Search results for: network worms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4617

Search results for: network worms

4617 Use of Fruit Beetles, Waxworms Larvae and Tiger Worms in Waste Conditioning for Composting

Authors: Waleed S. Alwaneen

Abstract:

In many countries, cow dung is used as farm manure and for biogas production. Several bacterial strains associated with cow dung such as Campylobacter, Salmonella sp. and Escherichia coli cause serious human diseases. The objective of the present study was to investigate the use of insect larvae including fruit beetle, waxworms and tiger worms to improve the breakdown of agricultural wastes and reduce their pathogen loads. Fresh cow faeces were collected from a cattle farm and distributed into plastic boxes (100 g/box). Each box was provided with 10 larvae of fruit beetle, Waxworms and Tiger worms, respectively. There were 3 replicates in each treatment including the control. Bacteria were isolated weekly from both control and cow faeces to which larvae were added to determine the bacterial populations. Results revealed that the bacterial load was higher in the cow faeces treated with fruit beetles than in the control, while the bacterial load was lower in the cow faeces treated with waxworms and tiger worms than in the control. The activities of the fruit beetle larvae led to the cow faeces being liquefied which provided a more conducive growing media for bacteria. Therefore, higher bacterial load in the cow faeces treated with fruit beetle might be attributed to the liquefaction of cow faeces.

Keywords: fruit beetle, waxworms, tiger worms, waste conditioning, composting

Procedia PDF Downloads 224
4616 The Effects of Cow Manure Treated by Fruit Beetle Larvae, Waxworms and Tiger Worms on Plant Growth in Relation to Its Use as Potting Compost

Authors: Waleed S. Alwaneen

Abstract:

Dairy industry is flourishing in world to provide milk and milk products to local population. Besides milk products, dairy industries also generate a substantial amount of cow manure that significantly affects the environment. Moreover, heat produced during the decomposition of the cow manure adversely affects the crop germination. Different companies are producing vermicompost using different species of worms/larvae to overcome the harmful effects using fresh manure. Tiger worm treatment enhanced plant growth, especially in the compost-manure ratio (75% compost, 25% cow manure), followed by a ratio of 50% compost, 50% cow manure.  Results also indicated that plant growth in Waxworm treated manure was weak as compared to plant growth in compost treated with Fruit Beetle (FB), Waxworms (WW), and Control (C) especially in the compost (25% compost, 75% cow manure) and 100% cow manure where there was no growth at all. Freshplant weight, fresh leaf weight and fresh root weight were significantly higher in the compost treated with Tiger worms in (75% compost, 25% cow manure); no evidence was seen for any significant differences in the dry root weight measurement between FB, Tiger worms (TW), WW, Control (C) in all composts. TW produced the best product, especially at the compost ratio of 75% compost, 25% cow manure followed by 50% compost, 50% cow manure.

Keywords: fruit beetle, tiger worms, waxworms, control

Procedia PDF Downloads 101
4615 Comparative Analysis of Pit Composting and Vermicomposting in a Tropical Environment

Authors: E. Ewemoje Oluseyi, T. A. Ewemoje, A. A. Adedeji

Abstract:

Biodegradable solid waste disposal and management has been a major problem in Nigeria and indiscriminate dumping of this waste either into watercourses or drains has led to environmental hazards affecting public health. The study investigated the nutrients level of pit composting and vermicomposting. Wooden bins 60 cm × 30 cm × 30 cm3 in size were constructed and bedding materials (sawdust, egg shell, paper and grasses) and red worms (Eisenia fetida) introduced to facilitate the free movement and protection of the worms against harsh weather. A pit of 100 cm × 100 cm × 100 cm3 was dug and worms were introduced into the pit, which was turned every two weeks. Food waste was fed to the red worms in the bin and pit, respectively. The composts were harvested after 100 days and analysed. The analyses gave: nitrogen has average value 0.87 % and 1.29 %; phosphorus 0.66 % and 1.78 %; potassium 4.35 % and 6.27 % for the pit and vermicomposting, respectively. Higher nutrient status of vermicomposting over pit composting may be attributed to the secretions in the intestinal tracts of worms which are more readily available for plant growth. However, iron and aluminium were more in the pit compost than the vermin compost and this may be attributed to the iron and aluminium already present in the soil before the composting took place. Other nutrients in ppm concentrations were aluminium 4,999.50 and 3,989.33; iron 2,131.83 and 633.40 for the pit and vermicomposting, respectively. These nutrients are only needed by plants in small quantities. Hence, vermicomposting has the higher concentration of essential nutrients necessary for healthy plant growth.

Keywords: food wastes, pit composting, plant nutrient status, tropical environment, vermicomposting

Procedia PDF Downloads 305
4614 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 131
4613 Waste Minimization through Vermicompost: An Alternative Approach

Authors: Mary Fabiola

Abstract:

Vermicompost is the product or process of composting using various worms. Large-scale vermicomposting is practiced in Canada, Italy, Japan, Malaysia, the Philippines, and the United States. The vermicompost may be used for farming, landscaping, and creating compost tea or for sale. Some of these operations produce worms for bait and/or home vermicomposting. As a processing system, The vermicomposting of organic waste is very simple. Worms ingest the waste material-break it up in their rudimentary. Gizzards, consume the digestible/putrefiable portion and then excrete a stable, Humus-like material that can be immediately marketed. Vermitechnology can be a promising technique that has shown its potential in certain challenging areas like augmentation of food production, waste recycling, management of solid wastes etc. There is no doubt that in India, where on side pollution is increasing due to accumulation of organic wastes and on the other side there is shortage of organic manure, which could increase the fertility and productivity of the land and produce nutritive and safe food. So, the scope for vermicomposting is enormous.

Keywords: pollution, solid wastes, vermicompost, waste recycling

Procedia PDF Downloads 392
4612 Molecular Detection and Isolation of Benzimidazole Resistant Haemonchus contortus from Pakistan

Authors: K. Ali, M. F. Qamar, M. A. Zaman, M. Younus, I. Khan, S. Ehtisham-ul-Haque, R. Tamkeen, M. I. Rashid, Q. Ali

Abstract:

This study centers on molecular identification of Haemonchus contortus and isolation of Benz-imidazoles (BZ) resistant strains. Different abattoirs’ of two geographic regions of Punjab (Pakistan) were frequently visited for the collection of worms. Out of 1500 (n=1500) samples that were morphologically confirmed as H. contortus, 30 worms were subjected to molecular procedures for isolation of resistant strains. Resistant worms (n=8) were further subjected to DNA gene sequencing. Bio edit sequence alignment editor software was used to detect the possible mutation, deletion, replacement of nucleotides. Genetic diversity was noticed and genetic variation existing in β-tubulin isotype 1 of the H. contortus population of small ruminants of different regions considered in this study. H. contortus showed three different type of genetic sequences. 75%, 37.5%, 25% and 12.5% of the studied samples showed 100% query cover and identity with isolates and clones of China, UK, Australia and other countries, respectively. Interestingly the neighbor countries such as India and Iran haven’t many similarities with the Pakistani isolates. Thus, it suggests that population density of same genetic makeup H. contortus is scattered worldwide rather than clustering in a single region.

Keywords: Haemonchus contortus, Benzimidazole resistant, β-tubulin-1 gene, abattoirs

Procedia PDF Downloads 147
4611 A Promising Thrombolytic and Anticoagulant Serine Protease Purified from Lug Worms Inhabiting Tidal Flats

Authors: Hye Jin Kim, Hwa Sung Shin

Abstract:

Ischemic stroke means the caused brain damage due to neurological defects, occurring occlusion of cerebral vascular resulting in thrombus or embolism. t-PA (tissue Plasminogen Activator) is the only thrombolytic agent passed the FDA (Food and Drug Administration). However, t-PA directly dissolves the thrombus (direct activity) through fibrinolysis, showing side effects such as re-occlusion. In this study, we evaluated the thrombolytic activities of the serine protease extracted from lugworms inhabiting tidal flats. The new serine protease identified as 38 kDa by SDS-PAGE was not toxic to brain endothelial cells line (hCMEC/D3). Also, the plasmin synthesis inhibition activity (indirect activity) of the new serine protease was confirmed through fibrin zymography assay and fibrin plate assay. It was higher than direct activity as compared to u-PA (urokinase Plasminogen Activator). The activities were found to be maintained at a wide range of temperature (4-70 ℃) and pH 7-10 compared to previous thrombolytic agents from the azocasein assay. In addition, the new serine protease has shown anticoagulant activity from fibrinogenolytic activity assay. In conclusion, the serine protease in lug worms inhabiting the tidal flats could be considered a promising thrombolytic candidate for the treatment of ischemic stroke.

Keywords: alkaline serine protease, bifunctional thrombolytic activity, fibrinolytic activity, ischemic stroke, lug worms

Procedia PDF Downloads 296
4610 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 327
4609 Incidence of Post Endoscopic Retrograde Cholangiopancreatography Biliary Ascariasis Diagnosed on Ultrasound

Authors: Shehzad Khan, Jehangir Khan, Shah Babar, Rashid Mahmood, Rizwan Khan, Sanya Hadi

Abstract:

Ascaris lumbricoides are familiar with the roundworm that causes biliary infections in humans. Nevertheless, ascariasis is primarily found in the jejunum and transferred in numerous body parts with the intake of Ascaris lumbricoides present in food and water. These study methods were implemented at the Saidu Teaching Hospital Radiology Department from December 2021 to January 2023. This study includes the participants suffering from biliary ascariasis admitted or visited Saidu Teaching Hospital in that time frame. Clinical assessment of the participants was done based on the appearance of signs and symptoms present in them. The participant's laboratory test was done to determine the level of basic body parameters. After that ultrasonography was used to diagnose the presence and appearance of worms. Endoscopic retrograde cholangiopancreatography (ERCP) was used to extract worms from biliary channels, and the incidence of post-ERCP biliary ascariasis was accessed with ultrasonography. This study's results show the presence of numerous types of worms in the biliary channels of patients. Also, the level of body parameters, for instance, neutrophil, hemoglobin, and others, were compared at the time of admission and at the time of discharge from the hospital. Furthermore, the incidence of post-ERCP biliary ascariasis was reported as 4% in females, and 1% in males, respectively.

Keywords: Ascaris, biliary, ERCP, ultrasound

Procedia PDF Downloads 59
4608 Study of the Efficacy of Cysteine Protease Inhibitors Alone or Combined with Praziquantel as Chemotherapy for Mice Schistosomiasis mansoni

Authors: Alyaa Ahmed Farid, Aida Ismail, Ibrahim Rabia, Azza Fahmy, Azza El Amir

Abstract:

This study was designed for assessment of 3 types of Cysteine protease inhibitors (CPIs) fluromethylketone (FMK), vinyl sulfone (VS) and sodium nitro prussid (SNP), to define which of them is the best? The experiments aimed to define the protective power of each inhibitor alone or combined with PZQ for curing S. mansoni infection in mice. In vitro, treated S. mansoni adult worms recorded a mortality rate after 1 hr of exposure to 500 ppm of FMK, VS and SNP as 75, 70 and 60%, while, treated cercaria recorded 75, 60 and 50%, respectively. FMK+PZQ treatment recorded the maximum reduction in worm burden (97.2% at 5 wk PI). VS treatment alone or combined with PZQ increases IgM, total IgG, IgG2 and IgG4 levels. In EM study of worm tegument, while only detachment of spines was observed in PZQ treated group, the completely implanted spines were reported in the degenerated tegument of adult worms in all groups treated with CPIs. Treatment with VS+PZQ increased Igs levels but, its effect was different on worm reduction. So, it is not enough to eliminate the infection and FMK+PZQ considered the antischistosomicidal drug of choice.

Keywords: praziquantel, fluromethylketone, vinyl sulfone, worm burden, immunoglobulin pattern

Procedia PDF Downloads 338
4607 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 369
4606 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 199
4605 An Evaluation of the Artificial Neural Network and Adaptive Neuro Fuzzy Inference System Predictive Models for the Remediation of Crude Oil-Contaminated Soil Using Vermicompost

Authors: Precious Ehiomogue, Ifechukwude Israel Ahuchaogu, Isiguzo Edwin Ahaneku

Abstract:

Vermicompost is the product of the decomposition process using various species of worms, to create a mixture of decomposing vegetable or food waste, bedding materials, and vemicast. This process is called vermicomposting, while the rearing of worms for this purpose is called vermiculture. Several works have verified the adsorption of toxic metals using vermicompost but the application is still scarce for the retention of organic compounds. This research brings to knowledge the effectiveness of earthworm waste (vermicompost) for the remediation of crude oil contaminated soils. The remediation methods adopted in this study were two soil washing methods namely, batch and column process which represent laboratory and in-situ remediation. Characterization of the vermicompost and crude oil contaminated soil were performed before and after the soil washing using Fourier transform infrared (FTIR), scanning electron microscopy (SEM), X-ray fluorescence (XRF), X-ray diffraction (XRD) and Atomic adsorption spectrometry (AAS). The optimization of washing parameters, using response surface methodology (RSM) based on Box-Behnken Design was performed on the response from the laboratory experimental results. This study also investigated the application of machine learning models [Artificial neural network (ANN), Adaptive neuro fuzzy inference system (ANFIS). ANN and ANFIS were evaluated using the coefficient of determination (R²) and mean square error (MSE)]. Removal efficiency obtained from the Box-Behnken design experiment ranged from 29% to 98.9% for batch process remediation. Optimization of the experimental factors carried out using numerical optimization techniques by applying desirability function method of the response surface methodology (RSM) produce the highest removal efficiency of 98.9% at absorbent dosage of 34.53 grams, adsorbate concentration of 69.11 (g/ml), contact time of 25.96 (min), and pH value of 7.71, respectively. Removal efficiency obtained from the multilevel general factorial design experiment ranged from 56% to 92% for column process remediation. The coefficient of determination (R²) for ANN was (0.9974) and (0.9852) for batch and column process, respectively, showing the agreement between experimental and predicted results. For batch and column precess, respectively, the coefficient of determination (R²) for RSM was (0.9712) and (0.9614), which also demonstrates agreement between experimental and projected findings. For the batch and column processes, the ANFIS coefficient of determination was (0.7115) and (0.9978), respectively. It can be concluded that machine learning models can predict the removal of crude oil from polluted soil using vermicompost. Therefore, it is recommended to use machines learning models to predict the removal of crude oil from contaminated soil using vermicompost.

Keywords: ANFIS, ANN, crude-oil, contaminated soil, remediation and vermicompost

Procedia PDF Downloads 62
4604 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 468
4603 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 214
4602 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 418
4601 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 302
4600 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 611
4599 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 417
4598 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 218
4597 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 396
4596 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 425
4595 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 701
4594 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 164
4593 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 391
4592 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 132
4591 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 486
4590 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 293
4589 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 236
4588 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 245