical band gap were determined by UV-Vis-IR studies. Thermal stability and melting point were calculated using TGA and DSC. Variation of dielectric loss and dielectric constant with frequency were calculated by dielectric measurement.

Keywords: DSC and TGA studies, nonlinear optic studies, Fourier Transform Infrared Spectroscopy, UV-vis-NIR spectra

Procedia PDF Downloads 271
106 Distributed Multi-Agent Based Approach on Intelligent Transportation Network

Authors: Xiao Yihong, Yu Kexin, Burra Venkata Durga Kumar

Abstract:

With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety.

Keywords: distributed system, artificial intelligence, multi-agent, cooperative intelligent transportation system

Procedia PDF Downloads 178
105 Elastic and Thermal Behaviour of LaX (X= Cd, Hg) Intermetallics: A DFT Study

Authors: Gitanjali Pagare, Hansa Devi, S. P. Sanyal

Abstract:

Full-potential linearized augmented plane wave (FLAPW) method has been employed within the generalized gradient approximation (GGA) and local spin density approximation (LSDA) as the exchange correlation potential to investigate elastic properties of LaX (X = Cd and Hg) in their B2-type (CsCl) crystal structure. The calculated ground state properties such as lattice constant (a0), bulk modulus (B) and pressure derivative of bulk modulus (B') agree well with the available experimental results. The second order elastic constants (C11, C12 and C44) have been calculated. The ductility or brittleness of these intermetallic compounds is predicted by using Pugh’s rule B/GH and Cauchy’s pressure (C12-C44). The calculated results indicate that LaHg is the ductile whereas LaCd is brittle in nature.

Keywords: ductility/brittleness, elastic constants, equation of states, FP-LAPW method, intermetallics

Procedia PDF Downloads 420
104 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life

Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar

Abstract:

In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.

Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home

Procedia PDF Downloads 83
103 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 79
102 Evaluation of the Nutritional Potential of a Developed Spice Formulation for nah poh (An Emulsion-Based Gravy): Physicochemical and Techno-Functional Characterisations

Authors: Djiazet Stève, Mezajoug Kenfack Laurette Blandine, Ravi Pullakhandam, Bethala L. A. Prabhavathi Devi, Tchiegang Clergé, Prathapkumar Halady Shetty

Abstract:

The nutritional potential of a developed spice formulation for nah poh was evaluated. It was found that when spices were used for the formulation for nah poh, the concentration of some nutrients is diluted while that of some of them increases. The proportion of unsaturated fats was estimated to be 76.2% of the total fat content while the chemical score varied between 31 to 39%. The contents of some essential minerals of nutritional interest in mg are as follows for 100g of spice: 2372.474 ± 0.007 for potassium, 16.447 ± 0.010 for iron, 4.772 ± 0.005 for zinc, 0.537 ± 0.001 for cupper, 0.138 ± 0.005 for selenium, and 112.954 ± 0.003 for manganese. This study shows that the consumption of these spices in the form of formulation significantly contributes to meet the mineral requirements of the populations whose food habits regularly require these spices.

Keywords: spice formulation, characterisation, nutritional potential, nah poh, techno functional properties

Procedia PDF Downloads 192
101 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 217
100 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 305
99 A Guide to User-Friendly Bash Prompt: Adding Natural Language Processing Plus Bash Explanation to the Command Interface

Authors: Teh Kean Kheng, Low Soon Yee, Burra Venkata Durga Kumar

Abstract:

In 2022, as the future world becomes increasingly computer-related, more individuals are attempting to study coding for themselves or in school. This is because they have discovered the value of learning code and the benefits it will provide them. But learning coding is difficult for most people. Even senior programmers that have experience for a decade year still need help from the online source while coding. The reason causing this is that coding is not like talking to other people; it has the specific syntax to make the computer understand what we want it to do, so coding will be hard for normal people if they don’t have contact in this field before. Coding is hard. If a user wants to learn bash code with bash prompt, it will be harder because if we look at the bash prompt, we will find that it is just an empty box and waiting for a user to tell the computer what we want to do, if we don’t refer to the internet, we will not know what we can do with the prompt. From here, we can conclude that the bash prompt is not user-friendly for new users who are learning bash code. Our goal in writing this paper is to give an idea to implement a user-friendly Bash prompt in Ubuntu OS using Artificial Intelligent (AI) to lower the threshold of learning in Bash code, to make the user use their own words and concept to write and learn Bash code.

Keywords: user-friendly, bash code, artificial intelligence, threshold, semantic similarity, lexical similarity

Procedia PDF Downloads 90
98 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 55