1,213 research outputs found

    Application-centric Resource Provisioning for Amazon EC2 Spot Instances

    Full text link
    In late 2009, Amazon introduced spot instances to offer their unused resources at lower cost with reduced reliability. Amazon's spot instances allow customers to bid on unused Amazon EC2 capacity and run those instances for as long as their bid exceeds the current spot price. The spot price changes periodically based on supply and demand, and customers whose bids exceed it gain access to the available spot instances. Customers may expect their services at lower cost with spot instances compared to on-demand or reserved. However the reliability is compromised since the instances(IaaS) providing the service(SaaS) may become unavailable at any time without any notice to the customer. Checkpointing and migration schemes are of great use to cope with such situation. In this paper we study various checkpointing schemes that can be used with spot instances. Also we device some algorithms for checkpointing scheme on top of application-centric resource provisioning framework that increase the reliability while reducing the cost significantly

    Tuning photoluminescence response by electric field in the lead-free piezoelectric Na1/2Bi1/2TiO3-BaTiO3

    Full text link
    We show that an electrically soft ferroelectric host can be used to tune the photoluminescence (PL) response of rare-earth emitter ions by external electric field. The proof of this concept is demonstrated by changing the PL response of Eu+3 ion by electric field on a model system Eu-doped 0.94Na1/2Bi1/2TiO3-0.06BaTiO3. We also show that new channels of radiative transitions, forbidden otherwise, open up due to positional disorder in the system, which can as well be tuned by electric field.Comment: 13 pages 5 figure

    Artificial Intelligence, Social Media and Supply Chain Management: The Way Forward

    Get PDF
    Supply chain management (SCM) is a complex network of multiple entities ranging from business partners to end consumers. These stakeholders frequently use social media platforms, such as Twitter and Facebook, to voice their opinions and concerns. AI-based applications, such as sentiment analysis, allow us to extract relevant information from these deliberations. We argue that the context-specific application of AI, compared to generic approaches, is more efficient in retrieving meaningful insights from social media data for SCM. We present a conceptual overview of prevalent techniques and available resources for information extraction. Subsequently, we have identified specific areas of SCM where context-aware sentiment analysis can enhance the overall efficiency

    AI for social good: social media mining of migration discourse

    Get PDF
    The number of international migrants has steadily increased over the years, and it has become one of the pressing issues in today’s globalized world. Our bibliometric review of around 400 articles on Scopus platform indicates an increased interest in migration-related research in recent times but the extant research is scattered at best. AI-based opinion mining research has predominantly noted negative sentiments across various social media platforms. Additionally, we note that prior studies have mostly considered social media data in the context of a particular event or a specific context. These studies offered a nuanced view of the societal opinions regarding that specific event, but this approach might miss the forest for the trees. Hence, this dissertation makes an attempt to go beyond simplistic opinion mining to identify various latent themes of migrant-related social media discourse. The first essay draws insights from the social psychology literature to investigate two facets of Twitter discourse, i.e., perceptions about migrants and behaviors toward migrants. We identified two prevailing perceptions (i.e., sympathy and antipathy) and two dominant behaviors (i.e., solidarity and animosity) of social media users toward migrants. Additionally, this essay has also fine-tuned the binary hate speech detection task, specifically in the context of migrants, by highlighting the granular differences between the perceptual and behavioral aspects of hate speech. The second essay investigates the journey of migrants or refugees from their home to the host country. We draw insights from Gennep's seminal book, i.e., Les Rites de Passage, to identify four phases of their journey: Arrival of Refugees, Temporal stay at Asylums, Rehabilitation, and Integration of Refugees into the host nation. We consider multimodal tweets for this essay. We find that our proposed theoretical framework was relevant for the 2022 Ukrainian refugee crisis – as a use-case. Our third essay points out that a limited sample of annotated data does not provide insights regarding the prevailing societal-level opinions. Hence, this essay employs unsupervised approaches on large-scale societal datasets to explore the prevailing societal-level sentiments on YouTube platform. Specifically, it probes whether negative comments about migrants get endorsed by other users. If yes, does it depend on who the migrants are – especially if they are cultural others? To address these questions, we consider two datasets: YouTube comments before the 2022 Ukrainian refugee crisis, and during the crisis. Second dataset confirms the Cultural Us hypothesis, and our findings are inconclusive for the first dataset. Our final or fourth essay probes social integration of migrants. The first part of this essay probed the unheard and faint voices of migrants to understand their struggle to settle down in the host economy. The second part of this chapter explored the viability of social media platforms as a viable alternative to expensive commercial job portals for vulnerable migrants. Finally, in our concluding chapter, we elucidated the potential of explainable AI, and briefly pointed out the inherent biases of transformer-based models in the context of migrant-related discourse. To sum up, the importance of migration was recognized as one of the essential topics in the United Nation’s Sustainable Development Goals (SDGs). Thus, this dissertation has attempted to make an incremental contribution to the AI for Social Good discourse

    FREE RADICAL SCAVENGING AND NOS ACTIVATION PROPERTIES OF WATER SOLUBLE CRUDE POLYSACCHARIDE FROM PLEUROTUS OSTREATUS

    Get PDF
    The aim of this study was to investigate the antioxidant activity using different in vitro assays and nitric oxide synthase activation property of crude water soluble polysaccharide from P. ostreatus. The polysaccharide was isolated by hot water extraction and physico-chemical investigation revealed that it contained high amount of carbohydrate (mostly β-glucan) and low amount of protein and phenolic compounds. EC50 values for scavenging of hydroxyl radical and superoxide radical as well as chelating ability of ferrous ion were 665, 390 and 370 µg/ml respectively. The polysaccharide also showed potential nitric oxide synthase activation properties. This mushroom might be a good source of bioactive compounds

    Data Security and Anonymization in Neighborhood Attacks in Clustered Network in Internet of Things (NIoT)

    Get PDF
    In this paper author tries to focus on the review on the K Nearest Neighbor (KNN) tied by one or more specific types of inter dependency, such as values, visions, ideas, financial exchange, friendship, conflict, or trade. Social network analysis views social relationships in terms of nodes and ties. It also focuses the network analysis, application as well as problem statement. In this paper presents a outline for the privacy hazard and sharing the anonymized data in the network. This includes a proposed architecture design flow, for which the author considers the several variations and make connections. On several real-world social networks, we show that simple anonymization techniques are inadequate, it results in considerable breaks of privacy for even modestly informed opponents.  It also concentrates on a new anonymization technique. It based on the network and validate analytically that leads to saving of the privacy threat. It also analyses the effect that anonymizing the network has on the utility of the data for social network analysis
    corecore