36 research outputs found

    Artificial Intelligence A Byproduct of Natural Intelligence and Their Salient Features

    Get PDF
    This paper mainly focuses on the creation of Artificial Intelligence (AI) using natural intelligence but the question to be considered whether the natural intelligence can be created using artificial intelligence or not. The Artificial intelligence is the outcome of functionality and capabilities of human brain called neural Network. In this paper, it is presumed that the artificial intelligence is a byproduct of natural intelligence and then we discuss some relationship between both of these, especially the working of natural intelligence. Some other important questions are raised to understand a deep linkage between natural and artificial intelligence. There exists lot of non-material phenomenon created by dint of natural intelligence (not created by human) causing to produce systems run by artificial intelligence theorems and algorithms working at backend. The software based on Knowledge Based Systems (KBS) derives its power from human wisdom and natural intelligence. There are several limitations on artificial intelligence. In creation of natural intelligence there is a great role of spirituality.Humans are creator of artificial intelligence with limited abilities. Actually AI started with invention of machines. The applications of creation of natural  intelligence are vastly and abundantly known to humans of 21st Century, which are incorporated in the areas of Space Science, Anatomy, and motion ofPlants, spin of electron, Electronics, plant intelligence and Neural Science etc. The working of machines depending upon the artificial intelligence doesn't provide creativity or self-motivated innovations, within the meaning of natural intelligence

    MPJ Express meets YARN:towards Java HPC on Hadoop systems

    Get PDF
    AbstractMany organizations—including academic, research, commercial institutions—have invested heavily in setting up High Performance Computing (HPC) facilities for running computational science applications. On the other hand, the Apache Hadoop software—after emerging in 2005— has become a popular, reliable, and scalable open-source framework for processing large-scale data (Big Data). Realizing the importance and significance of Big Data, an increasing number of organizations are investing in relatively cheaper Hadoop clusters for executing their mission critical data processing applications. An issue here is that system administrators at these sites might have to maintain two parallel facilities for running HPC and Hadoop computations. This, of course, is not ideal due to redundant maintenance work and poor economics. This paper attempts to bridge this gap by allowing HPC and Hadoop jobs to co-exist on a single hardware facility. We achieve this goal by exploiting YARN—Hadoop v2.0—that de-couples the computational and resource scheduling part of the Hadoop framework from HDFS. In this context, we have developed a YARN-based reference runtime system for the MPJ Express software that allows executing parallel MPI-like Java applications on Hadoop clusters. The main contribution of this paper is provide Big Data community access to MPI-like programming using MPJ Express. As an aside, this work allows parallel Java applications to perform computations on data stored in Hadoop Distributed File System (HDFS)

    Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)

    Get PDF
    The Industrial Internet of Things (IIoTs) is an emerging area that forms the collaborative environment for devices to share resources. In IIoT, many sensors, actuators, and other devices are used to improve industrial efficiency. As most of the devices are mobile; therefore, the impact of mobility can be seen in terms of low-device utilization. Thus, most of the time, the available resources are underutilized. Therefore, the inception of the fog computing model in IIoT has reduced the communication delay in executing complex tasks. However, it is not feasible to cover the entire region through fog nodes; therefore, fog node selection and placement is still the challenging task. This paper proposes a multi-level hierarchical fog node deployment model for the industrial environment. Moreover, the scheme utilized the IoT devices as a fog node; however, the selection depends on energy, path/location, network properties, storage, and available computing resources. Therefore, the scheme used the location-aware module before engaging the device for task computation. The framework is evaluated in terms of memory, CPU, scalability, and system efficiency; also compared with the existing approach in terms of task acceptance rate. The scheme is compared with xFogSim framework that is capable to handle workload upto 1000 devices. However, the task acceptance ratio is higher in the proposed framework due to its multi-tier model. The workload acceptance ratio is 85% reported with 3000 devices; whereas, in xFogsim the ratio is reduced to approx. 68%. The primary reason for high workload acceptation is that the proposed solution utilizes the unused resources of the user devices for computations

    The impact of US sanctions on the Consumer Price Index (CPI) of Turkey

    Get PDF
    This paper addresses the assessment of effect of the sanctions imposed on Turkey by the United States of America in the year 2018 on the Consumer Price Index (CPI) of Turkey. The study used a cross sectional data from the 81 provinces in Turkey for the periods of 2016 to 2018 from Turkish Statistical Institute (TUIK). Dummy variable with Ordinary Least Squares (OLS) estimation method is used to determine that how the sanctions affected the CPI over that period by looking at the years before 2018, the year the sanctions were imposed

    A Fog Computing Framework for Intrusion Detection of Energy-Based Attacks on UAV-Assisted Smart Farming

    Get PDF
    Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology to support agricultural efficiency. In large-scale agriculture, the role of unmanned aerial vehicles (UAVs) has increased in remote monitoring and collecting farm data at regular intervals. However, due to an open environment, UAVs can be hacked to malfunction and report false data. Due to limited battery life and flight times requiring frequent recharging, a compromised UAV wastes precious energy when performing unnecessary functions. Furthermore, it impacts other UAVs competing for charging times at the station, thus disrupting the entire data collection mechanism. In this paper, a fog computing-based smart farming framework is proposed that utilizes UAVs to gather data from IoT sensors deployed in farms and offloads it at fog sites deployed at the network edge. The framework adopts the concept of a charging token, where upon completing a trip, UAVs receive tokens from the fog node. These tokens can later be redeemed to charge the UAVs for their subsequent trips. An intrusion detection system is deployed at the fog nodes that utilize machine learning models to classify UAV behavior as malicious or benign. In the case of malicious classification, the fog node reduces the tokens, resulting in the UAV not being able to charge fully for the duration of the trip. Thus, such UAVs are automatically eliminated from the UAV pool. The results show a 99.7% accuracy in detecting intrusions. Moreover, due to token-based elimination, the system is able to conserve energy. The evaluation of CPU and memory usage benchmarks indicates that the system is capable of efficiently collecting smart-farm data, even in the presence of attacks

    SecureSurgiNET:a framework for ensuring security in telesurgery

    Get PDF
    The notion of surgical robotics is actively being extended to enable telesurgery, where both the surgeon and patient are remotely located and connected via a public network, which leads to many security risks. Being a safety-critical application, it is highly important to make telesurgery robust and secure against active and passive attacks. In this article, we propose the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments. SecureSurgiNET is primarily based on a set of well-established protocols to provide a fool-proof telesurgical robotic system. For increasing the efficiency of secured telesurgery environments, the idea of a telesurgical authority is introduced that ensures the integrity, identity management, authentication policy implementation, and postoperative data security. An analysis is provided describing the security and throughput of Advanced Encryption Standard during the intraoperative phase of SecureSurgiNET. Moreover, we have tabulated the possible attacks on SecureSurgiNET along with the devised defensive measures. Finally, we also present a time complexity analysis of the SecureSurgiNET through simulations. © The Author(s) 2019
    corecore