CINXE.COM
Search results for: Venkata Dilip Kumar Pasupuleti
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Venkata Dilip Kumar Pasupuleti</title> <meta name="description" content="Search results for: Venkata Dilip Kumar Pasupuleti"> <meta name="keywords" content="Venkata Dilip Kumar Pasupuleti"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Venkata Dilip Kumar Pasupuleti" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Venkata Dilip Kumar Pasupuleti"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1742</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Venkata Dilip Kumar Pasupuleti</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1742</span> Comparison of Dynamic Characteristics of Railway Bridge Spans to Know the Health of Elastomeric Bearings Using Tri Axial Accelerometer Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Narayanakumar%20Somasundaram">Narayanakumar Somasundaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Venkat%20Nihit%20Chirivella"> Venkat Nihit Chirivella</a>, <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti"> Venkata Dilip Kumar Pasupuleti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ajakool, India, has a multi-span bridge that is constructed for rail transport with a maximum operating speed of 100 km/hr. It is a standard RDSO design of a PSC box girder carrying a single railway track. The Structural Health Monitoring System (SHM) is designed and installed to compare and analyze the vibrations and displacements on the bridge due to different live loads from moving trains. The study is conducted for three different spans of the same bridge to understand the health of the elastomeric bearings. Also, to validate the same, a three-dimensional finite element model is developed, and modal analysis is carried out. The proposed methodology can help in detecting deteriorated elastomeric bearings using only wireless tri-accelerometer sensors. Detailed analysis and results are presented in terms of mode shapes, accelerations, displacements, and their importance to each other. This can be implemented with a lot of ease and can be more accurate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dynamic%20effects" title="dynamic effects">dynamic effects</a>, <a href="https://publications.waset.org/abstracts/search?q=vibration%20analysis" title=" vibration analysis"> vibration analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=accelerometer%20sensors" title=" accelerometer sensors"> accelerometer sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20analysis" title=" finite element analysis"> finite element analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20health%20monitoring" title=" structural health monitoring"> structural health monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=elastomeric%20bearing" title=" elastomeric bearing"> elastomeric bearing</a> </p> <a href="https://publications.waset.org/abstracts/154069/comparison-of-dynamic-characteristics-of-railway-bridge-spans-to-know-the-health-of-elastomeric-bearings-using-tri-axial-accelerometer-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154069.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1741</span> Microseismics: Application in Hydrocarbon Reservoir Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Kumar%20Singh">Rahul Kumar Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Apurva%20Sharma"> Apurva Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Kumar%20Srivastava"> Dilip Kumar Srivastava</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tilting of our interest towards unconventional exploitation of hydrocarbons has raised a serious concern to environmentalists. Emerging technologies like horizontal/multi-lateral drilling with subsequent hydraulic fracturing or fracking etc., for exploitation of different conventional/unconventional hydrocarbon reservoirs, are related to creating micro-level seismic events below the surface of the earth. Monitoring of these micro-level seismic events is not possible by the conventional methodology of the seismic method. So, to tackle this issue, a new technology that is microseismic is very much in discussions around the globe. Multiple researches are being carried out these days around the globe in order to prove microseismic as a new essential in the E & P industry, especially for unconventional reservoir management. Microseismic monitoring is now used for reservoir surveillance, and the best application is checking the integrity of the caprock and containment of fluid in it. In general, in whatever terms we want to use micro-seismic related events monitoring and understanding the effectiveness of stimulation, this technology offers a lot of value in terms of insight into the subsurface characteristics and processes, and this makes it really a good geophysical method to be used in future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microseismic" title="microseismic">microseismic</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=hydraulic%20fracturing%20or%20fracking" title=" hydraulic fracturing or fracking"> hydraulic fracturing or fracking</a>, <a href="https://publications.waset.org/abstracts/search?q=reservoir%20surveillance" title=" reservoir surveillance"> reservoir surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20hazards" title=" seismic hazards"> seismic hazards</a> </p> <a href="https://publications.waset.org/abstracts/140429/microseismics-application-in-hydrocarbon-reservoir-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1740</span> A Study on Unix Process Crash Based on Efficient Process Management Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guo%20Haonan">Guo Haonan</a>, <a href="https://publications.waset.org/abstracts/search?q=Chen%20Peiyu"> Chen Peiyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhao%20Hanyu"> Zhao Hanyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=process%20management" title="process management">process management</a>, <a href="https://publications.waset.org/abstracts/search?q=daemon" title=" daemon"> daemon</a>, <a href="https://publications.waset.org/abstracts/search?q=login-bash%20and%20non-login%20bash" title=" login-bash and non-login bash"> login-bash and non-login bash</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20group" title=" process group"> process group</a> </p> <a href="https://publications.waset.org/abstracts/153030/a-study-on-unix-process-crash-based-on-efficient-process-management-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153030.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1739</span> Modeling Thermionic Emission from Carbon Nanotubes with Modified Richardson-Dushman Equation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olukunle%20C.%20Olawole">Olukunle C. Olawole</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Kumar%20De"> Dilip Kumar De</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have modified Richardson-Dushman equation considering thermal expansion of lattice and change of chemical potential with temperature in material. The corresponding modified Richardson-Dushman (MRDE) equation fits quite well the experimental data of thermoelectronic current density (J) vs T from carbon nanotubes. It provides a unique technique for accurate determination of W0 Fermi energy, EF0 at 0 K and linear thermal expansion coefficient of carbon nano-tube in good agreement with experiment. From the value of EF0 we obtain the charge carrier density in excellent agreement with experiment. We describe application of the equations for the evaluation of performance of concentrated solar thermionic energy converter (STEC) with emitter made of carbon nanotube for future applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=carbon%20nanotube" title="carbon nanotube">carbon nanotube</a>, <a href="https://publications.waset.org/abstracts/search?q=modified%20Richardson-Dushman%20equation" title=" modified Richardson-Dushman equation"> modified Richardson-Dushman equation</a>, <a href="https://publications.waset.org/abstracts/search?q=fermi%20energy%20at%200%20K" title=" fermi energy at 0 K"> fermi energy at 0 K</a>, <a href="https://publications.waset.org/abstracts/search?q=charge%20carrier%20density" title=" charge carrier density"> charge carrier density</a> </p> <a href="https://publications.waset.org/abstracts/42561/modeling-thermionic-emission-from-carbon-nanotubes-with-modified-richardson-dushman-equation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42561.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1738</span> Course Outcomes to Programme Outcomes Mapping: A Methodology Based on Key Elements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Twarakavi%20Venkata%20Suresh%20Kumar">Twarakavi Venkata Suresh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Sailaja%20Kumar"> Sailaja Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Eswara%20Reddy"> B. Eswara Reddy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a world of tremendous technical developments, effective and efficient higher education has always been a major challenge. The rising number of educational institutions have made it mandatory for healthy competitions among the institutions. To evaluate the qualitative competence of these educations institutions in engineering and technology and related disciplines, an efficient assessment technique in internal and external quality has to be followed. To achieve this, the curriculum is to be developed into courses, and each course has to be presented in the form teaching lesson plan consisting of topics and session outcome known as Course Outcomes (COs), that easily map into different Programme Outcomes (POs). The major objective of these methodologies is to provide quality technical education to its students. Detailed clear weightage in CO-PO mapping helps in proper measurable COs and to devise the POs attainment is an important issue. This ensures in assisting the achievement of the POs with proper weightage to POs, and also improves the successive curriculum development. In this paper, we presented a methodology for mapping CO and PO considering the key elements supported by each PO. This approach is useful in evaluating the attainment of POs which is based on the attainment of COs using the existing data from students' marks taken from various test items. Such direct assessment tools are used to measure the degree to which each student has achieved each course learning outcome by the completion of the course. Hence, these results are also useful in measuring the PO attainment for improving the programme vision and mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attainment" title="attainment">attainment</a>, <a href="https://publications.waset.org/abstracts/search?q=course%20outcomes" title=" course outcomes"> course outcomes</a>, <a href="https://publications.waset.org/abstracts/search?q=programme%20outcomes" title=" programme outcomes"> programme outcomes</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20institutions" title=" educational institutions"> educational institutions</a> </p> <a href="https://publications.waset.org/abstracts/53306/course-outcomes-to-programme-outcomes-mapping-a-methodology-based-on-key-elements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">465</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1737</span> Utilization of Fly Ash as Backfilling Material in Indian Coal Mines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Venkata%20Karthik">P. Venkata Karthik</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Kranthi%20Kumar"> B. Kranthi Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fly ash is a solid waste product of coal based electric power generating plants. Fly ash is the finest of coal ash particles and it is transported from the combustion chamber by exhaust gases. Fly ash is removed by particulate emission control devices such as electrostatic precipitators or filter fabric bag-houses. It is a fine material with spherical particles. Large quantities of fly ash discharged from coal-fired power stations are a major problem not only in terms of scarcity of land available for its disposal, but also in environmental aspects. Fly ash can be one of the alternatives and can be a viable option to use as a filling material. This paper contains the problems associated with fly ash generation, need for its management and the efficacy of fly ash composite as a backfilling material. By conducting suitable geotechnical investigations and numerical modelling techniques, the fly ash composite material was tested. It also contains case studies of typical Indian opencast and underground coal mines. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=backfilling" title="backfilling">backfilling</a>, <a href="https://publications.waset.org/abstracts/search?q=fly%20ash" title=" fly ash"> fly ash</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20concentration%20slurry%20disposal" title=" high concentration slurry disposal"> high concentration slurry disposal</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20plant" title=" power plant"> power plant</a>, <a href="https://publications.waset.org/abstracts/search?q=void%20infilling" title=" void infilling"> void infilling</a> </p> <a href="https://publications.waset.org/abstracts/57229/utilization-of-fly-ash-as-backfilling-material-in-indian-coal-mines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">253</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1736</span> ChaQra: A Cellular Unit of the Indian Quantum Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shashank%20Gupta">Shashank Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Iteash%20Agarwal"> Iteash Agarwal</a>, <a href="https://publications.waset.org/abstracts/search?q=Vijayalaxmi%20Mogiligidda"> Vijayalaxmi Mogiligidda</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajesh%20Kumar%20Krishnan"> Rajesh Kumar Krishnan</a>, <a href="https://publications.waset.org/abstracts/search?q=Sruthi%20Chennuri"> Sruthi Chennuri</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepika%20Aggarwal"> Deepika Aggarwal</a>, <a href="https://publications.waset.org/abstracts/search?q=Anwesha%20Hoodati"> Anwesha Hoodati</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheroy%20Cooper"> Sheroy Cooper</a>, <a href="https://publications.waset.org/abstracts/search?q=Ranjan"> Ranjan</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Bilal%20Sheik"> Mohammad Bilal Sheik</a>, <a href="https://publications.waset.org/abstracts/search?q=Bhavya%20K.%20M."> Bhavya K. M.</a>, <a href="https://publications.waset.org/abstracts/search?q=Manasa%20Hegde"> Manasa Hegde</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Naveen%20Krishna"> M. Naveen Krishna</a>, <a href="https://publications.waset.org/abstracts/search?q=Amit%20Kumar%20Chauhan"> Amit Kumar Chauhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Mallikarjun%20Korrapati"> Mallikarjun Korrapati</a>, <a href="https://publications.waset.org/abstracts/search?q=Sumit%20Singh"> Sumit Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20B.%20Singh"> J. B. Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Sud"> Sunil Sud</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Gupta"> Sunil Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidhartha%20Pant"> Sidhartha Pant</a>, <a href="https://publications.waset.org/abstracts/search?q=Sankar"> Sankar</a>, <a href="https://publications.waset.org/abstracts/search?q=Neha%20Agrawal"> Neha Agrawal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Ranjan"> Ashish Ranjan</a>, <a href="https://publications.waset.org/abstracts/search?q=Piyush%20Mohapatra"> Piyush Mohapatra</a>, <a href="https://publications.waset.org/abstracts/search?q=Roopak%20T."> Roopak T.</a>, <a href="https://publications.waset.org/abstracts/search?q=Arsh%20Ahmad"> Arsh Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Nanjunda%20M."> Nanjunda M.</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Singh"> Dilip Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum%20network" title="quantum network">quantum network</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20key%20distribution" title=" quantum key distribution"> quantum key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20security" title=" quantum security"> quantum security</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20information" title=" quantum information"> quantum information</a> </p> <a href="https://publications.waset.org/abstracts/186156/chaqra-a-cellular-unit-of-the-indian-quantum-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186156.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">56</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1735</span> A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kang%20Zijian">Kang Zijian</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Tingyu"> Zhang Tingyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20machine" title="virtual machine">virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-copy%20technology" title=" pre-copy technology"> pre-copy technology</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20migration%20process" title=" memory migration process"> memory migration process</a>, <a href="https://publications.waset.org/abstracts/search?q=downtime" title=" downtime"> downtime</a>, <a href="https://publications.waset.org/abstracts/search?q=dirty%20pages%20migration%20method" title=" dirty pages migration method"> dirty pages migration method</a> </p> <a href="https://publications.waset.org/abstracts/169033/a-dirty-page-migration-method-in-process-of-memory-migration-based-on-pre-copy-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1734</span> Numerical Simulation of Flow Past Inline Tandem Cylinders in Uniform Shear Flow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rajesh%20Bhatt">Rajesh Bhatt</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Kumar%20Maiti"> Dilip Kumar Maiti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The incompressible shear flow past a square cylinder placed parallel to a plane wall of side length A in presence of upstream rectangular cylinder of height 0.5A and width 0.25A in an inline tandem arrangement are numerically investigated using finite volume method. The discretized equations are solved by an implicit, time-marching, pressure correction based SIMPLE algorithm. This study provides the qualitative insight in to the dependency of basic structure (i.e. vortex shedding or suppression) of flow over the downstream square cylinder and the upstream rectangular cylinder (and hence the aerodynamic characteristics) on inter-cylinder spacing (S) and Reynolds number (Re). The spacing between the cylinders is varied systematically from S = 0.5A to S = 7.0A so the sensitivity of the flow structure between the cylinders can be inspected. A sudden jump in strouhal number is observed, which shows the transition of flow pattern in the wake of the cylinders. The results are presented at Re = 100 and 200 in term of Strouhal number, RMS and mean of lift and drag coefficients and contour plots for different spacing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=square%20cylinder" title="square cylinder">square cylinder</a>, <a href="https://publications.waset.org/abstracts/search?q=vortex%20shedding" title=" vortex shedding"> vortex shedding</a>, <a href="https://publications.waset.org/abstracts/search?q=isolated" title=" isolated"> isolated</a>, <a href="https://publications.waset.org/abstracts/search?q=tandem%20arrangement" title=" tandem arrangement"> tandem arrangement</a>, <a href="https://publications.waset.org/abstracts/search?q=spacing%20distance" title=" spacing distance"> spacing distance</a> </p> <a href="https://publications.waset.org/abstracts/17017/numerical-simulation-of-flow-past-inline-tandem-cylinders-in-uniform-shear-flow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">549</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1733</span> Isotherm Study for Phenol Removal onto GAC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lallan%20Singh%20Yadav">Lallan Singh Yadav</a>, <a href="https://publications.waset.org/abstracts/search?q=Bijay%20Kumar%20Mishra"> Bijay Kumar Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Kumar%20Mahapatra"> Manoj Kumar Mahapatra</a>, <a href="https://publications.waset.org/abstracts/search?q=Arvind%20Kumar"> Arvind Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adsorption data for phenol removal onto granular activated carbon were fitted to Langmuir and Freundlich isotherms. The adsorption capacity of phenol was estimated to be 16.12 mg/g at initial pH=5.7. The thermodynamics of adsorption process has also been determined in the present work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adsorption" title="adsorption">adsorption</a>, <a href="https://publications.waset.org/abstracts/search?q=phenol" title=" phenol"> phenol</a>, <a href="https://publications.waset.org/abstracts/search?q=granular%20activated%20carbon" title=" granular activated carbon"> granular activated carbon</a>, <a href="https://publications.waset.org/abstracts/search?q=bioinformatics" title=" bioinformatics"> bioinformatics</a>, <a href="https://publications.waset.org/abstracts/search?q=biomedicine" title=" biomedicine"> biomedicine</a> </p> <a href="https://publications.waset.org/abstracts/8892/isotherm-study-for-phenol-removal-onto-gac" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8892.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">615</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1732</span> Understanding the Qualities of Indian Neighborhoods: Understanding of Social Spaces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Ravi%20Kumar%20Veluru">Venkata Ravi Kumar Veluru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indian traditional neighborhoods are socially active and sometimes intrusive communities, which are losing their qualities due to western influences, undermining the traditional Indian values by blind adaptation of western neighborhood concepts since the scale is not suitable to the Indian context. This paper aims to understand the qualities of Indian traditional neighborhoods by evaluating a traditional neighborhood of Jaipur, comparing it with a modern planned neighborhood of Chandigarh, designed by a foreign planner, in the neighborhood concept of the western world, to find out the special qualities of traditional Indian neighborhoods as compared to western concepts in terms of social spaces, by way of physical observation of selected neighborhoods and residents structured questionnaire survey. The combined analysis found that social spaces are abundantly available in traditional neighborhoods, which are missing in modern neighborhoods, which are the main qualities where interactions happen, aiming towards the formation of social capital. The qualities of traditional neighborhoods have to be considered while designing new neighborhoods in India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indian%20neighborhoods" title="Indian neighborhoods">Indian neighborhoods</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20neighborhoods" title=" modern neighborhoods"> modern neighborhoods</a>, <a href="https://publications.waset.org/abstracts/search?q=neighborhood%20planning" title=" neighborhood planning"> neighborhood planning</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20spaces" title=" social spaces"> social spaces</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20neighborhoods" title=" traditional neighborhoods"> traditional neighborhoods</a> </p> <a href="https://publications.waset.org/abstracts/155054/understanding-the-qualities-of-indian-neighborhoods-understanding-of-social-spaces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1731</span> A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Loh%20Fu%20Quan">Loh Fu Quan</a>, <a href="https://publications.waset.org/abstracts/search?q=Fong%20Zi%20Heng"> Fong Zi Heng</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cloud%20computing" title="Cloud computing">Cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security" title=" Cloud security"> Cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security%20issues" title=" Cloud security issues"> Cloud security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security%20framework" title=" Cloud security framework"> Cloud security framework</a> </p> <a href="https://publications.waset.org/abstracts/168890/a-comprehensive-framework-to-ensure-data-security-in-cloud-computing-analysis-solutions-and-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1730</span> Distributed Multi-Agent Based Approach on Intelligent Transportation Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiao%20Yihong">Xiao Yihong</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Kexin"> Yu Kexin</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title="distributed system">distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent" title=" multi-agent"> multi-agent</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperative%20intelligent%20transportation%20system" title=" cooperative intelligent transportation system"> cooperative intelligent transportation system</a> </p> <a href="https://publications.waset.org/abstracts/152744/distributed-multi-agent-based-approach-on-intelligent-transportation-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1729</span> Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lai%20Junzhe">Lai Junzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Wang%20Lihao"> Wang Lihao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title="distributed system">distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20information%20processing" title=" visual information processing"> visual information processing</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20home" title=" smart home"> smart home</a> </p> <a href="https://publications.waset.org/abstracts/153089/artificial-intelligence-and-distributed-system-computing-application-and-practice-in-real-life" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1728</span> Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aofan%20Liu">Aofan Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Qianqian%20Tan"> Qianqian Tan</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title="data privacy">data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title=" distributed system"> distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title=" federated learning"> federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/168789/improving-security-in-healthcare-applications-using-federated-learning-system-with-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1727</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1726</span> A Guide to User-Friendly Bash Prompt: Adding Natural Language Processing Plus Bash Explanation to the Command Interface</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teh%20Kean%20Kheng">Teh Kean Kheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Low%20Soon%20Yee"> Low Soon Yee</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 2022, as the future world becomes increasingly computer-related, more individuals are attempting to study coding for themselves or in school. This is because they have discovered the value of learning code and the benefits it will provide them. But learning coding is difficult for most people. Even senior programmers that have experience for a decade year still need help from the online source while coding. The reason causing this is that coding is not like talking to other people; it has the specific syntax to make the computer understand what we want it to do, so coding will be hard for normal people if they don’t have contact in this field before. Coding is hard. If a user wants to learn bash code with bash prompt, it will be harder because if we look at the bash prompt, we will find that it is just an empty box and waiting for a user to tell the computer what we want to do, if we don’t refer to the internet, we will not know what we can do with the prompt. From here, we can conclude that the bash prompt is not user-friendly for new users who are learning bash code. Our goal in writing this paper is to give an idea to implement a user-friendly Bash prompt in Ubuntu OS using Artificial Intelligent (AI) to lower the threshold of learning in Bash code, to make the user use their own words and concept to write and learn Bash code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=user-friendly" title="user-friendly">user-friendly</a>, <a href="https://publications.waset.org/abstracts/search?q=bash%20code" title=" bash code"> bash code</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=threshold" title=" threshold"> threshold</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20similarity" title=" semantic similarity"> semantic similarity</a>, <a href="https://publications.waset.org/abstracts/search?q=lexical%20similarity" title=" lexical similarity"> lexical similarity</a> </p> <a href="https://publications.waset.org/abstracts/161116/a-guide-to-user-friendly-bash-prompt-adding-natural-language-processing-plus-bash-explanation-to-the-command-interface" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1725</span> Online Yoga Asana Trainer Using Deep Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Narayana%20Chejarla">Venkata Narayana Chejarla</a>, <a href="https://publications.waset.org/abstracts/search?q=Nafisa%20Parvez%20Shaik"> Nafisa Parvez Shaik</a>, <a href="https://publications.waset.org/abstracts/search?q=Gopi%20Vara%20Prasad%20Marabathula"> Gopi Vara Prasad Marabathula</a>, <a href="https://publications.waset.org/abstracts/search?q=Deva%20Kumar%20Bejjam"> Deva Kumar Bejjam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Yoga is an advanced, well-recognized method with roots in Indian philosophy. Yoga benefits both the body and the psyche. Yoga is a regular exercise that helps people relax and sleep better while also enhancing their balance, endurance, and concentration. Yoga can be learned in a variety of settings, including at home with the aid of books and the internet as well as in yoga studios with the guidance of an instructor. Self-learning does not teach the proper yoga poses, and doing them without the right instruction could result in significant injuries. We developed "Online Yoga Asana Trainer using Deep Learning" so that people could practice yoga without a teacher. Our project is developed using Tensorflow, Movenet, and Keras models. The system makes use of data from Kaggle that includes 25 different yoga poses. The first part of the process involves applying the movement model for extracting the 17 key points of the body from the dataset, and the next part involves preprocessing, which includes building a pose classification model using neural networks. The system scores a 98.3% accuracy rate. The system is developed to work with live videos. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=yoga" title="yoga">yoga</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=movenet" title=" movenet"> movenet</a>, <a href="https://publications.waset.org/abstracts/search?q=tensorflow" title=" tensorflow"> tensorflow</a>, <a href="https://publications.waset.org/abstracts/search?q=keras" title=" keras"> keras</a>, <a href="https://publications.waset.org/abstracts/search?q=CNN" title=" CNN"> CNN</a> </p> <a href="https://publications.waset.org/abstracts/163914/online-yoga-asana-trainer-using-deep-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163914.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1724</span> A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Xingnan">Zhang Xingnan</a>, <a href="https://publications.waset.org/abstracts/search?q=Huang%20Jingjia"> Huang Jingjia</a>, <a href="https://publications.waset.org/abstracts/search?q=Feng%20Yue"> Feng Yue</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title="operating system">operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=ROP%20attacks" title=" ROP attacks"> ROP attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=returning-oriented%20programming%20attacks" title=" returning-oriented programming attacks"> returning-oriented programming attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=ASLR" title=" ASLR"> ASLR</a>, <a href="https://publications.waset.org/abstracts/search?q=LBR" title=" LBR"> LBR</a>, <a href="https://publications.waset.org/abstracts/search?q=CFI" title=" CFI"> CFI</a>, <a href="https://publications.waset.org/abstracts/search?q=DEP" title=" DEP"> DEP</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20randomization" title=" code randomization"> code randomization</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware-assisted%20CFI" title=" hardware-assisted CFI"> hardware-assisted CFI</a> </p> <a href="https://publications.waset.org/abstracts/168825/a-comprehensive-approach-to-mitigate-return-oriented-programming-attacks-combining-operating-system-protection-mechanisms-and-hardware-assisted-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1723</span> Challenges for Municipal Solid Waste Management in India: A Case Study of Eluru, Andhra Pradesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Prasada%20Rao%20P.">V. V. Prasada Rao P.</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Venkata%20Subbaiah"> K. Venkata Subbaiah</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Sudhir%20Kumar"> J. Sudhir Kumar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most Indian cities or townships are facing greater challenges in proper disposal of their municipal solid wastes, which are growing exponentially with the rising urban population and improvement in the living standards. As per the provisional figures, 377 million people live in the urban areas accounting for 31.16 % of the Country’s total population, and expected to grow by 3.74% every year. In India, the municipal authority is liable for the safe management & disposal of Municipal Solid Wastes. However, even with the current levels of MSW generation, a majority of the local governments are unable to comply with their constitutional responsibility due to reasons ranging from cultural aspects to technological and financial constraints. In contrast, it is expected that the MSW generation in India is likely to increase from 68.8 MTD in 2011 to 160.5 MTD by 2041. Thus, the immediate challenge before the urban local bodies in India is to evolve suitable strategies not only to cope up with the current levels, but also to address the anticipated generation levels of MSW. This paper discusses the reasons for the low levels of enforcement of MSW Rules and suggests effective management strategies for the safe disposal of MSW. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biodegradable%20waste" title="biodegradable waste">biodegradable waste</a>, <a href="https://publications.waset.org/abstracts/search?q=dumping%20sites" title=" dumping sites"> dumping sites</a>, <a href="https://publications.waset.org/abstracts/search?q=management%20strategy" title=" management strategy"> management strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=municipal%20solid%20waste%20%28MSW%29" title=" municipal solid waste (MSW)"> municipal solid waste (MSW)</a>, <a href="https://publications.waset.org/abstracts/search?q=MSW%20rules" title=" MSW rules"> MSW rules</a>, <a href="https://publications.waset.org/abstracts/search?q=vermicompost" title=" vermicompost"> vermicompost</a> </p> <a href="https://publications.waset.org/abstracts/34871/challenges-for-municipal-solid-waste-management-in-india-a-case-study-of-eluru-andhra-pradesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34871.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1722</span> Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heng%20Chia%20Ying">Heng Chia Ying</a>, <a href="https://publications.waset.org/abstracts/search?q=Charmaine%20Tan%20Chai%20Nie"> Charmaine Tan Chai Nie</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=round%20Robin%20scheduling" title="round Robin scheduling">round Robin scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20scheduling" title=" priority scheduling"> priority scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=indefinite%20blocking" title=" indefinite blocking"> indefinite blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20management" title=" process management"> process management</a>, <a href="https://publications.waset.org/abstracts/search?q=sustain" title=" sustain"> sustain</a>, <a href="https://publications.waset.org/abstracts/search?q=turnaround%20time" title=" turnaround time"> turnaround time</a> </p> <a href="https://publications.waset.org/abstracts/160706/incorporating-priority-round-robin-scheduler-to-sustain-indefinite-blocking-issue-and-prioritized-processes-in-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1721</span> The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wu%20You">Wu You</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence%20%28AI%29" title=" artificial intelligence (AI)"> artificial intelligence (AI)</a>, <a href="https://publications.waset.org/abstracts/search?q=scaled%20distributed%20systems" title=" scaled distributed systems"> scaled distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain%20finance" title=" supply chain finance"> supply chain finance</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency%20and%20security" title=" efficiency and security"> efficiency and security</a> </p> <a href="https://publications.waset.org/abstracts/168642/the-fusion-of-blockchain-and-ai-in-supply-chain-finance-scalability-in-distributed-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1720</span> Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Dennis">Huang Dennis</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelio%20Aziel"> Aurelio Aziel</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20operating%20system" title="mobile operating system">mobile operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Malware" title=" Malware"> Malware</a> </p> <a href="https://publications.waset.org/abstracts/168876/study-on-security-and-privacy-issues-of-mobile-operating-systems-based-on-malware-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1719</span> Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cao%20Jiayu">Cao Jiayu</a>, <a href="https://publications.waset.org/abstracts/search?q=Lan%20Ximing"> Lan Ximing</a>, <a href="https://publications.waset.org/abstracts/search?q=Huang%20Jingjia"> Huang Jingjia</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title="operating system">operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=stack%20overflow" title=" stack overflow"> stack overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=buffer%20overflow" title=" buffer overflow"> buffer overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=control-flow%20enforcement%20technology" title=" control-flow enforcement technology"> control-flow enforcement technology</a> </p> <a href="https://publications.waset.org/abstracts/153142/stack-overflow-detection-and-prevention-on-operating-systems-using-machine-learning-and-control-flow-enforcement-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153142.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1718</span> Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lin%20Yunuo">Lin Yunuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Seow%20Xing%20Quan"> Seow Xing Quan</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20operation%20system" title=" cloud operation system"> cloud operation system</a>, <a href="https://publications.waset.org/abstracts/search?q=multitenancy" title=" multitenancy"> multitenancy</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20allocation" title=" resource allocation"> resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=utilization%20of%20cloud%20resources" title=" utilization of cloud resources"> utilization of cloud resources</a> </p> <a href="https://publications.waset.org/abstracts/168893/study-on-resource-allocation-of-cloud-operating-system-based-on-multi-tenant-data-resource-sharing-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168893.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1717</span> Energy-Aware Scheduling in Real-Time Systems: An Analysis of Fair Share Scheduling and Priority-Driven Preemptive Scheduling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Su%20Xiaohan">Su Xiaohan</a>, <a href="https://publications.waset.org/abstracts/search?q=Jin%20Chicheng"> Jin Chicheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Yijing"> Liu Yijing</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Energy-aware scheduling in real-time systems aims to minimize energy consumption, but issues related to resource reservation and timing constraints remain challenges. This study focuses on analyzing two scheduling algorithms, Fair-Share Scheduling (FFS) and Priority-Driven Preemptive Scheduling (PDPS), for solving these issues and energy-aware scheduling in real-time systems. Based on research on both algorithms and the processes of solving two problems, it can be found that Fair-Share Scheduling ensures fair allocation of resources but needs to improve with an imbalanced system load, and Priority-Driven Preemptive Scheduling prioritizes tasks based on criticality to meet timing constraints through preemption but relies heavily on task prioritization and may not be energy efficient. Therefore, improvements to both algorithms with energy-aware features will be proposed. Future work should focus on developing hybrid scheduling techniques that minimize energy consumption through intelligent task prioritization, resource allocation, and meeting time constraints. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy-aware%20scheduling" title="energy-aware scheduling">energy-aware scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=fair-share%20scheduling" title=" fair-share scheduling"> fair-share scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=priority-driven%20preemptive%20scheduling" title=" priority-driven preemptive scheduling"> priority-driven preemptive scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20systems" title=" real-time systems"> real-time systems</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20reservation" title=" resource reservation"> resource reservation</a>, <a href="https://publications.waset.org/abstracts/search?q=timing%20constraints" title=" timing constraints"> timing constraints</a> </p> <a href="https://publications.waset.org/abstracts/169550/energy-aware-scheduling-in-real-time-systems-an-analysis-of-fair-share-scheduling-and-priority-driven-preemptive-scheduling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169550.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1716</span> Resource Sharing Issues of Distributed Systems Influences on Healthcare Sector Concurrent Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Soo%20Hong%20Da">Soo Hong Da</a>, <a href="https://publications.waset.org/abstracts/search?q=Ng%20Zheng%20Yao"> Ng Zheng Yao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Healthcare sector is a business that consists of providing medical services, manufacturing medical equipment and drugs as well as providing medical insurance to the public. Most of the time, the data stored in the healthcare database is to be related to patient’s information which is required to be accurate when it is accessed by authorized stakeholders. In distributed systems, one important issue is concurrency in the system as it ensures the shared resources to be synchronized and remains consistent through multiple read and write operations by multiple clients. The problems of concurrency in the healthcare sector are who gets the access and how the shared data is synchronized and remains consistent when there are two or more stakeholders attempting to the shared data simultaneously. In this paper, a framework that is beneficial to distributed healthcare sector concurrent environment is proposed. In the proposed framework, four different level nodes of the database, which are national center, regional center, referral center, and local center are explained. Moreover, the frame synchronization is not symmetrical. There are two synchronization techniques, which are complete and partial synchronization operation are explained. Furthermore, when there are multiple clients accessed at the same time, synchronization types are also discussed with cases at different levels and priorities to ensure data is synchronized throughout the processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resources" title="resources">resources</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=concurrency" title=" concurrency"> concurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=synchronization" title=" synchronization"> synchronization</a>, <a href="https://publications.waset.org/abstracts/search?q=stakeholders" title=" stakeholders"> stakeholders</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a> </p> <a href="https://publications.waset.org/abstracts/145591/resource-sharing-issues-of-distributed-systems-influences-on-healthcare-sector-concurrent-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1715</span> Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teo%20Hao%20Jing">Teo Hao Jing</a>, <a href="https://publications.waset.org/abstracts/search?q=Shane%20Ho%20Ken%20Wae"> Shane Ho Ken Wae</a>, <a href="https://publications.waset.org/abstracts/search?q=Lee%20Jin%20Yu"> Lee Jin Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain%20technology" title="blockchain technology">blockchain technology</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20management%20applications" title=" data management applications"> data management applications</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=delegated%20proof%20of%20stake" title=" delegated proof of stake"> delegated proof of stake</a> </p> <a href="https://publications.waset.org/abstracts/145592/consortium-blockchain-based-model-for-data-management-applications-in-the-healthcare-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1714</span> An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhou%20Luchen">Zhou Luchen</a>, <a href="https://publications.waset.org/abstracts/search?q=Wu%20Yubing"> Wu Yubing</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=k-means" title="k-means">k-means</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20allocation" title=" resource allocation"> resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=SDN" title=" SDN"> SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=UAV%20network" title=" UAV network"> UAV network</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicles" title=" unmanned aerial vehicles"> unmanned aerial vehicles</a> </p> <a href="https://publications.waset.org/abstracts/152884/an-ai-based-dynamical-resource-allocation-calculation-algorithm-for-unmanned-aerial-vehicle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1713</span> Fractional Order Differentiator Using Chebyshev Polynomials</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koushlendra%20Kumar%20Singh">Koushlendra Kumar Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Manish%20Kumar%20Bajpai"> Manish Kumar Bajpai</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajesh%20Kumar%20Pandey"> Rajesh Kumar Pandey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A discrete time fractional orderdifferentiator has been modeled for estimating the fractional order derivatives of contaminated signal. The proposed approach is based on Chebyshev’s polynomials. We use the Riemann-Liouville fractional order derivative definition for designing the fractional order SG differentiator. In first step we calculate the window weight corresponding to the required fractional order. Then signal is convoluted with this calculated window’s weight for finding the fractional order derivatives of signals. Several signals are considered for evaluating the accuracy of the proposed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fractional%20order%20derivative" title="fractional order derivative">fractional order derivative</a>, <a href="https://publications.waset.org/abstracts/search?q=chebyshev%0D%0Apolynomials" title=" chebyshev polynomials"> chebyshev polynomials</a>, <a href="https://publications.waset.org/abstracts/search?q=signals" title=" signals"> signals</a>, <a href="https://publications.waset.org/abstracts/search?q=S-G%20differentiator" title=" S-G differentiator"> S-G differentiator</a> </p> <a href="https://publications.waset.org/abstracts/21346/fractional-order-differentiator-using-chebyshev-polynomials" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21346.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">648</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=58">58</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=59">59</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>