Search results for: heterogeneous combat network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5772

Search results for: heterogeneous combat network

5712 Reaction Rate Behavior of a Methane-Air Mixture over a Platinum Catalyst in a Single Channel Catalytic Reactor

Authors: Doo Ki Lee, Kumaresh Selvakumar, Man Young Kim

Abstract:

Catalytic combustion is an environmentally friendly technique to combust fuels in gas turbines. In this paper, the behavior of surface reaction rate on catalytic combustion is studied with respect to the heterogeneous oxidation of methane-air mixture in a catalytic reactor. Plug flow reactor (PFR), the simplified single catalytic channel assists in investigating the catalytic combustion phenomenon over the Pt catalyst by promoting the desired chemical reactions. The numerical simulation with multi-step elementary surface reactions is governed by the availability of free surface sites onto the catalytic surface and thereby, the catalytic combustion characteristics are demonstrated by examining the rate of the reaction for lean fuel mixture. Further, two different surface reaction mechanisms are adopted and compared for surface reaction rates to indicate the controlling heterogeneous reaction for better fuel conversion. The performance of platinum catalyst under heterogeneous reaction is analyzed under the same temperature condition, where the catalyst with the higher kinetic rate of reaction would have a maximum catalytic activity for enhanced methane catalytic combustion.

Keywords: catalytic combustion, heterogeneous reaction, plug flow reactor, surface reaction rate

Procedia PDF Downloads 273
5711 Nuclear Characteristics of a Heterogeneous Thorium-Based Fuel Design Aimed at Increasing Fuel Cycle Length of a Typical PWR

Authors: Hendrik Bernard Van Der Walt, Frik Van Niekerk

Abstract:

Heterogeneous thorium-based fuels have been proposed as an alternative for conventional reactor fuels and many studies have shown promising results. Fuel cycle characteristics still have to be explored in detail. This study investigates the use of a novel thorium-based fuel design aimed at increasing fuel cycle length of a typical PWR with an explicit focus on thorium- uranium content, neutron spectrum, flux considerations and neutron economy.As nuclear reactions are highly dependent on reactor flux and material matrix, analytical and numerical calculations have been completed to predict the behaviour of the proposed nuclear fuel. The proposed design utilizes various ratios of thorium oxide and uranium oxide pellets within fuel pins, divided into heterogeneous sections of specified length. This design renders multiple regions with unique characteristics. The goal of this study is to determine and optimally utilize these characteristics. Proliferation considerations result in the need for denaturing of heterogeneous regions, which renders more unique characteristics, these aspects were examined in this study. Finally, the use of fertile thorium to emulate a burnable poison for managing excess BOL reactivity has been investigated, as well as an option for flux shaping in a typical PWR.

Keywords: nuclear fuel, nuclear characteristics, nuclear fuel cycle, thorium-based fuel, heterogeneous design

Procedia PDF Downloads 137
5710 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 505
5709 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358
5708 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 247
5707 Numerical Simulation of Air Flow, Exhaust and Their Mixture in a Helicopter Exhaust Injective Cooler

Authors: Mateusz Paszko, Konrad Pietrykowski, Krzysztof Skiba

Abstract:

Due to low-altitude and relatively low flight speed, today’s combat assets like missile weapons equipped with infrared guidance systems are one of the most important threats to the helicopters performing combat missions. Especially meaningful in helicopter aviation is infrared emission by exhaust gases, regressed to the surroundings. Due to high temperature, exhaust gases are a major factor in detectability of a helicopter performing air combat operations. This study presents the results of simulating the flow of the mixture of exhaust and air in the flow duct of an injective exhaust cooler, adapted to cooperate with the PZL 10W turbine engine. The simulation was performed using a numerical model and the ANSYS Fluent software. Simulation computations were conducted for set flight conditions of the PZL W-3 Falcon helicopter. The conclusions resulting from the conducted numerical computations should allow for optimisation of the flow duct geometry in the cooler, in order to achieve the greatest possible temperature reduction of exhaust exiting into the surroundings. It is expected that the obtained results should be useful for further works related to the development of the final version of exhaust cooler for the PZL W-3 Falcon helicopter.

Keywords: exhaust cooler, helicopter, numerical simulation, stealth

Procedia PDF Downloads 150
5706 Investigating the Neural Heterogeneity of Developmental Dyscalculia

Authors: Fengjuan Wang, Azilawati Jamaludin

Abstract:

Developmental Dyscalculia (DD) is defined as a particular learning difficulty with continuous challenges in learning requisite math skills that cannot be explained by intellectual disability or educational deprivation. Recent studies have increasingly recognized that DD is a heterogeneous, instead of monolithic, learning disorder with not only cognitive and behavioral deficits but so too neural dysfunction. In recent years, neuroimaging studies employed group comparison to explore the neural underpinnings of DD, which contradicted the heterogenous nature of DD and may obfuscate critical individual differences. This research aimed to investigate the neural heterogeneity of DD using case studies with functional near-infrared spectroscopy (fNIRS). A total of 54 aged 6-7 years old of children participated in this study, comprising two comprehensive cognitive assessments, an 8-minute resting state, and an 8-minute one-digit addition task. Nine children met the criteria of DD and scored at or below 85 (i.e., the 16th percentile) on the Mathematics or Math Fluency subtest of the Wechsler Individual Achievement Test, Third Edition (WIAT-III) (both subtest scores were 90 and below). The remaining 45 children formed the typically developing (TD) group. Resting-state data and brain activation in the inferior frontal gyrus (IFG), superior frontal gyrus (SFG), and intraparietal sulcus (IPS) were collected for comparison between each case and the TD group. Graph theory was used to analyze the brain network under the resting state. This theory represents the brain network as a set of nodes--brain regions—and edges—pairwise interactions across areas to reveal the architectural organizations of the nervous network. Next, a single-case methodology developed by Crawford et al. in 2010 was used to compare each case’s brain network indicators and brain activation against 45 TD children’s average data. Results showed that three out of the nine DD children displayed significant deviation from TD children’s brain indicators. Case 1 had inefficient nodal network properties. Case 2 showed inefficient brain network properties and weaker activation in the IFG and IPS areas. Case 3 displayed inefficient brain network properties with no differences in activation patterns. As a rise above, the present study was able to distill differences in architectural organizations and brain activation of DD vis-à-vis TD children using fNIRS and single-case methodology. Although DD is regarded as a heterogeneous learning difficulty, it is noted that all three cases showed lower nodal efficiency in the brain network, which may be one of the neural sources of DD. Importantly, although the current “brain norm” established for the 45 children is tentative, the results from this study provide insights not only for future work in “developmental brain norm” with reliable brain indicators but so too the viability of single-case methodology, which could be used to detect differential brain indicators of DD children for early detection and interventions.

Keywords: brain activation, brain network, case study, developmental dyscalculia, functional near-infrared spectroscopy, graph theory, neural heterogeneity

Procedia PDF Downloads 53
5705 Ultrafast Ground State Recovery Dynamics of a Cyanine Dye Molecule in Heterogeneous Environment

Authors: Tapas Goswami, Debabrata Goswami

Abstract:

We have studied the changes in ground state recovery dynamics of IR 144 dye using degenerate transient absorption spectroscopy technique when going from homogeneous solution phase to heterogeneous partially miscible liquid/liquid interface. Towards this aim, we set up a partially miscible liquid/liquid interface in which dye is insoluble in one solvent carbon tetrachloride (CCl₄) layer and soluble in other solvent dimethyl sulphoxide (DMSO). A gradual increase in ground state recovery time of the dye molecule is observed from homogenous bulk solution to more heterogeneous environment interface layer. In the bulk solution charge distribution of dye molecule is in equilibrium with polar DMSO solvent molecule. Near the interface micro transportation of non-polar solvent, CCl₄ disturbs the solvent equilibrium in DMSO layer and it relaxes to a new equilibrium state corresponding to a new charge distribution of dye with a heterogeneous mixture of polar and non-polar solvent. In this experiment, we have measured the time required for the dye molecule to relax to the new equilibrium state in different heterogeneous environment. As a result, dye remains longer time in the excited state such that even it can populate more triplet state. The present study of ground state recovery dynamics of a cyanine dye molecule in different solvent environment provides the important characteristics of effect of solvation on excited life time of a dye molecule.

Keywords: excited state, ground state recovery, solvation, transient absorption

Procedia PDF Downloads 285
5704 Evaluation of Esters Production by Oleic Acid Epoxidation Reaction

Authors: Flavio A. F. Da Ponte, Jackson Q. Malveira, Monica C. G. Albuquerque

Abstract:

In recent years a worldwide interest in renewable resources from the biomass has spurred the industry. In this work the chemical structure of oleic acid chains was modified by homogeneous and heterogeneous catalysis in order to produce esters. The homogeneous epoxidation was carried out at H2O2 to oleic acid unsaturation molar ratio of 20:1. The reaction temperature was 338 K and reaction time 16 h. Formic acid was used as catalyst. For heterogeneous catalysis reaction temperature was 343 K and reaction time 24 h. The esters production was carried out by heterogeneous catalysis of the epoxidized oleic acid and butanol using Mg/SBA-15 as catalyst. The resulting products were confirmed by NMR (1H and 13C) and FTIR spectroscopy. The products were characterized before and after each reaction. The catalysts were characterized by X-ray diffraction, X-ray fluorescence, thermogravimetric analysis (TGA) and BET surface areas. The results were satisfactory for the bioproducts formed.

Keywords: acid oleic, bioproduct, esters, epoxidation

Procedia PDF Downloads 356
5703 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 447
5702 Social Entrepreneurship against Depopulation: Network Analysis within the Theoretical Framework of the Quadruple Helix

Authors: Esperanza Garcia-Uceda, Josefina L. Murillo-Luna, M. Pilar Latorre-Martinez, Marta Ferrer-Serrano

Abstract:

Social entrepreneurship represents an innovation of traditional business models. During the last decade, its important role in contributing to rural and regional development has been widely recognized, due to its capacity to combat the problem of depopulation through the creation of employment. However, the success of this type of innovative business initiatives depends to a large extent on the existence of an adequate ecosystem of support resources. Based on the theoretical framework of the quadruple helix (QH), which highlights the need for collaboration between different interest groups -university, industry, government and civil society- for the development of regional innovations, in this work the network analysis is applied to study the ecosystem of resources to support social entrepreneurship in the rural area of the province of Zaragoza (Spain). It is a quantitative analysis that can be used to measure the interactions between the different actors that make up the quadruple helix, as well as the networks created between the different institutions and support organizations, through the study of the complex networks they form. The results show the importance of the involvement of local governments and the university, as key elements in the development process, but also allow identifying other issues that are susceptible to improvement.

Keywords: ecosystem of support resources, network analysis, quadruple helix, social entrepreneurship

Procedia PDF Downloads 255
5701 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks

Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris

Abstract:

The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.

Keywords: energy efficiency, handover, HetNets, MADM, small cells

Procedia PDF Downloads 117
5700 Coping in Your Profession: An Exploratory Analysis of Healthcare Students’ Perceptions of Burnout

Authors: Heather Clark, Jon Kelly

Abstract:

Burnout among healthcare professionals has been elevated to a high level of concern. The descriptions of the healthcare workplace often include language such as, stressful, long hours, rotating shifts, weekends and holidays, and exhausting. New graduate healthcare professionals are being sent into the workplace with little to no coping skills, knowledge of signs and symptoms of burnout, or resources that are available. The authors of this study created a university course entitled 'coping in your profession' that enrolled registered nurses, licensed practical nurses, EMTs, nurse assistants, and medical assistants. The course addresses burnout, self-analysis, incivility, coping mechanisms, and organizational responsibilities for employee well-being. The students were surveyed using QualtricsXM that included a pre-course and post-course analysis. Pre-course results showed high levels of individual experiences with burnout and limited knowledge of resources to combat burnout. Post-course results included personal growth and that students’ perception of burnout can be prevented at both the individual and the organization levels. Students also indicated that few to no resources to combat burnout existed at their place of employment. Addressing burnout at the educational level helps prepare graduates with the knowledge and tools to combat burnout at the individual and organization level.

Keywords: burnout, coping, healthcare workers, incivility, resilience

Procedia PDF Downloads 136
5699 Extreme Temperature Response to Solar Radiation Management in Southeast Asia

Authors: Heri Kuswanto, Brina Miftahurrohmah, Fatkhurokhman Fauzi

Abstract:

Southeast Asia has experienced rising temperatures and is predicted to reach a 1.5°C increase by 2030, which is earlier than the Paris Agreement target. Solar Radiation Management (SRM) has been proposed as an alternative to combat global warming. This research investigates changes in the annual maximum temperature (TXx) with and without SRM over southeast Asia. We examined outputs from three ensemble members of the Geoengineering Large Ensemble Project (GLENS) experiment for the period 2051 to 2080. One ensemble member generated outputs that significantly deviated from the others, leading to the removal of ensemble 3 from the impact analysis. Our observations indicate that the magnitude of TXx changes with SRM is heterogeneous across countries. We found that SRM significantly reduces TXx levels compared to historical periods. Furthermore, SRM can reduce temperatures by up to 5°C compared to scenarios without SRM, with even more pronounced effects in Thailand, Cambodia, Laos, and Myanmar. This indicates that SRM can mitigate climate change by lowering future TXx levels.

Keywords: solar radiation management, GLENS, extreme, temperature, ensemble

Procedia PDF Downloads 17
5698 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 337
5697 Bhumastra “Unmanned Ground Vehicle”

Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J

Abstract:

Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.

Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI

Procedia PDF Downloads 126
5696 Combating Domestic Violence in Malaysia: Issues and Challenges

Authors: Aspalella A. Rahman

Abstract:

Domestic violence is not an uncommon phenomenon throughout the world. Malaysia is no exception. However, the exact prevalence of domestic violence in Malaysia is difficult to capture due to cultural understanding and sensitivity of the issues existing in the society. This paper aims to examine the issues and problems with the law of domestic violence in Malaysia. As such, it will mainly rely on statutes as its primary sources of information. It will analyse the scope and provisions of the Penal Code as well as the Domestic Violence Act 1994. Any shortcomings and gaps in the laws will be highlighted. It is submitted that domestic violence remains a problem in Malaysia. Although many strategies and plans have been implemented in attempting to combat this social problem, it remains unresolved. This is due to the inefficient implementation of the law. Although much has been done, there is still more to be done by the Malaysian government to combat domestic violence more effectively. For this reason, significant cooperation between the law enforcement authorities, NGOs, and the community must be established.

Keywords: challenges, domestic violence, issues, Malaysia

Procedia PDF Downloads 305
5695 Participatory Air Quality Monitoring in African Cities: Empowering Communities, Enhancing Accountability, and Ensuring Sustainable Environments

Authors: Wabinyai Fidel Raja, Gideon Lubisa

Abstract:

Air pollution is becoming a growing concern in Africa due to rapid industrialization and urbanization, leading to implications for public health and the environment. Establishing a comprehensive air quality monitoring network is crucial to combat this issue. However, conventional methods of monitoring are insufficient in African cities due to the high cost of setup and maintenance. To address this, low-cost sensors (LCS) can be deployed in various urban areas through the use of participatory air quality network siting (PAQNS). PAQNS involves stakeholders from the community, local government, and private sector working together to determine the most appropriate locations for air quality monitoring stations. This approach improves the accuracy and representativeness of air quality monitoring data, engages and empowers community members, and reflects the actual exposure of the population. Implementing PAQNS in African cities can build trust, promote accountability, and increase transparency in the air quality management process. However, challenges to implementing this approach must be addressed. Nonetheless, improving air quality is essential for protecting public health and promoting a sustainable environment. Implementing participatory and data-informed air quality monitoring can take a significant step toward achieving these important goals in African cities and beyond.

Keywords: low-cost sensors, participatory air quality network siting, air pollution, air quality management

Procedia PDF Downloads 94
5694 Effects of Cattaneo-Christov Heat Flux on 3D Magnetohydrodynamic Viscoelastic Fluid Flow with Variable Thermal Conductivity

Authors: Muhammad Ramzan

Abstract:

A mathematical model has been envisaged to discuss three-dimensional Viscoelastic fluid flow with an effect of Cattaneo-Christov heat flux in attendance of magnetohydrodynamic (MHD). Variable thermal conductivity with the impact of homogeneous-heterogeneous reactions and convective boundary condition is also taken into account. Homotopy analysis method is engaged to obtain series solutions. Graphical illustrations depicting behaviour of sundry parameters on skin friction coefficient and all involved distributions are also given. It is observed that velocity components are decreasing functions of Viscoelastic fluid parameter. Furthermore, strength of homogeneous and heterogeneous reactions have opposite effects on concentration distribution. A comparison with a published paper has also been established and an excellent agreement is obtained; hence reliable results are being presented.

Keywords: Cattaneo Christov heat flux, homogenous-heterogeneous reactions, magnetic field, variable thermal conductivity

Procedia PDF Downloads 197
5693 AI-based Radio Resource and Transmission Opportunity Allocation for 5G-V2X HetNets: NR and NR-U Networks

Authors: Farshad Zeinali, Sajedeh Norouzi, Nader Mokari, Eduard Jorswieck

Abstract:

The capacity of fifth-generation (5G) vehicle-to-everything (V2X) networks poses significant challenges. To ad- dress this challenge, this paper utilizes New Radio (NR) and New Radio Unlicensed (NR-U) networks to develop a heterogeneous vehicular network (HetNet). We propose a new framework, named joint BS assignment and resource allocation (JBSRA) for mobile V2X users and also consider coexistence schemes based on flexible duty cycle (DC) mechanism for unlicensed bands. Our objective is to maximize the average throughput of vehicles while guaranteeing the WiFi users' throughput. In simulations based on deep reinforcement learning (DRL) algorithms such as deep deterministic policy gradient (DDPG) and deep Q network (DQN), our proposed framework outperforms existing solutions that rely on fixed DC or schemes without consideration of unlicensed bands.

Keywords: vehicle-to-everything (V2X), resource allocation, BS assignment, new radio (NR), new radio unlicensed (NR-U), coexistence NR-U and WiFi, deep deterministic policy gradient (DDPG), deep Q-network (DQN), joint BS assignment and resource allocation (JBSRA), duty cycle mechanism

Procedia PDF Downloads 104
5692 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 646
5691 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 451
5690 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 264
5689 Evaluation of Ensemble Classifiers for Intrusion Detection

Authors: M. Govindarajan

Abstract:

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection. 

Keywords: data mining, ensemble, radial basis function, support vector machine, accuracy

Procedia PDF Downloads 249
5688 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 440
5687 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 465
5686 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 198
5685 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 164
5684 A Decision Support System for the Detection of Illicit Substance Production Sites

Authors: Krystian Chachula, Robert Nowak

Abstract:

Manufacturing home-made explosives and synthetic drugs is an increasing problem in Europe. To combat that, a data fusion system is proposed for the detection and localization of production sites in urban environments. The data consists of measurements of properties of wastewater performed by various sensors installed in a sewage network. A four-stage fusion strategy allows detecting sources of waste products from known chemical reactions. First, suspicious measurements are used to compute the amount and position of discharged compounds. Then, this information is propagated through the sewage network to account for missing sensors. The next step is clustering and the formation of tracks. Eventually, tracks are used to reconstruct discharge events. Sensor measurements are simulated by a subsystem based on real-world data. In this paper, different discharge scenarios are considered to show how the parameters of used algorithms affect the effectiveness of the proposed system. This research is a part of the SYSTEM project (SYnergy of integrated Sensors and Technologies for urban sEcured environMent).

Keywords: continuous monitoring, information fusion and sensors, internet of things, multisensor fusion

Procedia PDF Downloads 116
5683 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 512