Search results for: network transformation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6109

Search results for: network transformation

6049 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 425
6048 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 243
6047 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 410
6046 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 432
6045 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 336
6044 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 712
6043 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 169
6042 Transformation of the Traditional Landscape of Kabul Old City: A Study for Its Conservation

Authors: Mohammad Umar Azizi, Tetsuya Ando

Abstract:

This study investigates the transformation of the traditional landscape of Kabul Old City through an examination of five case study areas. Based on physical observation, three types of houses are found: traditional, mixed and modern. Firstly, characteristics of the houses are described according to construction materials and the number of stories. Secondly, internal and external factors are considered in order to implement a conservation plan. Finally, an adaptive conservation plan is suggested to protect the traditional landscape of Kabul Old City.

Keywords: conservation, district 1, Kabul Old City, landscape, transformation, traditional houses

Procedia PDF Downloads 202
6041 Theorizing Digital Transformation, Digitization and Digitalization in Africa Emerging Research in Digital Business: A Critical Review of the Current Scholarship

Authors: Ayanda Magida

Abstract:

The paper aims to provide a critical review of the current state-of-the-art literature on emerging digital business theories. They are specifically focusing on the emergent theories on digital transformation, digitization, and digitalization and their importance in the global south. Digital business is an emergent field that cuts across the different existing disciplines. The paper is threefold- to provide the conceptual and theoretical definition of the DT, digitization and digitization. There is a growing need to provide some of the differences between digitalization, digitization and digital transformation from a theoretical and conceptual basis. These tend to be confused and often use interchangeably the second aim is to focus on the emerging theories on digital transformation and digital business. Finally, the paper provides some critical review of the importance of scholarship in the field from the global south. The systematic review of the literature was conducted through the different research databases to provide some of the major theories in the field of digital business and critically argue for the global south stance. Much of the research on the development and adoption of digital technologies, specifically digital transformation, has been done in the west and developed countries. There is thus a dearth of research conducted in developing countries and the global south.

Keywords: digital transformation, digitization, digital business, digitalization

Procedia PDF Downloads 243
6040 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 403
6039 Design, Research and Culture Change in the Age of Transformation

Authors: Maya Jaber

Abstract:

Climate change is one of the biggest challenges that require immediate attention and mitigation for the continued prosperity of human existence. The transformation will need to occur that is top-down and bottom-up on holistic scales. A new way of thinking will need to be adopted that is innovative, human-centric, and global. Designers and researchers are vital leaders in this movement that can help guide other practitioners in the strategy development, critical thinking process, and alignment of transformative solutions. Holistic critical thinking strategies will be essential to change behaviors and cultures for future generations' survival. This paper will discuss these topics associated with Dr. Jaber's research.

Keywords: environmental social governance (ESG), integral design thinking (IDT), organizational transformation, sustainability management

Procedia PDF Downloads 156
6038 A Model Architecture Transformation with Approach by Modeling: From UML to Multidimensional Schemas of Data Warehouses

Authors: Ouzayr Rabhi, Ibtissam Arrassen

Abstract:

To provide a complete analysis of the organization and to help decision-making, leaders need to have relevant data; Data Warehouses (DW) are designed to meet such needs. However, designing DW is not trivial and there is no formal method to derive a multidimensional schema from heterogeneous databases. In this article, we present a Model-Driven based approach concerning the design of data warehouses. We describe a multidimensional meta-model and also specify a set of transformations starting from a Unified Modeling Language (UML) metamodel. In this approach, the UML metamodel and the multidimensional one are both considered as a platform-independent model (PIM). The first meta-model is mapped into the second one through transformation rules carried out by the Query View Transformation (QVT) language. This proposal is validated through the application of our approach to generating a multidimensional schema of a Balanced Scorecard (BSC) DW. We are interested in the BSC perspectives, which are highly linked to the vision and the strategies of an organization.

Keywords: data warehouse, meta-model, model-driven architecture, transformation, UML

Procedia PDF Downloads 137
6037 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 138
6036 From Ritual City to Modern City: The City Space Transformation of Xi’an in the Early 20th Century

Authors: Zhang Bian, Zhao Jijun

Abstract:

The urban layout of Xi’an city (the capital Chang’an in the Tang dynasty) was shaped by feudal etiquette, but this dominant factor was replaced by modern city planning during the period of the Republic of China. This makes Xi’an a representative case to explore the transformation process of Chinese cities in the early 20th century. By analyzing the contrast and connection between the historical texts of city planning and the realistic construction activities recorded by the maps and images, this paper reviews the transformation process of the urban space of Xi’an in the early 20th century and divides it into four phases according to important events that significantly impacted planning and construction activities. Based on this, the entire transformation of Xi’an’s city planning and practices can be characterized by three aspects: 1) the dominant force of the city plan and construction changed with the establishment of modern city administrations; 2) the layout of the city was continuously broadened to meet the demand of modern economy and city life; and, 3) the ritual space was transformed into practical space for commercial and recreational activities.

Keywords: city space, the early 20th century, transformation, Xi’an city

Procedia PDF Downloads 143
6035 Decision-Making Process Based on Game Theory in the Process of Urban Transformation

Authors: Cemil Akcay, Goksun Yerlikaya

Abstract:

Buildings are the living spaces of people with an active role in every aspect of life in today's world. While some structures have survived from the early ages, most of the buildings that completed their lifetime have not transported to the present day. Nowadays, buildings that do not meet the social, economic, and safety requirements of the age return to life with a transformation process. This transformation is called urban transformation. Urban transformation is the renewal of the areas with a risk of disaster and the technological infrastructure required by the structure. The transformation aims to prevent damage to earthquakes and other disasters by rebuilding buildings that have completed their non-earthquake-resistant economic life. It is essential to decide on other issues related to conversion and transformation in places where most of the building stock should transform into the first-degree earthquake belt, such as Istanbul. In urban transformation, property owners, local authority, and contractor must deal at a common point. Considering that hundreds of thousands of property owners are sometimes in the areas of transformation, it is evident how difficult it is to make the deal and decide. For the optimization of these decisions, the use of game theory is foreseeing. The main problem in this study is that the urban transformation is carried out in place, or the building or buildings are transport to a different location. There are many stakeholders in the Istanbul University Cerrahpaşa Medical Faculty Campus, which is planned to be carried out in the process of urban transformation, was tried to solve the game theory applications. An analysis of the decisions given on a real urban transformation project and the logical suitability of decisions taken without the use of game theory were also supervised using game theory. In each step of this study, many decision-makers are classifying according to a specific logical sequence, and in the game trees that emerged as a result of this classification, Nash balances were tried to observe, and optimum decisions were determined. All decisions taken for this project have been subjected to two significant differentiated comparisons using game theory, and as decisions are taken without the use of game theory, and according to the results, solutions for the decision phase of the urban transformation process introduced. The game theory model developed from beginning to the end of the urban transformation process, particularly as a solution to the difficulty of making rational decisions in large-scale projects with many participants in the decision-making process. The use of a decision-making mechanism can provide an optimum answer to the demands of the stakeholders. In today's world for the construction sector, it is also seeing that the game theory is a non-surprising consequence of the fact that it is the most critical issues of planning and making the right decision in future years.

Keywords: urban transformation, the game theory, decision making, multi-actor project

Procedia PDF Downloads 116
6034 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 136
6033 Microstructural and Magnetic Properties of Ni50Mn39Sn11 and Ni50Mn36Sn14 Heusler Alloys

Authors: Mst Nazmunnahar, Juan del Val, Alena Vimmrova, Blanca Hernando, Julian González

Abstract:

We report the microstructural and magnetic properties of Ni50Mn39Sn11 and Ni50Mn36Sn14 ribbon Heusler alloys. Experimental results were obtained by differential scanning calorymetry, X-ray diffraction and vibrating sample magnetometry techniques. The Ni-Mn-Sn system undergoes a martensitic structural transformation in a wide temperature range. For example, for Ni50Mn39Sn11 the start and finish temperatures of the martensitic and austenite phase transformation for ribbon alloy were Ms = 336K , Mf = 328K, As = 335K and Af = 343K whereas no structural transformation is observed for Ni50Mn36Sn14 alloys. Magnetic measurements show the typical ferromagnetic behavior with Curie temperature 207K at low applied field of 50 Oe. The complex behavior exhibited by these Heusler alloys should be ascribed to the strong coupling between magnetism and structure, being their magnetic behavior determined by the distance between Mn atoms.

Keywords: as-cast ribbon, Heusler alloys, magnetic properties, structural transformation

Procedia PDF Downloads 427
6032 Digital Transformation in Production Planning and Control: Evaluation of the Organizational Readiness

Authors: Tobias Wissing, Peter Burggräf, Johannes Wagner

Abstract:

Cost pressure, competitiveness and the increasing turbulence of globalized saturated markets has been the driver for a variety of research activities in the field of production planning and control (PPC) during the past decades. For some time past an increasing awareness for innovative technologies in terms of Industry 4.0 can be noticed. Although there are many promising approaches a solely installation of those smart solutions will not maximize the PPC performance. To accelerate the successful digital transformation the cooperation between employee and technology also has to be adapted. The existing processes and organizational structures might be not sufficient to maximize the utilization of technological innovations. This paper presents the key results of an extensive study which was conducted by the Laboratory for Machine Tools and Production Engineering (WZL) of the RWTH Aachen University to evaluate the current situation and examine the organizational readiness for this digital transformation.

Keywords: cyber-physical production system, digital transformation, industry 4.0, production planning and control

Procedia PDF Downloads 329
6031 Fusion of MOLA-based DEMs and HiRISE Images for Large-Scale Mars Mapping

Authors: Ahmed F. Elaksher, Islam Omar

Abstract:

In this project, we used MOLA-based DEMs to orthorectify HiRISE optical images. The MOLA data was interpolated using the kriging interpolation technique. Corresponding tie points were then digitized from both datasets. These points were employed in co-registering both datasets using GIS analysis tools. Different transformation models, including the affine and projective transformation models, were used with different sets and distributions of tie points. Additionally, we evaluated the use of the MOLA elevations in co-registering the MOLA and HiRISE datasets. The planimetric RMSEs achieved for each model are reported. Results suggested the use of 3D-2D transformation models.

Keywords: photogrammetry, Mars, MOLA, HiRISE

Procedia PDF Downloads 55
6030 Context Specific E-Transformation Decision-Making Framework

Authors: A. Hol

Abstract:

Nowadays, within quickly changing business environments, companies are often faced with specific problems where knowledge required to make timely decisions is often available however is not always readily accessible by the decision makers, in a required form. To identify if in any way via innovative system development companies could be assisted so that they can make quicker industry specific decisions in a given time and space, researchers conducted in depth case study investigation during which they studied company’s e-transformation recommendations, company’s current issues and problems as well as the nature of company’s pressing decisions. This study utilizes Scenario Based Analysis with the aim to help identify parameters crucial for the development of the system that could support decision making in a given time and space. Based on the findings, Context Specific e-transformation decision making framework is proposed.

Keywords: e-transformation, business context, decision making, e-T Guide, ICT

Procedia PDF Downloads 434
6029 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 493
6028 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 302
6027 Transformation of Traditional Marketplaces in an Urban Context: Case of Chalai Market, Thiruvananthapuram

Authors: Aswathy Vijayan, Sharath Sunder Rajeev

Abstract:

Trade has been fundamental in the footprint of human civilization since ancient time. In most of the historic cities, city development was along trading routes, where marketplaces are the major entrance to a city and hence a major element of the urban fabric. Marketplaces are where the commercial activities flourish, people, having a sense of belonging to the place, where they easily fit in. Acknowledging the built environment in and around the market in a way, creating a sense of place is an important factor in the success of public spaces. Local markets are developed in an organic manner, which adds on to the people experience and perception of urban space. With the city development, the commercial needs within the city increase, hence marketplaces flourish, irrespective of the functional segregation within. The work-live culture in the marketplaces diminishes as the commercial expansion washes away the residential patches within it. Real estate flourishes as the newer infills are without considering the carrying capacity of the place. Chalai market is a prominent business center serving the regional level of Thiruvananthapuram city. The transformation trend of marketplaces in city cores are understood from case study on Fatimid Cairo Marketplace. The parameters that led to transformation of marketplaces in a global context is considered for the analysis of the Chalai market. The structure of the marketplace over the years is analyzed in terms of transformation in location, transformation in the land- use, change in commodity, and transformation in movement and activity. The aim of the research is to emphasize the need to understand the transformation trend, in creating a suitable development pattern for the city. The unregulated transformation within the city core has led to tremendous transformation in the user group and user pattern and eventually to the commercial trend. With the change in lifestyle and need for new amenities have led to addition of new infills leading to the degradation of the native commerce. Hence addressing the transformation of marketplaces are crucial to maintaining the locational significance and cultural importance and heritage of the place.

Keywords: bazaar, market centers, marketplaces, traditional city, traditional market, urban fabric

Procedia PDF Downloads 124
6026 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 244
6025 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 257
6024 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 377
6023 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 619
6022 Digital Transformation of Payment Systems Using Field Service Management

Authors: Hamze Torabian, Mohammad Mehrabioun Mohammadi

Abstract:

Like many other industries, the payment industry has been affected by digital transformation. The importance of digital transformation in the payment industry is very crucial. Because the payment industry is considered a leading industry in digital and emerging technologies, and the digitalization of other industries such as retail, health, and telecommunication, it also depends on the growth rate of digitalized payment systems. One of the technological innovations in service management is Field Service Management (FSM). Despite the widespread use of FSM in various industries such as petrochemical, health, maintenance, etc., this technology can also be recruited in the payment industry, transforming the payment industry into a more agile and efficient one. Accordingly, the present study pays close attention to the application of FSM in the payment industry. Given the importance of merchants' bargaining power in the payment industry, this study aims to use FSM in the digital transformation initiative with a targeted focus on providing real-time services to merchants. The research method consists of three parts. Firstly, conducting the review of past research, applications of FSM in the payment industry are considered. In the next step, merchants' benefits such as emotional, functional, economic, and social benefits in using FSM are identified using in-depth interviews and content analysis methods. The related business model in helping the payment industry transforming into a more agile and efficient industry is considered in the following step. The results revealed the 10 main pillars required to realize the digital transformation of payment systems using FSM.

Keywords: digital transformation, field service management, merchant support systems, payment industry

Procedia PDF Downloads 143
6021 Transforming Space to Place: Best-Practice Approaches and Initiatives

Authors: Juanee Cilliers

Abstract:

Urban citizens have come to expect more from their cities, demanding optimal conditions for business creativity and professional development, along with efficient, sustainable transportation and energy systems that feed robust economic development and healthy job markets. Urban public spaces are an important part of the urban environment, creating the framework for public life and quality thereof. The transformation of space into successful public places are crucial in this regard as planning must safeguard flexibility towards future changes, whilst simultaneously be capable of acting on short-term demands in order to address the complexity of public spaces within urban areas. This research evaluated two case studies of different cities in Belgium which successfully transformed spaces into lively public places. The transformation was illustrated and evaluated by means of visual analyses and space usage analyses of the original and redesigned space, along with the experience and value that the redesign brought to the area. Selected design elements were identified and evaluated based on the role in the transformation process, in an attempt to draw conclusions with regards to theory-practice relevance and to guide the transformation of space to place of (similar) public spaces.

Keywords: space, place, transformation, case studies

Procedia PDF Downloads 255
6020 Key Technologies and Evolution Strategies for Computing Force Bearer Network

Authors: Zhaojunfeng

Abstract:

Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.

Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies

Procedia PDF Downloads 105