Search results for: branched network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4633

Search results for: branched network

4633 Fast Reductive Defluorination of Branched Perfluorooctane Sulfonic Acids by Cobalt Phthalocyanine: Electrochemical Studies and Mechanistic Insights

Authors: Maryam Mirabediny, Tsz Tin Yu, Jun Sun, Matthew Lee, Denis M. O’Carroll, Michael J. Manefield, Björn Akermark, Biswanath Das, Naresh Kumar

Abstract:

Branched perfluorooctane sulfonic acid (PFOS) is recognized as a threatening environmental pollutant due to its high persistence and bioaccumulation in various environmental matrices as well as for its toxic effects on humans and wildlife, even at very low concentrations. This study reports the first investigation of branched PFOS defluorination catalyzed by metal phthalocyanines. The reaction conditions were optimized using the different reductants and temperatures. Cobalt phthalocyanine, when combined with Ti citrate as a reducing agent, was able to defluorinate 10.9% of technical PFOS within 8 hours. In contrast, vitamin B12 only showed 2.4% defluorination during the same period under similar conditions. The defluorination mediated by cobalt phthalocyanine and Ti citrate system corresponds to 54.5% of all branched PFOS isomers (br-PFOS isomers). Isomer-specific degradation was also investigated via high-resolution LC-orbitrap, followed by their relative rates. The difference in catalytic efficacy of various phthalocyanine complexes is rationalized by their structures and electrochemical response. Lastly, a new defluorination mechanism is proposed based on the newly detected degradation products after the phthalocyanines treatment and the previous studies.

Keywords: branched isomers, catalyst, reductive defluorination, water remediation

Procedia PDF Downloads 71
4632 Identification of Soft Faults in Branched Wire Networks by Distributed Reflectometry and Multi-Objective Genetic Algorithm

Authors: Soumaya Sallem, Marc Olivas

Abstract:

This contribution presents a method for detecting, locating, and characterizing soft faults in a complex wired network. The proposed method is based on multi-carrier reflectometry MCTDR (Multi-Carrier Time Domain Reflectometry) combined with a multi-objective genetic algorithm. In order to ensure complete network coverage and eliminate diagnosis ambiguities, the MCTDR test signal is injected at several points on the network, and the data is merged between different reflectometers (sensors) distributed on the network. An adapted multi-objective genetic algorithm is used to merge data in order to obtain more accurate faults location and characterization. The proposed method performances are evaluated from numerical and experimental results.

Keywords: wired network, reflectometry, network distributed diagnosis, multi-objective genetic algorithm

Procedia PDF Downloads 160
4631 An Experimental Investigation of Microscopic and Macroscopic Displacement Behaviors of Branched-Preformed Particle Gel in High Temperature Reservoirs

Authors: Weiyao Zhu, Bingbing Li, Yajing Liu, Zhiyong Song

Abstract:

Branched-preformed particle gel (B-PPG) is a newly developed profile control and oil displacement agent for enhanced oil recovery in major oilfields. To provide a better understanding of the performance of B-PPG in high temperature reservoirs, a comprehensive experimental investigation was conducted by utilizing glass micromodel and synthetic core. The microscopic experimental results show that the B-PPG can selectively flow and plug in large pores. In terms of enhanced oil recovery, the decrease of residual oil in the margin regions (24.6%) was higher than that in the main stream (13.7%), which indicates it enlarged the sweep area. In addition, the effects of B-PPG injection concentration and injection rate on enhanced oil recovery were implemented by core flooding. The macroscopic experimental results indicate that the enhanced oil recovery increased with the increasing of injection concentration. However, the injection rate had a peak value. It is significant to get insight into the behaviors of B-PPG in reservoirs.

Keywords: branched-preformed particle gel, enhanced oil recovery, micromodel, core flooding

Procedia PDF Downloads 166
4630 Evaluation of Serine and Branched Chain Amino Acid Levels in Depression and the Beneficial Effects of Exercise in Rats

Authors: V. A. Doss, R. Sowndarya, K. Juila Rose Mary

Abstract:

Objective: Amino acid neurotransmitter system dysfunction plays a major role in the pathophysiology of depression. The objective of the present study was to identify the amino acids as possible metabolite biomarkers for depression using GCMS (Gas Chromatography Mass Spectrometry) before and after exercise regimen in brain samples of depression induced animal models. Methods: Depression-like behaviour was induced by Chronic Unpredictable mild stress (CUMS). Severity of depression was measured by forced swim test (FST) and sucrose consumption test (SCT). Swimming protocol was followed for 4 weeks of exercise treatment. Brain obtained from depressed and exercise treated rats were used for the metabolite analysis by GCMS. Subsequent statistical analysis obtained by ANOVA followed by post hoc test revealed significant metabolic changes. Results: Amino acids such as alanine, glycine, serine, glutamate, homocysteine, proline and branched chain aminoacids (BCAs) Leucine, Isoleucine, Valine were determined in brain samples of control, depressed and exercised groups. Among these amino acids, the levels of D-Serine and branched chain amino acids were found to be decreased in depression induced rats. After four weeks of swimming exercise regimen, there were improvements in the levels of serine and Branched chain amino acids. Conclusion: We suggest that Serine and BCAs may be investigated as potential metabolite markers using GCMS and their beneficial metabolic changes in Exercise.

Keywords: metabolomics, depression, forced swim test, exercise, amino acid metabolites, GCMS, biomarker

Procedia PDF Downloads 290
4629 Elevated Reductive Defluorination of Branched Per and Polyfluoroalkyl Substances by Soluble Metal-Porphyrins and New Mechanistic Insights on the Degradation

Authors: Jun Sun, Tsz Tin Yu, Maryam Mirabediny, Matthew Lee, Adele Jones, Denis M. O’Carroll, Michael J. Manefield, Björn Åkermark, Biswanath Das, Naresh Kumar

Abstract:

Reductive defluorination has emerged as a sustainable approach to clean water from Per and polyfluoroalkyl substances (PFASs), also known as forever organic containments. For last few decades, nano zero valent metals (nZVMs) have been intensively applied in the reductive remediation of groundwater contaminated with chlorinated organic compounds due to its low redox potential, easy application, and low production cost. However, there is inadequate information on the effective reductive defluorination of linear or branched PFAS using nZVMs as reductants because of the lack of suitable catalysts. CoII-5,10,15,20-Tetraphenyl-21H,23H-porphyrin (CoTPP) has been recently reported for effective catalyzing reductive defluorination of branched (br-) perfluorooctane sulfonate (PFOS) by using TiIII citrate as reductant. However, the low water solubility of CoTPP limited its applicability. Here, we explored a series of structurally related soluble cobalt porphyrin catalysts based on our previously reported best performing CoTPP. All soluble porphyrins [[meso-tetra(4-carboxyphenyl)porphyrinato]cobalt(III)]Cl·₇H₂O (CoTCPP), [[meso-tetra(4-sulfonatophenyl) porphyrinato]cobalt(III)]·9H2O (CoTPPS), and [[meso-tetra(4-N-methylpyridyl) porphyrinato]cobalt(II)](I)₄·₄H₂O (CoTMpyP) displayed better defluorination efficiencies than CoTPP. Especially, CoTMpyP presented the best defluorination efficiency for br-PFOS (94 %), branched perfluorooctanoic acid (PFOA) (89 %), and 3,7-Perfluorodecanoic acid (PFDA) (60 %) after 1 day at 70 0C. CoTMpyP-nZn0 system showed 88-164 times higher defluorination rate than VB12-nZn0 system in terms of all investigated br-PFASs. The CoTMpyP-nZn0 also performed effectively at room temperature, demonstrating the potential prospect for in-situ reductive systems. Based on the analysis of the intermediate products, the calculated bond dissociation energies (BDEs) and possible first interaction between CoTMpyP and PFAS, degradation pathways of 3,7-PFDA and 6-PFOS are proposed.

Keywords: cationic, soluble porphyrin, cobalt, vitamin b12, pfas, reductive defluorination

Procedia PDF Downloads 52
4628 An Economic Way to Toughen Poly Acrylic Acid Superabsorbent Polymer Using Hyper Branched Polymer

Authors: Nazila Dehbari, Javad Tavakoli, Yakani Kambu, Youhong Tang

Abstract:

Superabsorbent hydrogels (SAP), as an enviro-sensitive material have been widely used for industrial and biomedical applications due to their unique structure and capabilities. Poor mechanical properties of SAPs - which is extremely related to their large volume change – count as a great weakness in adopting for high-tech applications. Therefore, improving SAPs’ mechanical properties via toughening methods by mixing different types of cross-linked polymer or introducing energy-dissipating mechanisms is highly focused. In this work, in order to change the intrinsic brittle character of commercialized Poly Acrylic Acid (here as SAP) to be semi-ductile, a commercial available highly branched tree-like dendritic polymers with numerous –OH end groups known as hyper-branched polymer (HB) has been added to PAA-SAP system in a single step, cost effective and environment friendly solvent casting method. Samples were characterized by FTIR, SEM and TEM and their physico-chemical characterization including swelling capabilities, hydraulic permeability, surface tension and thermal properties had been performed. Toughness energy, stiffness, elongation at breaking point, viscoelastic properties and samples extensibility were mechanical properties that had been performed and characterized as a function of samples lateral cracks’ length in different HB concentration. Addition of HB to PAA-SAP significantly improved mechanical and surface properties. Increasing equilibrium swelling ratio by about 25% had been experienced by the SAP-HB samples in comparison with SAPs; however, samples swelling kinetics remained without changes as initial rate of water uptake and equilibrium time haven’t been subjected to any changes. Thermal stability analysis showed that HB is participating in hybrid network formation while improving mechanical properties. Samples characterization by TEM showed that, the aggregated HB polymer binders into nano-spheres with diameter in range of 10–200 nm. So well dispersion in the SAP matrix occurred as it was predictable due to the hydrophilic character of the numerous hydroxyl groups at the end of HB which enhance the compatibility of HB with PAA-SAP. As the profused -OH groups in HB could react with -COOH groups in the PAA-SAP during the curing process, the formation of a 2D structure in the SAP-HB could be attributed to the strong interfacial adhesion between HB and the PAA-SAP matrix which hinders the activity of PAA chains (SEM analysis). FTIR spectra introduced new peaks at 1041 and 1121 cm-1 that attributed to the C–O(–OH) stretching hydroxyl and O–C stretching ester groups of HB polymer binder indicating the incorporation of HB polymer into the SAP structure. SAP-HB polymer has significant effects on the final mechanical properties. The brittleness of PAA hydrogels are decreased by introducing HB as the fracture energies of hydrogels increased from 8.67 to 26.67. PAA-HBs’ stretch ability enhanced about 10 folds while reduced as a function of different notches depth.

Keywords: superabsorbent polymer, toughening, viscoelastic properties, hydrogel network

Procedia PDF Downloads 297
4627 Self-Propelled Intelligent Robotic Vehicle Based on Octahedral Dodekapod to Move in Active Branched Pipelines with Variable Cross-Sections

Authors: Sergey N. Sayapin, Anatoly P. Karpenko, Suan H. Dang

Abstract:

Comparative analysis of robotic vehicles for pipe inspection is presented in this paper. The promising concept of self-propelled intelligent robotic vehicle (SPIRV) based on octahedral dodekapod for inspection and operation in active branched pipelines with variable cross-sections is reasoned. SPIRV is able to move in pipeline, regardless of its spatial orientation. SPIRV can also be used to move along the outside of the pipelines as well as in space between surfaces of annular tubes. Every one of faces of the octahedral dodekapod can clamp/unclamp a thing with a closed loop surface of various forms as well as put pressure on environmental surface of contact. These properties open new possibilities for its applications in SPIRV. We examine design principles of octahedral dodekapod as future intelligent building blocks for various robotic vehicles that can self-move and self-reconfigure.

Keywords: Modular robot, octahedral dodekapod, pipe inspection robot, spatial parallel structure

Procedia PDF Downloads 476
4626 Branched Chain Amino Acid Kinesio PVP Gel Tape from Extract of Pea (Pisum sativum L.) Based on Ultrasound-Assisted Extraction Technology

Authors: Doni Dermawan

Abstract:

Modern sports competition as a consequence of the increase in the value of the business and entertainment in the field of sport has been demanding athletes to always have excellent physical endurance performance. Physical exercise is done in a long time, and intensive may pose a risk of muscle tissue damage caused by the increase of the enzyme creatine kinase. Branched Chain Amino Acids (BCAA) is an essential amino acid that is composed of leucine, isoleucine, and valine which serves to maintain muscle tissue, keeping the immune system, and prevent further loss of coordination and muscle pain. Pea (Pisum sativum L.) is a kind of leguminous plants that are rich in Branched Chain Amino Acids (BCAA) where every one gram of protein pea contains 82.7 mg of leucine; 56.3 mg isoleucine; and 56.0 mg of valine. This research aims to develop Branched Chain Amino Acids (BCAA) from pea extract is applied in dosage forms Gel PVP Kinesio Tape technology using Ultrasound-assisted Extraction. The method used in the writing of this paper is the Cochrane Collaboration Review that includes literature studies, testing the quality of the study, the characteristics of the data collection, analysis, interpretation of results, and clinical trials as well as recommendations for further research. Extraction of BCAA in pea done using ultrasound-assisted extraction technology with optimization variables includes the type of solvent extraction (NaOH 0.1%), temperature (20-250C), time (15-30 minutes) power (80 watt) and ultrasonic frequency (35 KHz). The advantages of this extraction method are the level of penetration of the solvent into the membrane of the cell is high and can increase the transfer period so that the BCAA substance separation process more efficient. BCAA extraction results are then applied to the polymer PVP (Polyvinylpyrrolidone) Gel powder composed of PVP K30 and K100 HPMC dissolved in 10 mL of water-methanol (1: 1) v / v. Preparations Kinesio Tape Gel PVP is the BCAA in the gel are absorbed into the muscle tissue, and joints through tensile force then provides stimulation to the muscle circulation with variable pressure so that the muscle can increase the biomechanical movement and prevent damage to the muscle enzyme creatine kinase. Analysis and evaluation of test preparation include interaction, thickness, weight uniformity, humidity, water vapor permeability, the levels of the active substance, content uniformity, percentage elongation, stability testing, release profile, permeation in vitro and in vivo skin irritation testing.

Keywords: branched chain amino acid, BCAA, Kinesio tape, pea, PVP gel, ultrasound-assisted extraction

Procedia PDF Downloads 263
4625 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 369
4624 Optimization of Bifurcation Performance on Pneumatic Branched Networks in next Generation Soft Robots

Authors: Van-Thanh Ho, Hyoungsoon Lee, Jaiyoung Ryu

Abstract:

Efficient pressure distribution within soft robotic systems, specifically to the pneumatic artificial muscle (PAM) regions, is essential to minimize energy consumption. This optimization involves adjusting reservoir pressure, pipe diameter, and branching network layout to reduce flow speed and pressure drop while enhancing flow efficiency. The outcome of this optimization is a lightweight power source and reduced mechanical impedance, enabling extended wear and movement. To achieve this, a branching network system was created by combining pipe components and intricate cross-sectional area variations, employing the principle of minimal work based on a complete virtual human exosuit. The results indicate that modifying the cross-sectional area of the branching network, gradually decreasing it, reduces velocity and enhances momentum compensation, preventing flow disturbances at separation regions. These optimized designs achieve uniform velocity distribution (uniformity index > 94%) prior to entering the connection pipe, with a pressure drop of less than 5%. The design must also consider the length-to-diameter ratio for fluid dynamic performance and production cost. This approach can be utilized to create a comprehensive PAM system, integrating well-designed tube networks and complex pneumatic models.

Keywords: pneumatic artificial muscles, pipe networks, pressure drop, compressible turbulent flow, uniformity flow, murray's law

Procedia PDF Downloads 37
4623 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 469
4622 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 214
4621 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 418
4620 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 302
4619 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 611
4618 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 417
4617 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 219
4616 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 396
4615 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 425
4614 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 701
4613 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 164
4612 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 391
4611 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 132
4610 Cheiloscopy: A Study on Predominant Lip Print Patterns among the Gujarati Population

Authors: Pooja Ahuja, Tejal Bhutani, M. S. Dahiya

Abstract:

Cheiloscopy, the study of lip prints, is a tool in forensic investigation technique that deals with identification of individuals based on lips patterns. The objective of this study is to determine predominant lip print pattern found among the Gujarati population, to evaluate whether any sex difference exists and to study the permanence of the pattern over six months duration. The study comprised of 100 healthy individuals (50 males and 50 females), in the age group of 18 to 25 years of Gujarati population of the Gandhinagar region of the Gujarat state, India. By using Suzuki and Tsuchihashi classification, Lip prints were then divided into four quadrants and also classified on the basis of peripheral shape of the lips. Materials used to record the lip prints were dark brown colored lipstick, cellophane tape, and white bond paper. Lipstick was applied uniformly, and lip prints were taken on the glued portion of cellophane tape and then stuck on to a white bond paper. These lip prints were analyzed with magnifying lens and virtually with stereo microscope. On the analysis of the subject population, results showed Branched pattern Type II (29.57 percentage) to be most predominant in the Gujarati population. Branched pattern Type II (35.60 percentage) and long vertical Type I (28.28 percentage) were most prevalent in males and females respectively and large full lips were most predominantly present in both the sexes. The study concludes that lip prints in any form can be an effective tool for identification of an individual in a closed or open group forms.

Keywords: cheiloscopy, lip pattern, predomianant, Gujarati population

Procedia PDF Downloads 272
4609 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 486
4608 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 294
4607 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 237
4606 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 245
4605 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 370
4604 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 610