Search results for: Network coverage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5193

Search results for: Network coverage

5133 Media Framing and Agenda-Setting of Hurricane Harvey’s News Coverage: A Content Analysis of The New York Times, The Wall Street Journal, and The Houston Chronicle from 2017 To 2018

Authors: S M Asger Ali, Duane A. Gill

Abstract:

During crisis moments like a natural disaster, people tend to rely on the mass media to get up-to-date information and stay informed. However, when media are covering crisis news, they may lose some objectivity, and rather than providing balanced news coverage, media may become critical towards the government and private sectors for their participation in disaster response and recovery processes. This paper investigated the print media coverage of Hurricane Harvey and utilized data from three newspapers: the New York Times (online), the Wall Street Journal (online), and the Houston Chronicle. By examining the media's use of descriptors, quotes, wording, and images, this research explored how media coverage framed government and private sectors for their role in Harvey's response and recovery. Findings revealed that the human-interest frame received the most media attention, and the morality frame received less attention. Regarding tone, this study found that the media's overall tone for government response was neutral. However, the tone for the federal government was slightly negative, while the tone for city and state level of government was slightly positive. By examining the media's tone and frame, this research contributes to the literature on risk communication, mass media, and disaster studies.

Keywords: hurricane Harvey, mass media, risk communication, disaster response, media framing, crisis news coverage

Procedia PDF Downloads 180
5132 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 323
5131 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 313
5130 Media Coverage of Cervical Cancer in Malawi: A National Sample of Newspapers and a Radio Station

Authors: Elida Tafupenji Kamanga

Abstract:

Cancer of the cervix remains one of the high causes of death among Malawian women. Despite the government introduction of free screening services throughout the country, patronage still remains low and lack of knowledge high. Given the critical role mass media plays in relaying different information to the public including health and its influence on health behaviours, the study sought to analyse Malawi media coverage of the disease and its effectiveness. The findings of the study will help inform media advocacy directed at changing any coverage impeding the effective dissemination of cervical cancer message which consequently will help increase awareness and accessing of screening behaviours among women. A content analysis of 29 newspapers and promotional messages on cervical from a local radio station was conducted for the period from 2012 to 2015. Overall the results showed media coverage in terms of content and frequency increased for the four-year period. However, of concern was the quality of information both media presented to the public. The lapse in information provided means there is little education taking place through the media which could be contributing to the knowledge gap the women have thereby affecting their decision to screen. Also lack of adequate funding to media institutions and lack of collaboration between media institutions and stakeholders involved in the fight against the disease were noted as other contributing factors to low coverage of the disease. Designing messages that are not only informative and educative but also innovative may help increase awareness; improve the knowledge gap and potential adoption of preventive screening behaviour by Malawian women. Conversely, good communication between the media institutions and researchers involved in the fight against the disease through the channelling of new findings back to the public as well as increasing funding towards similar cause should be considered.

Keywords: cervical cancer, effectiveness, media coverage, screening

Procedia PDF Downloads 181
5129 The Coverage of Women's Sport of Greek Sports Websites

Authors: Eleni Tsalkatidou

Abstract:

Despite the fact that women's sport has flourished in recent years, its media coverage remains low, as it is observed that every day men’s sports stories dominate the most popular sports websites and the same doesn’t apply to women. Many studies in the past have demonstrated that the participation of women in sport is greatly underrepresented in the media and even when it does get covered, the focus is often on femininity and attractiveness, not athleticism. This means that female athletes are often portrayed in a sexist manner and, in general, they are more deserving of media coverage as celebrities rather than because of their sporting achievements. Scholars have argued that sport is a place where sexism is cultivated, as gender roles are constructed and disputed based on social context. Although images and information about women athletes are now more than ever, thanks to Social Media where they also act as 'producers', sport is still considered as «masculine». There are many reasons why this happens, the most important of which are: a. It is considered that females don’t have the physical and athletic qualifications such as men and b. Women's sport is less commercial than men’s, so the interest is lower. Moreover, scholars have pointed out that men journalists/reporters don’t cover the women’s sport: it is more common for a woman to write about a women's sport or a female athlete. This has its roots in the conception that sport is synonymous with masculinity - which is defined as the opposite of femininity – and so if men deal with women’s sport, this will probably menace their association with masculinity. Given the above, this paper seeks to examine the amount of women’s sport coverage of five Greek popular sports websites (metrosport.gr, gazzeta.gr, sport24.gr, sdna.gr, sport-fm.gr). The posted articles from these Greek websites from January to June 2020 were selected for my content analysis, which will be used to categorize the themes in order that the following research questions could be answered: 1) Are there any articles that cover women's sports or that refer to female athletes?, 2) And if so, are they articles/reports or is it a reproduction of the press release?, 3) What kind of sports do they refer to (individual-team sport)?, 4) Are the articles signed? And if so, are they written by men or women?, 5) What textual practices are used to cover women's sport/female athletes?, 6) Based on the findings, could we argue that we have entered a new age of media coverage of women’s sport in Greece with a shift towards greater gender equality or not?

Keywords: Coverage, Greek websites, Sport, Women

Procedia PDF Downloads 125
5128 Newspaper Coverage and the Prevention of Child Sexual Abuse in Nigeria

Authors: Grace Iember Anweh, Er Shipp

Abstract:

Child Sexual Abuse (CSA) has been a contending issue across the globe. The menace of child sexual violence cuts across all continents. From 0 - 13 years, children have been sexually abused – some to the extent that their reproductive organs have been permanently damaged. The research in view is timely, as it will contribute data on CSA and media role to the communication parlance. This study believes that the adverse effects of this menace can hinder children who are potential leaders of tomorrow from harnessing their potentials to contribute to the growth and development of societies due to the psychological, health, and social effects of sex abuse. Where government policies, the law, cultural beliefs, and bottle necks surrounding processes of fighting child sexual abuse have failed, this study assumes that adequate coverage by the mass media, especially the newspapers known for their in-depth coverage and reporting, can help to eradicate or reduce to its barest minimum, the menace of CSA. Therefore, this study aims at assessing the coverage of newspapers – their policies and content towards preventive strategies, and how the public access and receive the messages to the extent they take action to forestall the persistence of sexual violation of children in Nigeria. Methodologically, the study has adopted qualitative and quantitative methods to answer the problem. The study used in-depth interview method to find out from journalists and editors of newspapers the policies that define the production of news content on sexual gender-based violence. In addition, selected National Daily newspapers are content - analysed to determine the focus of media coverage and whether the contents are preventive-based or case-based. In addition, caregivers of the reproductive ages from 16 years and above, ranging from parents, guardians, and school management, will form the study population through a survey using the questionnaire. The aim is to determine their views regarding mass media coverage of sexual violence against children and the effectiveness of the content, to the extent of prompting them to keep the child safe from sexual molesters. Findings from the content analysis so far show that newspapers in Nigeria are not engaged in preventive content of CSA. Their contents are rather case-based.

Keywords: newspaper, coverage, prevention, child, sexual abuse

Procedia PDF Downloads 105
5127 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 628
5126 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 436
5125 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 249
5124 Health Trajectory Clustering Using Deep Belief Networks

Authors: Farshid Hajati, Federico Girosi, Shima Ghassempour

Abstract:

We present a Deep Belief Network (DBN) method for clustering health trajectories. Deep Belief Network (DBN) is a deep architecture that consists of a stack of Restricted Boltzmann Machines (RBM). In a deep architecture, each layer learns more complex features than the past layers. The proposed method depends on DBN in clustering without using back propagation learning algorithm. The proposed DBN has a better a performance compared to the deep neural network due the initialization of the connecting weights. We use Contrastive Divergence (CD) method for training the RBMs which increases the performance of the network. The performance of the proposed method is evaluated extensively on the Health and Retirement Study (HRS) database. The University of Michigan Health and Retirement Study (HRS) is a nationally representative longitudinal study that has surveyed more than 27,000 elderly and near-elderly Americans since its inception in 1992. Participants are interviewed every two years and they collect data on physical and mental health, insurance coverage, financial status, family support systems, labor market status, and retirement planning. The dataset is publicly available and we use the RAND HRS version L, which is easy to use and cleaned up version of the data. The size of sample data set is 268 and the length of the trajectories is equal to 10. The trajectories do not stop when the patient dies and represent 10 different interviews of live patients. Compared to the state-of-the-art benchmarks, the experimental results show the effectiveness and superiority of the proposed method in clustering health trajectories.

Keywords: health trajectory, clustering, deep learning, DBN

Procedia PDF Downloads 351
5123 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 419
5122 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 444
5121 Low Pertussis Vaccine Coverage Rates among Polish Nurses

Authors: Aneta Nitsch-Osuch, Sylwia Dyk, Izabela Gołebiak

Abstract:

Background. Since 2014 the pertussis vaccine is recommended to Polish health care workers who have close contacts with infants. Although this recommendation is implemented into the National Immunization Programme, its realization has remained unknown. The Purpose: The aim of the study, conducted at the department of Social Medicine and Public Health (Medical University of Warsaw, Poland), was to describe a perception, knowledge and coverage rates regarding pertussis vaccination among nursing staff. According to the authors' knowledge, it was the first study related to this topic in our country. Material and Methods: A total number of 543 nurses who work at pediatric or neonatal wards was included into the study (501 women and 42 men), average age was 47 years. All nurses were asked to fulfill the anonymous survey, previously validated. Results: 1. Coverage rates: The analysis of results revealed that only 4% of responders reported they were vaccinated with Tdpa within past 10 years, while 8% declared they would plan the vaccine in the future. 35% of responders would consider the Tdpa vaccine whether there is some kind of the reimbursement. 2. Perception and knowledge of the disease and vaccination: The majority (82%) of nurses did not recognize pertussis as a re-emerging infectious disease. 54% of them believed that obligatory vaccinations in the childhood protect against the disease and the protection is a life-long one. Only 15% of nurses considered pertussis as a possible nosocomial infection. The current epidemiology of the disease was known to 6% of responders, while 24% of them were familiar with pertussis vaccination schedules for infants, children and adolescents, but only 9% of responders knew that adults older than 19 years are recommended to be vaccinated with Tdpa every 10 years. Many nurses (82%) would expect more educational activities related to pertussis and methods of its prophylaxis. Conclusions: The pertussis vaccine coverage rate among Polish nurses is extremely low. This is a result of not enough knowledge about the disease and its prevention. Educational activities addressed to health care workers and reimbursement of the pertussis vaccine are required to improve awareness and increase of vaccine coverage rates in the future.

Keywords: coverage, nurse, pertussis, vaccine

Procedia PDF Downloads 195
5120 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 720
5119 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 174
5118 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 411
5117 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 145
5116 Analysis of Impact of Flu Vaccination on Acute Respiratory Viral Infections (ARVI) Morbidity among Population in South Kazakhstan Region, 2010-2015

Authors: Karlygash Tulendieva

Abstract:

Presently vaccination is the most effective method of prevention of flu and its complications. The purpose of this study was to analyze the impact of the increase of coverage of the population of South Kazakhstan region with flu vaccination and decrease of the ARVI morbidity. The analysis was performed on the data of flu vaccination of risk groups, including children under one year and pregnant women. Data on ARVI morbidity during 2010-2015 and data on vaccination were taken from the reports of the Epidemiological Surveillance Unit of Department of Consumers’ Rights Protection of South Kazakhstan region. Coverage with flu vaccination of the risk groups was annually increasing and in 2015 it reached 16% (450,000/2,800,682) from the total population. The ARVI morbidity rate in the entire population in 2010 was 2,010.4 per 100,000 of the population and decreased 3.2 times to 609.9 per 100,000 of the population in 2015. Annual growth was observed from 2010 to 2015 of specific weight of the vaccinated main risk groups: healthcare workers by 51% (from 17,331 in 2010 to 33,538 in 2015), children with chronic pulmonary and cardio-vascular diseases, immune deficiency, weak and sickly children above six months by 39% (from 63,122 in 2010 to 158,023 in 2015), adults with chronic co-morbidities by 27% (from 44,271 in 2010 to 162,595 in 2015), persons above 65 by 17% (from 10,276 in 2010 to 57,875 in 2015), and annual coverage of pregnant women on second or third trimester from 34,443 in 2010 to 37,969 in 2015. Starting from 2013 and until 2015 vaccination was performed in the region with coverage of at least 90% of children from 6 months to one year. The ARVI morbidity in this age group decreased 3.3 times from 8,687.8 per 100,000 of the population in 2010 to 2,585.8 per 100,000 of the population in 2015. Vaccination of pregnant women on 2-3 trimester was started in the region in 2012. Annual increase of vaccination coverage of pregnant women from 86.1% (34,443/40,000) in 2012 to 95% (37,969/40,000) in 2015 decreased the morbidity 1.5 times from 4,828.8 per 100,000 of population in 2012 to 3,022.7 per 100,000 of population in 2015. Following the increase of vaccination coverage of the population in South Kazakhstan region, the trend was observed of decrease of ARVI morbidity rates among the population and main risk groups, among pregnant women and children under one year.

Keywords: acute respiratory viral infections, flu, risk groups, vaccination

Procedia PDF Downloads 227
5115 Parametric Inference of Elliptical and Archimedean Family of Copulas

Authors: Alam Ali, Ashok Kumar Pathak

Abstract:

Nowadays, copulas have attracted significant attention for modeling multivariate observations, and the foremost feature of copula functions is that they give us the liberty to study the univariate marginal distributions and their joint behavior separately. The copula parameter apprehends the intrinsic dependence among the marginal variables, and it can be estimated using parametric, semiparametric, or nonparametric techniques. This work aims to compare the coverage rates between an Elliptical and an Archimedean family of copulas via a fully parametric estimation technique.

Keywords: elliptical copula, archimedean copula, estimation, coverage rate

Procedia PDF Downloads 50
5114 Interference Management in Long Term Evolution-Advanced System

Authors: Selma Sbit, Mohamed Bechir Dadi, Belgacem Chibani Rhaimi

Abstract:

Incorporating Home eNodeB (HeNB) in cellular networks, e.g. Long Term Evolution Advanced (LTE-A), is beneficial for extending coverage and enhancing capacity at low price especially within the non-line-of sight (NLOS) environments such as homes. HeNB or femtocell is a small low powered base station which provides radio coverage to the mobile users in an indoor environment. This deployment results in a heterogeneous network where the available spectrum becomes shared between two layers. Therefore, a problem of Inter Cell Interference (ICI) appears. This issue is the main challenge in LTE-A. To deal with this challenge, various techniques based on frequency, time and power control are proposed. This paper deals with the impact of carrier aggregation and higher order MIMO (Multiple Input Multiple Output) schemes on the LTE-Advanced performance. Simulation results show the advantages of these schemes on the system capacity (4.109 b/s/Hz when bandwidth B=100 MHz and when applying MIMO 8x8 for SINR=30 dB), maximum theoretical peak data rate (more than 4 Gbps for B=100 MHz and when MIMO 8x8 is used) and spectral efficiency (15 b/s/Hz and 30b/s/Hz when MIMO 4x4 and MIMO 8x8 are applying respectively for SINR=30 dB).

Keywords: capacity, carrier aggregation, LTE-Advanced, MIMO (Multiple Input Multiple Output), peak data rate, spectral efficiency

Procedia PDF Downloads 238
5113 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 496
5112 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 309
5111 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 251
5110 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 261
5109 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 383
5108 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 622
5107 Key Technologies and Evolution Strategies for Computing Force Bearer Network

Authors: Zhaojunfeng

Abstract:

Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.

Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies

Procedia PDF Downloads 114
5106 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification

Authors: Abdelhadi Lotfi, Abdelkader Benyettou

Abstract:

In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.

Keywords: classification, probabilistic neural networks, network optimization, pattern recognition

Procedia PDF Downloads 246
5105 Universality and Synchronization in Complex Quadratic Networks

Authors: Anca Radulescu, Danae Evans

Abstract:

The relationship between a network’s hardwiring and its emergent dynamics are central to neuroscience. We study the principles of this correspondence in a canonical setup (in which network nodes exhibit well-studied complex quadratic dynamics), then test their universality in biological networks. By extending methods from discrete dynamics, we study the effects of network connectivity on temporal patterns, encapsulating long-term behavior into the rich topology of network Mandelbrot sets. Then elements of fractal geometry can be used to predict and classify network behavior.

Keywords: canonical model, complex dynamics, dynamic networks, fractals, Mandelbrot set, network connectivity

Procedia PDF Downloads 291
5104 Asymptotic Confidence Intervals for the Difference of Coefficients of Variation in Gamma Distributions

Authors: Patarawan Sangnawakij, Sa-Aat Niwitpong

Abstract:

In this paper, we proposed two new confidence intervals for the difference of coefficients of variation, CIw and CIs, in two independent gamma distributions. These proposed confidence intervals using the close form method of variance estimation which was presented by Donner and Zou (2010) based on concept of Wald and Score confidence interval, respectively. Monte Carlo simulation study is used to evaluate the performance, coverage probability and expected length, of these confidence intervals. The results indicate that values of coverage probabilities of the new confidence interval based on Wald and Score are satisfied the nominal coverage and close to nominal level 0.95 in various situations, particularly, the former proposed confidence interval is better when sample sizes are small. Moreover, the expected lengths of the proposed confidence intervals are nearly difference when sample sizes are moderate to large. Therefore, in this study, the confidence interval for the difference of coefficients of variation which based on Wald is preferable than the other one confidence interval.

Keywords: confidence interval, score’s interval, wald’s interval, coefficient of variation, gamma distribution, simulation study

Procedia PDF Downloads 416