Search results for: Yadavalli Venkata Sridhar
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 93

Search results for: Yadavalli Venkata Sridhar

93 Practical Aspects Pertaining to the Selection of Size and Location of Source Substations in an Oil Field

Authors: Yadavalli Venkata Sridhar

Abstract:

Finalization of Substation sizing and location is an important task to be carried out by electrical designers in an oil field. Practical issues influence the selection of size and location of the source substations that feed multiple production facilities are listed. Importance of selection of appropriately rated short circuit level for 11KV switchboards and constraints pertaining to availability of manufacturers are highlighted. Without being lost in the research of absolute optimum solution, under time constraints, the importance of practical approach is brought out. Focus on identifying near optimum solutions by process of elimination of unfeasible substation locations with the support of cost figures, is emphasized through a case study.

Keywords: substation, size, location, oil field

Procedia PDF Downloads 633
92 Uncommon Causes of Acute Abdominal Pain: A Pictorial Essay

Authors: Mahesh Hariharan, Rajan Balasubramaniam, Sharath Kumar Shetty, Shanthala Yadavalli, Mohammed Ahetasham, Sravya Devarapalli

Abstract:

Acute abdomen is one of the most common clinical conditions requiring a radiological investigation. Ultrasound is the primary modality of choice which can diagnose some of the common causes of acute abdomen. However, sometimes the underlying cause for the pain is far more complicated than expected to mandate a high degree of suspicion to suggest further investigation with contrast-enhanced computed tomography or magnetic resonance imaging. Here, we have compiled a comprehensive series of selected cases to highlight the conditions which can be easily overlooked unless carefully sought for. This also emphasizes the importance of multimodality approach to arrive at the final diagnosis with an increased overall diagnostic accuracy which in turn improves patient management and prognosis.

Keywords: acute abdomen, contrast-enhanced computed tomography scan, magnetic resonance imaging, plain radiographs, ultrasound

Procedia PDF Downloads 320
91 Behaviour of Rc Column under Biaxial Cyclic Loading-State of the Art

Authors: L. Pavithra, R. Sharmila, Shivani Sridhar

Abstract:

Columns severe structural damage needs proportioning a significant portion of earthquake energy can be dissipated yielding in the beams. Presence of axial load along with cyclic loading has a significant influence on column. The objective of this paper is to present the analytical results of columns subjected to biaxial cyclic loading.

Keywords: RC column, Seismic behaviour, cyclic behaviour, biaxial testing, ductile behaviour

Procedia PDF Downloads 323
90 Lacunarity measures on Mammographic Image Applying Fractal Dimension and Lacunarity Measures

Authors: S. Sushma, S. Balasubramanian, K. C. Latha, R. Sridhar

Abstract:

Structural texture measures are used to address the aspect of breast cancer risk assessment in screening mammograms. The current study investigates whether texture properties characterized by local Fractal Dimension (FD) and lacunarity contribute to assess breast cancer risk. Fractal Dimension represents the complexity while the lacunarity characterize the gap of a fractal dimension. In this paper, we present our result confirming that the lacunarity value resulted in algorithm using mammogram images states that level of lacunarity will be low when the Fractal Dimension value will be high.

Keywords: breast cancer, fractal dimension, image analysis, lacunarity, mammogram

Procedia PDF Downloads 350
89 Database Management System for Orphanages to Help Track of Orphans

Authors: Srivatsav Sanjay Sridhar, Asvitha Raja, Prathit Kalra, Soni Gupta

Abstract:

Database management is a system that keeps track of details about a person in an organisation. Not a lot of orphanages these days are shifting to a computer and program-based system, but unfortunately, most have only pen and paper-based records, which not only consumes space but it is also not eco-friendly. It comes as a hassle when one has to view a record of a person as they have to search through multiple records, and it will consume time. This program will organise all the data and can pull out any information about anyone whose data is entered. This is also a safe way of storage as physical data gets degraded over time or, worse, destroyed due to natural disasters. In this developing world, it is only smart enough to shift all data to an electronic-based storage system. The program comes with all features, including creating, inserting, searching, and deleting the data, as well as printing them.

Keywords: database, orphans, programming, C⁺⁺

Procedia PDF Downloads 109
88 A Study on Unix Process Crash Based on Efficient Process Management Method

Authors: Guo Haonan, Chen Peiyu, Zhao Hanyu, Burra Venkata Durga Kumar

Abstract:

Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions.

Keywords: process management, daemon, login-bash and non-login bash, process group

Procedia PDF Downloads 99
87 Identifying Physiological Markers That Are Sensitive to Cognitive Load in Preschoolers

Authors: Priyashri Kamlesh Sridhar, Suranga Nanayakkara

Abstract:

Current frameworks in assessment follow lesson delivery and rely heavily on test performance or teacher’s observations. This, however, neglects the underlying cognitive load during the learning process. Identifying the pivotal points when the load occurs helps design effective pedagogies and tools that respond to learners’ cognitive state. There has been limited research on quantifying cognitive load in preschoolers, real-time. In this study, we recorded electrodermal activity and heart rate variability (HRV) from 10 kindergarteners performing executive function tasks and Johnson Woodcock test of cognitive abilities. Preliminary findings suggest that there are indeed sensitive task-dependent markers in skin conductance (number of SCRs and average amplitude of SCRs) and HRV (mean heart rate and low frequency component) captured during the learning process.

Keywords: early childhood, learning, methodologies, pedagogies

Procedia PDF Downloads 295
86 Minimization of Switching Losses in Cascaded Multilevel Inverters Using Efficient Sequential Switching Hybrid-Modulation Techniques

Authors: P. Satish Kumar, K. Ramakrishna, Ch. Lokeshwar Reddy, G. Sridhar

Abstract:

This paper presents two different sequential switching hybrid-modulation strategies and implemented for cascaded multilevel inverters. Hybrid modulation strategies represent the combinations of Fundamental-Frequency Pulse Width Modulation (FFPWM) and Multilevel Sinusoidal-Modulation (MSPWM) strategies, and are designed for performance of the well-known Alternative Phase Opposition Disposition (APOD), Phase Shifted Carrier (PSC). The main characteristics of these modulations are the reduction of switching losses with good harmonic performance, balanced power loss dissipation among the devices with in a cell, and among the series-connected cells. The feasibility of these modulations is verified through spectral analysis, power loss analysis and simulation.

Keywords: cascaded multilevel inverters, hybrid modulation, power loss analysis, pulse width modulation

Procedia PDF Downloads 507
85 Automatic API Regression Analyzer and Executor

Authors: Praveena Sridhar, Nihar Devathi, Parikshit Chakraborty

Abstract:

As the software product changes versions across releases, there are changes to the API’s and features and the upgrades become necessary. Hence, it becomes imperative to get the impact of upgrading the dependent components. This tool finds out API changes across two versions and their impact on other API’s followed by execution of the automated regression suites relevant to updates and their impacted areas. This tool has 4 layer architecture, each layer with its own unique pre-assigned capability which it does and sends the required information to next layer. This are the 4 layers. 1) Comparator: Compares the two versions of API. 2) Analyzer: Analyses the API doc and gives the modified class and its dependencies along with implemented interface details. 3) Impact Filter: Find the impact of the modified class on the other API methods. 4) Auto Executer: Based on the output given by Impact Filter, Executor will run the API regression Suite. Tool reads the java doc and extracts the required information of classes, interfaces and enumerations. The extracted information is saved into a data structure which shows the class details and its dependencies along with interfaces and enumerations that are listed in the java doc.

Keywords: automation impact regression, java doc, executor, analyzer, layers

Procedia PDF Downloads 457
84 Effect of Design Parameters on Porpoising Instability of a High Speed Planing Craft

Authors: Lokeswara Rao P., Naga Venkata Rakesh N., V. Anantha Subramanian

Abstract:

It is important to estimate, predict, and avoid the dynamic instability of high speed planing crafts. It is known that design parameters like relative location of center of gravity with respect to the dynamic lift centre and length to beam ratio of the craft have influence on the tendency to porpoise. This paper analyzes the hydrodynamic performance on the basis of the semi-empirical Savitsky method and also estimates the same by numerical simulations based on Reynolds Averaged Navier Stokes (RANS) equations using a commercial code namely, STAR- CCM+. The paper examines through the same numerical simulation considering dynamic equilibrium, the changing running trim, which results in porpoising. Some interesting results emerge from the study and this leads to early detection of the instability.

Keywords: CFD, planing hull, porpoising, Savitsky method

Procedia PDF Downloads 151
83 Utilization of Fly Ash as Backfilling Material in Indian Coal Mines

Authors: P. Venkata Karthik, B. Kranthi Kumar

Abstract:

Fly ash is a solid waste product of coal based electric power generating plants. Fly ash is the finest of coal ash particles and it is transported from the combustion chamber by exhaust gases. Fly ash is removed by particulate emission control devices such as electrostatic precipitators or filter fabric bag-houses. It is a fine material with spherical particles. Large quantities of fly ash discharged from coal-fired power stations are a major problem not only in terms of scarcity of land available for its disposal, but also in environmental aspects. Fly ash can be one of the alternatives and can be a viable option to use as a filling material. This paper contains the problems associated with fly ash generation, need for its management and the efficacy of fly ash composite as a backfilling material. By conducting suitable geotechnical investigations and numerical modelling techniques, the fly ash composite material was tested. It also contains case studies of typical Indian opencast and underground coal mines.

Keywords: backfilling, fly ash, high concentration slurry disposal, power plant, void infilling

Procedia PDF Downloads 225
82 A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology

Authors: Kang Zijian, Zhang Tingyu, Burra Venkata Durga Kumar

Abstract:

This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem.

Keywords: virtual machine, pre-copy technology, memory migration process, downtime, dirty pages migration method

Procedia PDF Downloads 87
81 Material Properties Evolution Affecting Demisability for Space Debris Mitigation

Authors: Chetan Mahawar, Sarath Chandran, Sridhar Panigrahi, V. P. Shaji

Abstract:

The ever-growing advancement in space exploration has led to an alarming concern for space debris removal as it restricts further launch operations and adventurous space missions; hence numerous studies have come up with technologies for re-entry predictions and material selection processes for mitigating space debris. The selection of material and operating conditions is determined with the objective of lightweight structure and ability to demise faster subject to spacecraft survivability during its mission. Since the demisability of spacecraft depends on evolving thermal material properties such as emissivity, specific heat capacity, thermal conductivity, radiation intensity, etc. Therefore, this paper presents the analysis of evolving thermal material properties of spacecraft, which affect the demisability process and thus estimate demise time using the demisability model by incorporating evolving thermal properties for sensible heating followed by the complete or partial break-up of spacecraft. The demisability analysis thus concludes the best suitable spacecraft material is based on the least estimated demise time, which fulfills the criteria of design-for-survivability and as well as of design-for-demisability.

Keywords: demisability, emissivity, lightweight, re-entry, survivability

Procedia PDF Downloads 82
80 Understanding the Qualities of Indian Neighborhoods: Understanding of Social Spaces

Authors: Venkata Ravi Kumar Veluru

Abstract:

Indian traditional neighborhoods are socially active and sometimes intrusive communities, which are losing their qualities due to western influences, undermining the traditional Indian values by blind adaptation of western neighborhood concepts since the scale is not suitable to the Indian context. This paper aims to understand the qualities of Indian traditional neighborhoods by evaluating a traditional neighborhood of Jaipur, comparing it with a modern planned neighborhood of Chandigarh, designed by a foreign planner, in the neighborhood concept of the western world, to find out the special qualities of traditional Indian neighborhoods as compared to western concepts in terms of social spaces, by way of physical observation of selected neighborhoods and residents structured questionnaire survey. The combined analysis found that social spaces are abundantly available in traditional neighborhoods, which are missing in modern neighborhoods, which are the main qualities where interactions happen, aiming towards the formation of social capital. The qualities of traditional neighborhoods have to be considered while designing new neighborhoods in India.

Keywords: Indian neighborhoods, modern neighborhoods, neighborhood planning, social spaces, traditional neighborhoods

Procedia PDF Downloads 84
79 Inverse Mode Shape Problem of Hand-Arm Vibration (Humerus Bone) for Bio-Dynamic Response Using Varying Boundary Conditions

Authors: Ajay R, Rammohan B, Sridhar K S S, Gurusharan N

Abstract:

The objective of the work is to develop a numerical method to solve the inverse mode shape problem by determining the cross-sectional area of a structure for the desired mode shape via the vibration response study of the humerus bone, which is in the form of a cantilever beam with anisotropic material properties. The humerus bone is the long bone in the arm that connects the shoulder to the elbow. The mode shape is assumed to be a higher-order polynomial satisfying a prescribed set of boundary conditions to converge the numerical algorithm. The natural frequency and the mode shapes are calculated for different boundary conditions to find the cross-sectional area of humerus bone from Eigenmode shape with the aid of the inverse mode shape algorithm. The cross-sectional area of humerus bone validates the mode shapes of specific boundary conditions. The numerical method to solve the inverse mode shape problem is validated in the biomedical application by finding the cross-sectional area of a humerus bone in the human arm.

Keywords: Cross-sectional area, Humerus bone, Inverse mode shape problem, Mode shape

Procedia PDF Downloads 89
78 Communication Apprehension among College Students in United Arab Emirates: A Case Study of Undergraduate Students of Abu Dhabi University

Authors: Nunna Venkata Prasad, Maryam Amoke Folarin, Muhammad Ali Shaukat Sham

Abstract:

A quantitative investigation was conducted to explore the communication apprehension among undergraduate students of Abu Dhabi University. Communication apprehension (CA) is an individual’s level of fear or anxiety associated with either real or anticipated communication with another person or persons. All individuals experience some level of communication apprehension. A total of 100 participants selected through a stratified sampling method, which includes 50 males and 50 females participated in the study. The research was conducted by distributing the personal report of communication apprehension questionnaire, randomly amongst these students. Results were affirmative with previous researches conducted. Demographics, age, or college year did not make any significant differences amongst the undergraduate students. More students were found to have high CA with public speaking rather than other scenarios. And lesser students were found to have high CA level with one-on-one conversations although a significant number of them still tested to have high CA with interpersonal communications.

Keywords: communication apprehension, interpersonal communication, oral communication, public speaking

Procedia PDF Downloads 151
77 A Witty Relief Ailment Based on the Integration of IoT and Cloud

Authors: Sai Shruthi Sridhar, A. Madhumidha, Kreethika Guru, Priyanka Sekar, Ananthi Malayappan

Abstract:

Numerous changes in technology and its recent development are structuring long withstanding effect to our world, one among them is the emergence of “Internet of Things” (IoT). Similar to Technology world, one industry stands out in everyday life–healthcare. Attention to “quality of health care” is an increasingly important issue in a global economy and for every individual. As per WHO (World Health Organization) it is estimated to be less than 50% adhere to the medication provided and only about 20% get their medicine on time. Medication adherence is one of the top problems in healthcare which is fixable by use of technology. In recent past, there were minor provisions for elderly and specially-skilled to get motivated and to adhere medicines prescribed. This paper proposes a novel solution that uses IOT based RFID Medication Reminder Solution to provide personal health care services. This employs real time tracking which offer quick counter measures. The proposed solution builds on the recent digital advances in sensor technologies, smart phones and cloud services. This novel solution is easily adoptable and can benefit millions of people with a direct impact on the nation’s health care expenditure with innovative scenarios and pervasive connectivity.

Keywords: cloud services, IoT, RFID, sensors

Procedia PDF Downloads 312
76 Numerical Analysis on Triceratops Restraining System: Failure Conditions of Tethers

Authors: Srinivasan Chandrasekaran, Manda Hari Venkata Ramachandra Rao

Abstract:

Increase in the oil and gas exploration in ultra deep-water demands an adaptive structural form of the platform. Triceratops has superior motion characteristics compared to that of the Tension Leg Platform and Single Point Anchor Reservoir platforms, which is well established in the literature. Buoyant legs that support the deck are position-restrained to the sea bed using tethers with high axial pretension. Environmental forces that act on the platform induce dynamic tension variations in the tethers, causing the failure of tethers. The present study investigates the dynamic response behavior of the restraining system of the platform under the failure of a single tether of each buoyant leg in high sea states. Using the rain-flow counting algorithm and the Goodman diagram, fatigue damage caused to the tethers is estimated, and the fatigue life is predicted. Results shows that under failure conditions, the fatigue life of the remaining tethers is quite alarmingly low.

Keywords: fatigue life, pm spectrum, rain flow counting, triceratops, failure analysis

Procedia PDF Downloads 107
75 Comparison of Dynamic Characteristics of Railway Bridge Spans to Know the Health of Elastomeric Bearings Using Tri Axial Accelerometer Sensors

Authors: Narayanakumar Somasundaram, Venkat Nihit Chirivella, Venkata Dilip Kumar Pasupuleti

Abstract:

Ajakool, India, has a multi-span bridge that is constructed for rail transport with a maximum operating speed of 100 km/hr. It is a standard RDSO design of a PSC box girder carrying a single railway track. The Structural Health Monitoring System (SHM) is designed and installed to compare and analyze the vibrations and displacements on the bridge due to different live loads from moving trains. The study is conducted for three different spans of the same bridge to understand the health of the elastomeric bearings. Also, to validate the same, a three-dimensional finite element model is developed, and modal analysis is carried out. The proposed methodology can help in detecting deteriorated elastomeric bearings using only wireless tri-accelerometer sensors. Detailed analysis and results are presented in terms of mode shapes, accelerations, displacements, and their importance to each other. This can be implemented with a lot of ease and can be more accurate.

Keywords: dynamic effects, vibration analysis, accelerometer sensors, finite element analysis, structural health monitoring, elastomeric bearing

Procedia PDF Downloads 105
74 Optimized Parameters for Simultaneous Detection of Cd²⁺, Pb²⁺ and CO²⁺ Ions in Water Using Square Wave Voltammetry on the Unmodified Glassy Carbon Electrode

Authors: K. Sruthi, Sai Snehitha Yadavalli, Swathi Gosh Acharyya

Abstract:

Water is the most crucial element for sustaining life on earth. Increasing water pollution directly or indirectly leads to harmful effects on human life. Most of the heavy metal ions are harmful in their cationic form. These heavy metal ions are released by various activities like disposing of batteries, industrial wastes, automobile emissions, and soil contamination. Ions like (Pb, Co, Cd) are carcinogenic and show many harmful effects when consumed more than certain limits proposed by WHO. The simultaneous detection of the heavy metal ions (Pb, Co, Cd), which are highly toxic, is reported in this study. There are many analytical methods for quantifying, but electrochemical techniques are given high priority because of their sensitivity and ability to detect and recognize lower concentrations. Square wave voltammetry was preferred in electrochemical methods due to the absence of background currents which is interference. Square wave voltammetry was performed on GCE for the quantitative detection of ions. Three electrode system consisting of a glassy carbon electrode as the working electrode (3 mm diameter), Ag/Agcl electrode as the reference electrode, and a platinum wire as the counter electrode was chosen for experimentation. The mechanism of detection was done by optimizing the experimental parameters, namely pH, scan rate, and temperature. Under the optimized conditions, square wave voltammetry was performed for simultaneous detection. Scan rates were varied from 5 mV/s to 100 mV/s and found that at 25 mV/s all the three ions were detected simultaneously with proper peaks at particular stripping potential. The variation of pH from 3 to 8 was done where the optimized pH was taken as pH 5 which holds good for three ions. There was a decreasing trend at starting because of hydrogen gas evolution, and after pH 5 again there was a decreasing trend that is because of hydroxide formation on the surface of the working electrode (GCE). The temperature variation from 25˚C to 45˚C was done where the optimum temperature concerning three ions was taken as 35˚C. Deposition and stripping potentials were given as +1.5 V and -1.5 V, and the resting time of 150 seconds was given. Three ions were detected at stripping potentials of Cd²⁺ at -0.84 V, Pb²⁺ at -0.54 V, and Co²⁺ at -0.44 V. The parameters of detection were optimized on a glassy carbon electrode for simultaneous detection of the ions at lower concentrations by square wave voltammetry.

Keywords: cadmium, cobalt, lead, glassy carbon electrode, square wave anodic stripping voltammetry

Procedia PDF Downloads 72
73 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 70
72 Hybrid PWM Techniques for the Reduction of Switching Losses and Voltage Harmonics in Cascaded Multilevel Inverters

Authors: Venkata Reddy Kota

Abstract:

These days, the industrial trend is moving away from heavy and bulky passive components to power converter systems that use more and more semiconductor elements. Also, it is difficult to connect the traditional converters to the high and medium voltage. For these reasons, a new family of multilevel inverters has appeared as a solution for working with higher voltage levels. Different modulation topologies like Sinusoidal Pulse Width Modulation (SPWM), Selective Harmonic Elimination Pulse Width Modulation (SHE-PWM) are available for multilevel inverters. In this work, different hybrid modulation techniques which are combination of fundamental frequency modulation and multilevel sinusoidal-modulation are compared. The main characteristic of these modulations are reduction of switching losses with good harmonic performance and balanced power loss dissipation among the device. The proposed hybrid modulation schemes are developed and simulated in Matlab/Simulink for cascaded H-bridge inverter. The results validate the applicability of the proposed schemes for cascaded multilevel inverter.

Keywords: hybrid PWM techniques, cascaded multilevel inverters, switching loss minimization

Procedia PDF Downloads 583
71 Distributed Multi-Agent Based Approach on Intelligent Transportation Network

Authors: Xiao Yihong, Yu Kexin, Burra Venkata Durga Kumar

Abstract:

With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety.

Keywords: distributed system, artificial intelligence, multi-agent, cooperative intelligent transportation system

Procedia PDF Downloads 174
70 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life

Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar

Abstract:

In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.

Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home

Procedia PDF Downloads 81
69 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 75
68 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 329
67 Breast Cancer Risk is Predicted Using Fuzzy Logic in MATLAB Environment

Authors: S. Valarmathi, P. B. Harathi, R. Sridhar, S. Balasubramanian

Abstract:

Machine learning tools in medical diagnosis is increasing due to the improved effectiveness of classification and recognition systems to help medical experts in diagnosing breast cancer. In this study, ID3 chooses the splitting attribute with the highest gain in information, where gain is defined as the difference between before the split versus after the split. It is applied for age, location, taluk, stage, year, period, martial status, treatment, heredity, sex, and habitat against Very Serious (VS), Very Serious Moderate (VSM), Serious (S) and Not Serious (NS) to calculate the gain of information. The ranked histogram gives the gain of each field for the breast cancer data. The doctors use TNM staging which will decide the risk level of the breast cancer and play an important decision making field in fuzzy logic for perception based measurement. Spatial risk area (taluk) of the breast cancer is calculated. Result clearly states that Coimbatore (North and South) was found to be risk region to the breast cancer than other areas at 20% criteria. Weighted value of taluk was compared with criterion value and integrated with Map Object to visualize the results. ID3 algorithm shows the high breast cancer risk regions in the study area. The study has outlined, discussed and resolved the algorithms, techniques / methods adopted through soft computing methodology like ID3 algorithm for prognostic decision making in the seriousness of the breast cancer.

Keywords: ID3 algorithm, breast cancer, fuzzy logic, MATLAB

Procedia PDF Downloads 492
66 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 73
65 Simultaneous Electrochemical Detection of Chromium(III), Arsenic(III), and Mercury (II) In Water Using Anodic Stripping Voltammetry

Authors: V. Sai Geethika, Sai Snehitha Yadavalli, Swati Ghosh Acharyya

Abstract:

This study involves a single element and simultaneous electrochemical detection of heavy metal ions through square wave anodic stripping voltammetry. A glassy carbon electrode was used to detect and quantify heavy metals such as As(III), Hg(II), Cr(VI) ions in water. Under optimized conditions, peak separation was obtained by varying concentrations, scan rates, and temperatures. As (III), Hg (II), Cr (III) were simultaneously detected with GCE. Several analytical methods, such as inductively coupled plasma mass spectroscopy (ICP-MS), atomic absorption spectroscopy (AAS), were used previously to detect heavy metal ions, which are authentic but are not good enough for online monitoring due to the bulkiness of the equipment. The study provides a good alternative that is simple, more efficient, and low-cost, involving a portable potentiostat. Heavy metals having different oxidation states can be detected by anodic stripping voltammetry. This method can be easily integrated with electronics. Square wave Anodic stripping voltammetry is used with a potential range of -2.5 V – 2.5 V for single ion detection by a three-electrode cell consisting of silver/silver chloride(Ag/AgCl) as reference and platinum (Pt) counter and glassy carbon (GCE) working electrodes. All three ions are optimized by varying the parameters like concentration, scan rate, pH, temperature, and all these optimized parameters were used for studying the effects of simultaneous detection. The procedure involves preparing an electrolyte using deionized water, cleaning the surface of GCE, depositing the ions by applying the redox potentials obtained from cyclic voltammetry (CV), and then detecting by applying oxidizing potential, i.e., stripping voltage. So this includes ASV techniques such as open-circuit voltage (OCV), chronoamperometry (CA), and square wave voltammetry (SWV). Firstly, the concentration of the ions varied from 50 ppb to 5000 ppb, and an optimum concentration was determined where the three ions were detected. A concentration of 400 ppb was used while varying the temperatures in the range of 25°C – 45°C. Optimum peak intensity was obtained at a temperature of 30°C with a low scan rate of 0.005 V-s⁻¹. All the parameters were optimized, and several effects have been noticed while three ions As(II), Cr(III), Hg(II) were detected alone and simultaneously.

Keywords: Arsenic(III), Chromium(III), glassy carbon electrode, Mercury (II), square wave anodic stripping voltammetry

Procedia PDF Downloads 56
64 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 214