Search results for: Venkata Ravi Kumar Veluru
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1758

Search results for: Venkata Ravi Kumar Veluru

1728 Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System

Authors: Heng Chia Ying, Charmaine Tan Chai Nie, Burra Venkata Durga Kumar

Abstract:

Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT.

Keywords: round Robin scheduling, priority scheduling, indefinite blocking, process management, sustain, turnaround time

Procedia PDF Downloads 96
1727 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 52
1726 Mechanical Properties and Microstructural Analysis of Al6061-Red Mud Composites

Authors: M. Gangadharappa, M. Ravi Kumar, H. N. Reddappa

Abstract:

The mechanical properties and morphological analysis of Al6061-Red mud particulate composites were investigated. The compositions of the composite include a matrix of Al6061 and the red mud particles of 53-75 micron size as reinforcement ranging from 0% to 12% at an interval of 2%. Stir casting technique was used to fabricate Al6061-Red mud composites. Density measurement, estimation of percentage porosity, tensile properties, fracture toughness, hardness value, impact energy, percentage elongation and percentage reduction in area. Further, the microstructures and SEM examinations were investigated to characterize the composites produced. The result shows that a uniform dispersion of the red mud particles along the grain boundaries of the Al6061 alloy. The tensile strength and hardness values increases with the addition of Red mud particles, but there is a slight decrease in the impact energy values, values of percentage elongation and percentage reduction in area as the reinforcement increases. From these results of investigation, we concluded that the red mud, an industrial waste can be used to enhance the properties of Al6061 alloy for engineering applications.

Keywords: Al6061, red mud, tensile strength, hardness and microstructures

Procedia PDF Downloads 538
1725 Numerical Study on Jatropha Oil Pool Fire Behavior in a Compartment

Authors: Avinash Chaudhary, Akhilesh Gupta, Surendra Kumar, Ravi Kumar

Abstract:

This paper presents the numerical study on Jatropha oil pool fire in a compartment. A fire experiment with jatropha oil was conducted in a compartment of size 4 m x 4 m x m to study the fire development and temperature distribution. Fuel is burned in the center of the compartment in a pool diameter of 0.5 m with an initial fuel depth of 0.045 m. Corner temperature in the compartment, doorway temperature and hot gas layer temperature at various locations are measured. Numerical simulations were carried out using Fire Dynamics Simulator (FDS) software at grid size of 0.05 m, 0.12 m and for performing simulation heat release rate of jatropha oil measured using mass loss method were inputted into FDS. Experimental results shows that like other fuel fires, the whole combustion process can be divided into four stages: initial stage, growth stage, steady profile or developed phase and decay stage. The fire behavior shows two zone profile where upper zone consists of mainly hot gases while lower zone is relatively at colder side. In this study, predicted temperatures from simulation are in good agreement in upper zone of compartment. Near the interface of hot and cold zone, deviations were reported between the simulated and experimental results which is probably due to the difference between the predictions of smoke layer height by FDS. Also, changing the grid size from 0.12 m to 0.05 m does not show any effect in temperatures at upper zone while in lower zone, grid size of 0.05 m showed satisfactory agreement with experimental results. Numerical results showed that calculated temperatures at various locations matched well with the experimental results. On the whole, an effective method is provided with reasonable results to study the burning characteristics of jatropha oil with numerical simulations.

Keywords: jatropha oil, compartment fire, heat release rate, FDS (fire dynamics simulator), numerical simulation

Procedia PDF Downloads 232
1724 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 49
1723 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 91
1722 Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology

Authors: Lin Yunuo, Seow Xing Quan, Burra Venkata Durga Kumar

Abstract:

In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section.

Keywords: cloud computing, cloud operation system, multitenancy, resource allocation, utilization of cloud resources

Procedia PDF Downloads 61
1721 Energy-Aware Scheduling in Real-Time Systems: An Analysis of Fair Share Scheduling and Priority-Driven Preemptive Scheduling

Authors: Su Xiaohan, Jin Chicheng, Liu Yijing, Burra Venkata Durga Kumar

Abstract:

Energy-aware scheduling in real-time systems aims to minimize energy consumption, but issues related to resource reservation and timing constraints remain challenges. This study focuses on analyzing two scheduling algorithms, Fair-Share Scheduling (FFS) and Priority-Driven Preemptive Scheduling (PDPS), for solving these issues and energy-aware scheduling in real-time systems. Based on research on both algorithms and the processes of solving two problems, it can be found that Fair-Share Scheduling ensures fair allocation of resources but needs to improve with an imbalanced system load, and Priority-Driven Preemptive Scheduling prioritizes tasks based on criticality to meet timing constraints through preemption but relies heavily on task prioritization and may not be energy efficient. Therefore, improvements to both algorithms with energy-aware features will be proposed. Future work should focus on developing hybrid scheduling techniques that minimize energy consumption through intelligent task prioritization, resource allocation, and meeting time constraints.

Keywords: energy-aware scheduling, fair-share scheduling, priority-driven preemptive scheduling, real-time systems, optimization, resource reservation, timing constraints

Procedia PDF Downloads 94
1720 Vortex-Induced Vibrations of Two Cylinders in Close Proximity

Authors: Ravi Chaithanya Mysa, Abouzar Kaboudian, Boo Cheong Khoo, Rajeev Kumar Jaiman

Abstract:

The phenomenon of vortex-induced vibration has applications in off-shore industry, power transmission, energy extraction, etc. Two cylinders in crossflow whose centers are displaced in transverse direction are considered in the present work. The effects of the gap distance between the cylinders on the vortex shedding are presented. The inline distance between the cylinder centers is kept at zero. Two setups are considered for the study: first, we assume the two cylinders vibrate as a single rigid body mounted on a spring, and in the other case, each cylinder is mounted on a separate spring with no rigid connection to the other cylinder. The study focuses on the effect of transverse gap on the fluid-structure coupled response of two setups mentioned and corresponding flow contours. Incompressible flow is assumed in the Eulerian framework. The cylinder movement is modeled by a single degree of freedom rigid body motion (translational motion) in the Lagrangian framework. The governing equations were numerically solved by standard Petrov-Galerkin second order finite element schemes.

Keywords: cross-flow, vortex-induced vibrations, cylinder, close proximity

Procedia PDF Downloads 469
1719 Resource Sharing Issues of Distributed Systems Influences on Healthcare Sector Concurrent Environment

Authors: Soo Hong Da, Ng Zheng Yao, Burra Venkata Durga Kumar

Abstract:

The Healthcare sector is a business that consists of providing medical services, manufacturing medical equipment and drugs as well as providing medical insurance to the public. Most of the time, the data stored in the healthcare database is to be related to patient’s information which is required to be accurate when it is accessed by authorized stakeholders. In distributed systems, one important issue is concurrency in the system as it ensures the shared resources to be synchronized and remains consistent through multiple read and write operations by multiple clients. The problems of concurrency in the healthcare sector are who gets the access and how the shared data is synchronized and remains consistent when there are two or more stakeholders attempting to the shared data simultaneously. In this paper, a framework that is beneficial to distributed healthcare sector concurrent environment is proposed. In the proposed framework, four different level nodes of the database, which are national center, regional center, referral center, and local center are explained. Moreover, the frame synchronization is not symmetrical. There are two synchronization techniques, which are complete and partial synchronization operation are explained. Furthermore, when there are multiple clients accessed at the same time, synchronization types are also discussed with cases at different levels and priorities to ensure data is synchronized throughout the processes.

Keywords: resources, healthcare, concurrency, synchronization, stakeholders, database

Procedia PDF Downloads 121
1718 Modeling, Analysis, and Optimization of Process Parameters of Metal Spinning

Authors: B. Ravi Kumar, S. Gajanana, K. Hemachandra Reddy, K. Udayani

Abstract:

Physically into various derived shapes and sizes under the effect of externally applied forces. The spinning process is an advanced plastic working technology and is frequently used for manufacturing axisymmetric shapes. Over the last few decades, Sheet metal spinning has developed significantly and spun products have widely used in various industries. Nowadays the process has been expanded to new horizons in industries, since tendency to use minimum tool and equipment costs and also using lower forces with the output of excellent surface quality and good mechanical properties. The automation of the process is of greater importance, due to its wider applications like decorative household goods, rocket nose cones, gas cylinders, etc. This paper aims to gain insight into the conventional spinning process by employing experimental and numerical methods. The present work proposes an approach for optimizing process parameters are mandrel speed (rpm), roller nose radius (mm), thickness of the sheet (mm). Forming force, surface roughness and strain are the responses.in spinning of Aluminum (2024-T3) using DOE-Response Surface Methodology (RSM) and Analysis of variance (ANOVA). The FEA software is used for modeling and analysis. The process parameters considered in the experimentation.

Keywords: FEA, RSM, process parameters, sheet metal spinning

Procedia PDF Downloads 298
1717 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 113
1716 The Role of Community Forestry to Combat Climate Change Impacts in Nepal

Authors: Ravi Kumar Pandit

Abstract:

Climate change is regarded as one of the most fundamental threats to sustainable livelihood and global development. There is growing a global concern in linking community-managed forests as potential climate change mitigation projects. This study was conducted to explore the local people’s perception on climate change and the role of community forestry (CF) to combat climate change impacts. Two active community forest user groups (CFUGs) from Kaski and Syangja Districts in Nepal were selected as study sites, and various participatory tools were applied to collect primary data. Although most of the respondents were unaware about the words “Climate Change” in study sites, they were quite familiar with the irregularities in rainfall season and other weather extremities. 60% of the respondents had the idea that, due to increase in precipitation, there is a frequent occurrence of erosion, floods and landslide. Around 85% of the people agreed that community forests help in stabilizing soil, reducing the natural hazards like erosion, landslide. Biogas as an alternative source of cooking energy, and changes in crops and their varieties are the common adaptation measures that local people start practicing in both CFUGs in Nepal.

Keywords: climate change, community forestry, global warming, adaptation in Nepal

Procedia PDF Downloads 224
1715 Fractional Order Differentiator Using Chebyshev Polynomials

Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh Kumar Pandey

Abstract:

A discrete time fractional orderdifferentiator has been modeled for estimating the fractional order derivatives of contaminated signal. The proposed approach is based on Chebyshev’s polynomials. We use the Riemann-Liouville fractional order derivative definition for designing the fractional order SG differentiator. In first step we calculate the window weight corresponding to the required fractional order. Then signal is convoluted with this calculated window’s weight for finding the fractional order derivatives of signals. Several signals are considered for evaluating the accuracy of the proposed method.

Keywords: fractional order derivative, chebyshev polynomials, signals, S-G differentiator

Procedia PDF Downloads 619
1714 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 75
1713 Efficiency of Microbial Metabolites on Quality Milk Production in Nili Ravi Breed of Buffalos

Authors: Sajjad Ur Rahman, Muhammad Tahir, Mukarram Bashir, Jawad, Aoun Muhammad, Muhammad Zohaib, Hannan Khan, Seemal Javaid, Mariam Azam

Abstract:

The efficiency of natural metabolites obtained from partially fermented soya hulls and wheat bran using Saccharomyces cerevisiae (DL-22 S/N) ensures a potential impact on the total milk yield and quality of milk production. On attaining a moderate number of Saccharomyces cerevisiae cells around 1×10⁹ CFU/ml, the concentrate was further elevated under in-vivo conditions to study the quality of milk production in lactating buffalo. Ten lactating buffalos of the Nili Ravi breed having the same physical factors were given 12 gm of microbial metabolites daily, along with the palleted feed having 22 % proteins. Another group of 10 lactating animals with the same characteristics was maintained without metabolites. The body score, overall health, incidence of mastitis, milk fat, milk proteins, ash and solid not fat (SNF) were elevated on a weekly basis up to thirty days of trial. It was recorded that the average total increase in quality milk production was 0.9 liter/h/d, whereas SNF in the milk was enhanced to 0.71, and fats were decreased to 0.09 %. Moreover, during all periods of the trial, the overall non-specific immunity of buffalo was increased, as indicated by less than 0.2 % of mastitis incidence compared to 1.8% in the untreated buffalos.

Keywords: natural metabolites, quality milk, milk yield, microorganisms, fermentation, nonspecific immunity, better performing animals

Procedia PDF Downloads 51
1712 Effects of Viscous and Pressure Forces in Vortex and Wake Induced Vibrations

Authors: Ravi Chaithanya Mysa, Abouzar Kaboudian, Boo Cheong Khoo, Rajeev Kumar Jaiman

Abstract:

Cross-flow vortex-induced vibrations of a circular cylinder are compared with the wake-induced oscillations of the downstream cylinder of a tandem cylinder arrangement. It is known that the synchronization of the frequency of vortex shedding with the natural frequency of the structure leads to large amplitude motions. In the case of tandem cylinders, the large amplitudes of the downstream cylinder found are compared to single cylinder setup. In this work, in the tandem arrangement, the upstream cylinder is fixed and the downstream cylinder is free to oscillate in transverse direction. We show that the wake from the upstream cylinder interacts with the downstream cylinder which influences the response of the coupled system. Extensive numerical experiments have been performed on single cylinder as well as tandem cylinder arrangements in cross-flow. Here, the wake interactions in connection to the forces generated are systematically studied. The ratio of the viscous loads to the pressure loads is found to play a major role in the displacement response of the single and tandem cylinder arrangements, as the viscous forces dissipate the energy.

Keywords: circular cylinder, vortex-shedding, VIV, wake-induced, vibrations

Procedia PDF Downloads 336
1711 On the Effects of External Cross-Flow Excitation Forces on the Vortex-Induced-Vibrations of an Oscillating Cylinder

Authors: Abouzar Kaboudian, Ravi Chaithanya Mysa, Boo Cheong Khoo, Rajeev Kumar Jaiman

Abstract:

Vortex induced vibrations can significantly affect the effectiveness of structures in aerospace as well as offshore marine industries. The oscillatory nature of the forces resulting from the vortex shedding around bluff bodies can result in undesirable effects such as increased loading, stresses, deflections, vibrations and noise in the structures, and also reduced fatigue life of the structures. To date, most studies concentrate on either the free oscillations or the prescribed motion of the bluff bodies. However, the structures in operation are usually subject to the external oscillatory forces (e.g. due to the platform motions in offshore industries). In this work, we present the effects of the external cross-flow forces on the vortex-induced vibrations of an oscillating cylinder. The effects of the amplitude, as well as the frequency of the external force on the fluid-forces on the oscillating cylinder are carefully studied and presented. Moreover, we present the transition of the response to be dominated by the vortex-induced-vibrations to the range where it is mostly dictated by the external oscillatory forces. Furthermore, we will discuss how the external forces can affect the flow structures around a cylinder. All results are compared against free oscillations of the cylinder.

Keywords: circular cylinder, external force, vortex-shedding, VIV

Procedia PDF Downloads 343
1710 Performance Comparison of Reactive, Proactive and Hybrid Routing Protocols in Wireless Ad Hoc Networks

Authors: Kumar Manoj, Ramesh Kumar, Kumari Arti, Kumar Prashant

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper we compare AODV, DSDV, DSR and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyses these routing protocols by extensive simulations in OPNET simulator and show that how pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, data traffic sent, throughput, retransmission attempts.

Keywords: MANET, AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 635
1709 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 79
1708 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning

Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar

Abstract:

As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.

Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence

Procedia PDF Downloads 82
1707 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 80
1706 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 157
1705 Impact of Agricultural Waste Utilization and Management on the Environment

Authors: Ravi Kumar

Abstract:

Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.

Keywords: agricultural waste, utilization, management, environment, health

Procedia PDF Downloads 61
1704 On the Effects of the Frequency and Amplitude of Sinusoidal External Cross-Flow Excitation Forces on the Vortex-Induced-Vibrations of an Oscillating Cylinder

Authors: Abouzar Kaboudian, Ravi Chaithanya Mysa, Boo Cheong Khoo, Rajeev Kumar Jaiman

Abstract:

Vortex induced vibrations can significantly affect the effectiveness of structures in aerospace as well as offshore marine industries. The oscillatory nature of the forces resulting from the vortex shedding around bluff bodies can result in undesirable effects such as increased loading, stresses, deflections, vibrations and noise in the structures, and also reduced fatigue life of the structures. To date, most studies concentrate on either the free oscillations or the prescribed motion of the bluff bodies. However, the structures in operation are usually subject to the external oscillatory forces (e.g. due to the platform motions in offshore industries). Periodic forces can be considered as a combinations of sinusoids. In this work, we present the effects of sinusoidal external cross-flow forces on the vortex-induced vibrations of an oscillating cylinder. The effects of the amplitude, as well as the frequency of these sinusoidal external force on the fluid-forces on the oscillating cylinder are carefully studied and presented. Moreover, we present the transition of the response to be dominated by the vortex-induced-vibrations to the range where it is mostly dictated by the external oscillatory forces. Furthermore, we will discuss how the external forces can affect the flow structures around a cylinder. All results are compared against free oscillations of the cylinder.

Keywords: circular cylinder, external force, vortex-shedding, VIV

Procedia PDF Downloads 329
1703 Fish Scales as a Nonlethal Screening Tools for Assessing the Effects of Surface Water Contaminants in Cyprinus Carpio

Authors: Shahid Mahboob, Hafiz Muhammad Ashraf, Salma Sultana, Tayyaba Sultana, Khalid Al-Ghanim, Fahid Al-Misned, Zubair Ahmedd

Abstract:

There is an increasing need for an effective tool to estimate the risks derived from the large number of pollutants released to the environment by human activities. Typical screening procedures are highly invasive or lethal to the fish. Recent studies show that fish scales biochemically respond to a range of contaminants, including toxic metals, organic compounds, and endocrine disruptors. The present study evaluated the effects of the surface water contaminants on Cyprinus carpio in the Ravi River by comparing DNA extracted non-lethally from their scales to DNA extracted from the scales of fish collected from a controlled fish farm. A single, random sampling was conducted. Fish were broadly categorised into three weight categories (W1, W2 and W3). The experimental samples in the W1, W2 and W3 categories had an average DNA concentration (µg/µl) that was lower than the control samples. All control samples had a single DNA band; whereas the experimental samples in W1 fish had 1 to 2 bands, the experimental samples in W2 fish had two bands and the experimental samples in W3 fish had fragmentation in the form of three bands. These bands exhibit the effects of pollution on fish in the Ravi River. On the basis findings of this study, we propose that fish scales can be successfully employed as a new non-lethal tool for the evaluation of the effect of surface water contaminants.

Keywords: fish scales, Cyprinus carpio, heavy metals, non-invasive, DNA fragmentation

Procedia PDF Downloads 363
1702 Development of a Sustainable Municipal Solid Waste Management for an Urban Area: Case Study from a Developing Country

Authors: Anil Kumar Gupta, Dronadula Venkata Sai Praneeth, Brajesh Dubey, Arundhuti Devi, Suravi Kalita, Khanindra Sharma

Abstract:

Increase in urbanization and industrialization have led to improve in the standard of living. However, at the same time, the challenges due to improper solid waste management are also increasing. Municipal Solid Waste management is considered as a vital step in the development of urban infrastructure. The present study focuses on developing a solid waste management plan for an urban area in a developing country. The current scenario of solid waste management practices at various urban bodies in India is summarized. Guwahati city in the northeastern part of the country and is also one of the targeted smart cities (under the governments Smart Cities program) was chosen as case study to develop and implement the solid waste management plan. The whole city was divided into various divisions and waste samples were collected according to American Society for Testing and Materials (ASTM) - D5231-92 - 2016 for each division in the city and a composite sample prepared to represent the waste from the entire city. The solid waste characterization in terms of physical and chemical which includes mainly proximate and ultimate analysis were carried out. Existing primary and secondary collection systems were studied and possibilities of enhancing the collection systems were discussed. The composition of solid waste for the overall city was found to be as: organic matters 38%, plastic 27%, paper + cardboard 15%, Textile 9%, inert 7% and others 4%. During the conference presentation, further characterization results in terms of Thermal gravimetric analysis (TGA), pH and water holding capacity will be discussed. The waste management options optimizing activities such as recycling, recovery, reuse and reduce will be presented and discussed.

Keywords: proximate, recycling, thermal gravimetric analysis (TGA), solid waste management

Procedia PDF Downloads 151
1701 Investigation of Delivery of Triple Play Service in GE-PON Fiber to the Home Network

Authors: Anurag Sharma, Dinesh Kumar, Rahul Malhotra, Manoj Kumar

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 702
1700 A Problem in Microstretch Thermoelastic Diffusive Medium

Authors: Devinder Singh, Arvind Kumar, Rajneesh Kumar

Abstract:

The general solution of the equations for a homogeneous isotropic microstretch thermo elastic medium with mass diffusion for two dimensional problems is obtained due to normal and tangential forces. The integral transform technique is used to obtain the components of displacements, microrotation, stress and mass concentration, temperature change and mass concentration. A particular case of interest is deduced from the present investigation.

Keywords: normal force, tangential force, microstretch, thermoelastic, the integral transform technique, deforming force, microstress force, boundary value problem

Procedia PDF Downloads 589
1699 Practical Aspects Pertaining to the Selection of Size and Location of Source Substations in an Oil Field

Authors: Yadavalli Venkata Sridhar

Abstract:

Finalization of Substation sizing and location is an important task to be carried out by electrical designers in an oil field. Practical issues influence the selection of size and location of the source substations that feed multiple production facilities are listed. Importance of selection of appropriately rated short circuit level for 11KV switchboards and constraints pertaining to availability of manufacturers are highlighted. Without being lost in the research of absolute optimum solution, under time constraints, the importance of practical approach is brought out. Focus on identifying near optimum solutions by process of elimination of unfeasible substation locations with the support of cost figures, is emphasized through a case study.

Keywords: substation, size, location, oil field

Procedia PDF Downloads 635