Search results for: network intrusion prevention
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6185

Search results for: network intrusion prevention

6065 Identification of Bayesian Network with Convolutional Neural Network

Authors: Mohamed Raouf Benmakrelouf, Wafa Karouche, Joseph Rynkiewicz

Abstract:

In this paper, we propose an alternative method to construct a Bayesian Network (BN). This method relies on a convolutional neural network (CNN classifier), which determinates the edges of the network skeleton. We train a CNN on a normalized empirical probability density distribution (NEPDF) for predicting causal interactions and relationships. We have to find the optimal Bayesian network structure for causal inference. Indeed, we are undertaking a search for pair-wise causality, depending on considered causal assumptions. In order to avoid unreasonable causal structure, we consider a blacklist and a whitelist of causality senses. We tested the method on real data to assess the influence of education on the voting intention for the extreme right-wing party. We show that, with this method, we get a safer causal structure of variables (Bayesian Network) and make to identify a variable that satisfies the backdoor criterion.

Keywords: Bayesian network, structure learning, optimal search, convolutional neural network, causal inference

Procedia PDF Downloads 144
6064 An Adjusted Network Information Criterion for Model Selection in Statistical Neural Network Models

Authors: Christopher Godwin Udomboso, Angela Unna Chukwu, Isaac Kwame Dontwi

Abstract:

In selecting a Statistical Neural Network model, the Network Information Criterion (NIC) has been observed to be sample biased, because it does not account for sample sizes. The selection of a model from a set of fitted candidate models requires objective data-driven criteria. In this paper, we derived and investigated the Adjusted Network Information Criterion (ANIC), based on Kullback’s symmetric divergence, which has been designed to be an asymptotically unbiased estimator of the expected Kullback-Leibler information of a fitted model. The analyses show that on a general note, the ANIC improves model selection in more sample sizes than does the NIC.

Keywords: statistical neural network, network information criterion, adjusted network, information criterion, transfer function

Procedia PDF Downloads 536
6063 Prevention of Corruption in Public Purchases

Authors: Anatoly Krivinsh

Abstract:

The results of dissertation research "Preventing and combating corruption in public procurement" are presented in this publication. The study was conducted 2011 till 2013 in a Member State of the European Union, in the Republic of Latvia. Goal of the thesis is to explore corruption prevention and combating issues in public procurement sphere, to identify the prevalence rates, determinants and contributing factors and prevention opportunities in Latvia. In the first chapter the author analyses theoretical aspects of understanding corruption in public procurement, with particular emphasis on corruption definition problem, its nature, causes and consequences. A separate section is dedicated to the public procurement concept, mechanism and legal framework. In the first part of this work the author presents cognitive methodology of corruption in public procurement field, based on which the author has carried out an analysis of corruption situation in public procurement in Republic of Latvia. In the second chapter of the thesis, the author analyzes the problem of corruption in public procurement, including its historical aspects, typology and classification of corruption subjects involved, corruption risk elements in public procurement and their identification. During the development of the second chapter author's practical experience in public procurements was widely used. The third and fourth chapter deals with issues related to the prevention and combating corruption in public procurement, namely the operation of the concept, principles, methods and techniques, subjects in Republic of Latvia, as well as an analysis of foreign experience in preventing and combating corruption. The fifth chapter is devoted to the corruption prevention and combating perspectives and their assessment. In this chapter the author has made the evaluation of corruption prevention and combating measures efficiency in Republic of Latvia, assessment of anti-corruption legislation development stage in public procurement field in Latvia.

Keywords: prevention of corruption, public purchases, good governance, human rights

Procedia PDF Downloads 304
6062 Fog Computing- Network Based Computing

Authors: Navaneeth Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat

Abstract:

Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.

Keywords: cloud computing, fog computing, network devices, appstore

Procedia PDF Downloads 352
6061 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network

Authors: M. Kollar, A. Zieba

Abstract:

In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.

Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay

Procedia PDF Downloads 338
6060 Value Co-Creation Model for Relationships Management

Authors: Kolesnik Nadezda A.

Abstract:

The research aims to elaborate inter-organizational network relationships management model to maximize value co-creation. We propose a network management framework that requires evaluation of network partners with respect to their position and role in network; and elaboration of appropriate relationship development strategy with partners in network. Empirical research and approval is based on the case study method, including structured in-depth interviews with the companies from b2b market.

Keywords: inter-organizational networks, value co-creation, model, B2B market

Procedia PDF Downloads 426
6059 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 346
6058 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 390
6057 Child Maltreatment Prevention Readiness Assessment in the Kingdom of Saudi Arabia

Authors: Majid Al-Eissa, Hassan Saleheen, Fatimah Al Shehri, Maha AlMuneef

Abstract:

Global efforts are being made to combat child maltreatment (CM); however, in 2011 the Kingdom of Saudi Arabia’s (KSA) response to this issue was found to be mediocre. Several developments have been implemented in KSA since then, and reevaluation is now necessary. The aim of this study is to assess the CM-prevention readiness (CMPR) of KSA in regard to implementing large-scale, evidence-based CM-prevention programs. Participants were decision makers and senior managers in the field of CM. Face-to-face interviews were conducted in the participants’ offices. This was a cross-sectional study. We used the multi-dimensional tool “Readiness Assessment for the Prevention of Child Maltreatment - short version,” which examines ten dimensions concerning this topic. Comparison between the results of this study and those of the 2011 examination was performed to determine how the situation in KSA has changed. Sixty informants were interviewed; the majority being females (57%) and from governmental institutions (56%). The average total score for the ten dimensions was 47.4%, an increase from the 43.7% reported in 2011. The strongest dimensions were legislations and mandates (8.3/10), followed by knowledge (7.1/10) and institutional links and resources (5.8/10). The lowest scores concerned human and technical resources (1.7/10) and attitude towards CM (2.8/10). Compared to the 2011 results, some dimensions showed significant improvements, but the majority had remained consistent. Time and commitment are necessary to secure CMPR improvement. Periodic assessment of CMPR is required to provide proper recommendations to the government regarding the progress of CM-prevention strategies.

Keywords: assessment, child maltreatment, prevention, readiness, Saudi Arabia

Procedia PDF Downloads 155
6056 Study on Disaster Prevention Plan for an Electronic Industry in Thailand

Authors: S. Pullteap, M. Pathomsuriyaporn

Abstract:

In this article, a study of employee’s opinion to the factors that affect to the flood preventive and the corrective action plan in an electronic industry at the Sharp Manufacturing (Thailand) Co., Ltd. has been investigated. The surveys data of 175 workers and supervisors have, however, been selected for data analysis. The results is shown that the employees emphasize about the needs in a subsidy at the time of disaster at high levels of 77.8%, as the plan focusing on flood prevention of the rehabilitation equipment is valued at the intermediate level, which is 79.8%. Demonstration of the hypothesis has found that the different education levels has thus been affected to the needs factor at the flood disaster time. Moreover, most respondents give priority to flood disaster risk management factor. Consequently, we found that the flood prevention plan is valued at high level, especially on information monitoring, which is 93.4% for the supervisor item. The respondents largely assume that the flood will have impacts on the industry, up to 80%, thus to focus on flood management plans is enormous.

Keywords: flood prevention plan, flood event, electronic industrial plant, disaster, risk management

Procedia PDF Downloads 287
6055 The Phenomenon of Suicide in the Social Consciousness: Recommendations for the Educational Strategy of the Society and Prevention of Suicide

Authors: Aldona Anna Osajda

Abstract:

Suicide is a phenomenon that worries both the public and scientists in various fields. In society, suicide is a taboo subject, and in addition, there are many myths and stereotypes that are detrimental to the proper understanding and appropriate response of a person at risk of suicide. It is necessary to educate society and the suicide prevention system for various age groups. The research covers the level of knowledge and views of Polish society, including teachers and youth, regarding suicides. The main research problem is to establish the level of awareness of Polish society about the phenomenon of suicides. The study will be based on the diagnostic survey method, using the survey technique. Information about the research will be disseminated electronically on the Internet via social messaging. The collected data will be analyzed using appropriate statistics. On the basis of the obtained results, answers will be given to research questions, which will become the basis for designing an appropriate educational strategy for the society in the field of suicide and developing recommendations and recommendations for teachers to conduct classes in the field of suicide prevention for children and adolescents.

Keywords: phenomenon of suicides, suicide, suicide prevention, suicidology

Procedia PDF Downloads 168
6054 Sports: A Vital Tool for Promotion of Good Health and Prevention of Diseases

Authors: Agburuga Obi, Madumere Akuego Jane

Abstract:

This paper explores the important role sports can play in the promotion of good health and prevention of diseases. Technological advancements in today’s world has come along with some difficulties to man. This is because work formally done by man has been taken over by machines, thus, man has become sedentary. This has created a lot of health problems to man such as cardiovascular diseases, diabetes, cancer, obesity, and osteoporosis. To nip this ugly situation in the bud, the following recommendations are made: specific measures should be taken to raise the awareness within the government, key sectors and the population of the diverse benefits or physical activity and sports and the risk and costs of inactivity, provision of equipment, facilities for sports and recreational activities in every community, participation in physical activities in sports if not on daily basis at least thrice a week.

Keywords: physical activities, sport, good health, prevention, diseases

Procedia PDF Downloads 728
6053 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 545
6052 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 423
6051 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 500
6050 Nutritional Benefits of Soy: An Implication for Health Education

Authors: Mbadugha Esther Ifeoma

Abstract:

Soybeans, like other legumes are rich in nutrients. However, the nutrient profile of soybeans differs in some important ways from most other legumes. Among other nutrients, soy is high in protein, carbohydrates, and fibers, is rich in vitamins, minerals and unsaturated fatty acids and is low in saturated fatty acids. Because of its high nutritional value, it has been rated to be equivalent to meats, eggs and milk. Soy has many health benefits including prevention of coronary heart disease, prevention of cancer growth, improvement of cognitive function, promotion of bone health, prevention of obesity, prevention of type II diabetes and promotion of growth of normal floras in the colon. Soybean consumption is also associated with some side effects which include allergy, flatulence and abdominal discomfort. Nurses/health care providers should therefore, educate clients on the precautionary measures to be taken in preparing soy food products in order to reduce to the barest minimum the side effects, while encouraging them to include soy as part of their daily meals for optimal health and vitality.

Keywords: health benefit, health education, nutritional benefit, soybeans

Procedia PDF Downloads 458
6049 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 323
6048 Nutriscience Project: A Web-Based Intervention to Improve Nutritional Literacy among Families and Educators of Pre-School Children

Authors: R. Barros, J. Azevedo, P. Padrão, M. Gregório, I. Pádua, C. Almeida, C. Rodrigues, P. Fontes, A. Coelho

Abstract:

Recent evidence shows a positive association between nutritional literacy and healthy eating. Traditional nutrition education strategies for childhood obesity prevention have shown weak effect. The Nutriscience project aims to create and evaluate an innovative and multidisciplinary strategy for promoting effective and accessible nutritional information to children, their families, and educators. Nutriscience is a one-year prospective follow-up evaluation study including pre-school children (3-5 y), who attend national schools’ network (29). The project is structured around a web-based intervention, using an on-line interactive platform, and focus on increasing fruit and vegetable consumption, and reducing sugar and salt intake. The platform acts as a social network where educational materials, games, and nutritional challenges are proposed in a gamification approach that promotes family and community social ties. A nutrition Massive Online Open Course is developed for educators, and a national healthy culinary contest will be promoted on TV channel. A parental self-reported questionnaire assessing sociodemographic and nutritional literacy (knowledge, attitudes, skills) is administered (baseline and end of the intervention). We expect that results on nutritional literacy from the presented strategy intervention will give us important information about the best practices for health intervention with kindergarten families. This intervention program using a digital interactive platform could be an educational tool easily adapted and disseminated for childhood obesity prevention.

Keywords: childhood obesity, educational tool, nutritional literacy, web-based intervention

Procedia PDF Downloads 314
6047 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 105
6046 An Evaluation of the Efficacy of School-Based Suicide Prevention Programs

Authors: S. Wietrzychowski

Abstract:

The following review has identified specific programs, as well as the elements of these programs, that have been shown to be most effective in preventing suicide in schools. Suicide is an issue that affects many students each year. Although this is a prominent issue, there are few prevention programs used within schools. The primary objective of most prevention programs is to reduce risk factors such as depression and hopelessness, and increase protective factors like support systems and help-seeking behaviors. Most programs include a gatekeeper training model, education component, peer support group, and/or counseling/treatment. Research shows that some of these programs, like the Signs of Suicide and Youth Aware of Mental Health Programme, are effective in reducing suicide behaviors and increasing protective factors. These programs have been implemented in many countries across the world and have shown promising results. Since schools can provide easy access to adolescents, implement education programs, and train staff members and students how to identify and to report suicide behaviors, school-based programs seem to be the best way to prevent suicide among adolescents. Early intervention may be an effective way to prevent suicide. Although, since early intervention is not always an option, school-based programs in high schools have also been shown to decrease suicide attempts by up to 50%. As a result of this presentation, participants will be able to 1.) list at least 2 evidence-based suicide prevention programs, 2.) identify at least 3 factors which protect against suicide, and 3.) describe at least 3 risk factors for suicide.

Keywords: school, suicide, prevention, programs

Procedia PDF Downloads 316
6045 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 147
6044 Bias Prevention in Automated Diagnosis of Melanoma: Augmentation of a Convolutional Neural Network Classifier

Authors: Kemka Ihemelandu, Chukwuemeka Ihemelandu

Abstract:

Melanoma remains a public health crisis, with incidence rates increasing rapidly in the past decades. Improving diagnostic accuracy to decrease misdiagnosis using Artificial intelligence (AI) continues to be documented. Unfortunately, unintended racially biased outcomes, a product of lack of diversity in the dataset used, with a noted class imbalance favoring lighter vs. darker skin tone, have increasingly been recognized as a problem.Resulting in noted limitations of the accuracy of the Convolutional neural network (CNN)models. CNN models are prone to biased output due to biases in the dataset used to train them. Our aim in this study was the optimization of convolutional neural network algorithms to mitigate bias in the automated diagnosis of melanoma. We hypothesized that our proposed training algorithms based on a data augmentation method to optimize the diagnostic accuracy of a CNN classifier by generating new training samples from the original ones will reduce bias in the automated diagnosis of melanoma. We applied geometric transformation, including; rotations, translations, scale change, flipping, and shearing. Resulting in a CNN model that provided a modifiedinput data making for a model that could learn subtle racial features. Optimal selection of the momentum and batch hyperparameter increased our model accuracy. We show that our augmented model reduces bias while maintaining accuracy in the automated diagnosis of melanoma.

Keywords: bias, augmentation, melanoma, convolutional neural network

Procedia PDF Downloads 177
6043 Safe Zone: A Framework for Detecting and Preventing Drones Misuse

Authors: AlHanoof A. Alharbi, Fatima M. Alamoudi, Razan A. Albrahim, Sarah F. Alharbi, Abdullah M Almuhaideb, Norah A. Almubairik, Abdulrahman Alharby, Naya M. Nagy

Abstract:

Recently, drones received a rapid interest in different industries worldwide due to its powerful impact. However, limitations still exist in this emerging technology, especially privacy violation. These aircrafts consistently threaten the security of entities by entering restricted areas accidentally or deliberately. Therefore, this research project aims to develop drone detection and prevention mechanism to protect the restricted area. Until now, none of the solutions have met the optimal requirements of detection which are cost-effectiveness, high accuracy, long range, convenience, unaffected by noise and generalization. In terms of prevention, the existing methods are focusing on impractical solutions such as catching a drone by a larger drone, training an eagle or a gun. In addition, the practical solutions have limitations, such as the No-Fly Zone and PITBULL jammers. According to our study and analysis of previous related works, none of the solutions includes detection and prevention at the same time. The proposed solution is a combination of detection and prevention methods. To implement the detection system, a passive radar will be used to properly identify the drone against any possible flying objects. As for the prevention, jamming signals and forceful safe landing of the drone integrated together to stop the drone’s operation. We believe that applying this mechanism will limit the drone’s invasion of privacy incidents against highly restricted properties. Consequently, it effectively accelerates drones‘ usages at personal and governmental levels.

Keywords: detection, drone, jamming, prevention, privacy, RF, radar, UAV

Procedia PDF Downloads 178
6042 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 358
6041 Identification of Suitable Sites for Rainwater Harvesting in Salt Water Intruded Area by Using Geospatial Techniques in Jafrabad, Amreli District, India

Authors: Pandurang Balwant, Ashutosh Mishra, Jyothi V., Abhay Soni, Padmakar C., Rafat Quamar, Ramesh J.

Abstract:

The sea water intrusion in the coastal aquifers has become one of the major environmental concerns. Although, it is a natural phenomenon but, it can be induced with anthropogenic activities like excessive exploitation of groundwater, seacoast mining, etc. The geological and hydrogeological conditions including groundwater heads and groundwater pumping pattern in the coastal areas also influence the magnitude of seawater intrusion. However, this problem can be remediated by taking some preventive measures like rainwater harvesting and artificial recharge. The present study is an attempt to identify suitable sites for rainwater harvesting in salt intrusion affected area near coastal aquifer of Jafrabad town, Amreli district, Gujrat, India. The physico-chemical water quality results show that out of 25 groundwater samples collected from the study area most of samples were found to contain high concentration of Total Dissolved Solids (TDS) with major fractions of Na and Cl ions. The Cl/HCO3 ratio was also found greater than 1 which indicates the salt water contamination in the study area. The geophysical survey was conducted at nine sites within the study area to explore the extent of contamination of sea water. From the inverted resistivity sections, low resistivity zone (<3 Ohm m) associated with seawater contamination were demarcated in North block pit and south block pit of NCJW mines, Mitiyala village Lotpur and Lunsapur village at the depth of 33 m, 12 m, 40 m, 37 m, 24 m respectively. Geospatial techniques in combination of Analytical Hierarchy Process (AHP) considering hydrogeological factors, geographical features, drainage pattern, water quality and geophysical results for the study area were exploited to identify potential zones for the Rainwater Harvesting. Rainwater harvesting suitability model was developed in ArcGIS 10.1 software and Rainwater harvesting suitability map for the study area was generated. AHP in combination of the weighted overlay analysis is an appropriate method to identify rainwater harvesting potential zones. The suitability map can be further utilized as a guidance map for the development of rainwater harvesting infrastructures in the study area for either artificial groundwater recharge facilities or for direct use of harvested rainwater.

Keywords: analytical hierarchy process, groundwater quality, rainwater harvesting, seawater intrusion

Procedia PDF Downloads 150
6040 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 191
6039 Design of Distribution Network for Gas Cylinders in Jordan

Authors: Hazem J. Smadi

Abstract:

Performance of a supply chain is directly related to a distribution network that entails the location of storing materials or products and how products are delivered to the end customer through different stages in the supply chain. This study analyses the current distribution network used for delivering gas cylinders to end customer in Jordan. Evaluation of current distribution has been conducted across customer service components. A modification on the current distribution network in terms of central warehousing in each city in the country improves the response time and customer experience. 

Keywords: distribution network, gas cylinder, Jordan, supply chain

Procedia PDF Downloads 437
6038 Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria

Authors: Amos Olusola Akinola

Abstract:

The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer.

Keywords: internal control, internal system, internal audit, fraud prevention, fraud detection

Procedia PDF Downloads 354
6037 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 469
6036 Toward Green Infrastructure Development: Dispute Prevention Mechanisms along the Belt and Road and Beyond

Authors: Shahla Ali

Abstract:

In the context of promoting green infrastructure development, new opportunities are emerging to re-examine sustainable development practices. This paper presents an initial exploration of the development of community-investor dispute prevention and facilitation mechanisms in the context of the Belt and Road Initiative (BRI) spanning Asia, Africa, and Europe. Given the widescale impact of China’s multi-jurisdictional development initiative, learning how to coordinate with local communities is vital to realizing inclusive and sustainable growth. In the 20 years since the development of the first multilateral community-investor dispute resolution mechanism developed by the International Finance Centre/World Bank, much has been learned about public facilitation, community engagement, and dispute prevention during the early stages of major infrastructure development programs. This paper will explore initial findings as they relate to initiatives underway along the BRI within the Asian Infrastructure Investment Bank and the Asian Development Bank. Given the borderless nature of sustainability concerns, insights from diverse regions are critical to deepening insights into best practices. Drawing on a case-based methodology, this paper will explore the achievements, challenges, and lessons learned in community-investor dispute prevention and resolution for major infrastructure projects in the greater China region.

Keywords: law and development, dispute prevention, sustainable development, mitigation

Procedia PDF Downloads 76