Network capital and urban development: an inter-urban capital flow network analysis

2021 ◽  
pp. 1-14
Author(s):  
Shuai Shi ◽  
Siu Kei Wong ◽  
Chen Zheng
2020 ◽  
Vol 39 (3) ◽  
pp. 4785-4801
Author(s):  
Cho Do Xuan ◽  
Mai Hoang Dao ◽  
Hoa Dinh Nguyen

Advanced Persistent Threat (APT) attacks are a form of malicious, intentionally and clearly targeted attack. This attack technique is growing in both the number of recorded attacks and the extent of its dangers to organizations, businesses and governments. Therefore, the task of detecting and warning APT attacks in the real system is very necessary today. One of the most effective approaches to APT attack detection is to apply machine learning or deep learning to analyze network traffic. There have been a number of studies and recommendations to analyze network traffic into network flows and then combine with some classification or clustering methods to look for signs of APT attacks. In particular, recent studies often apply machine learning algorithms to spot the present of APT attacks based on network flow. In this paper, a new method based on deep learning to detect APT attacks using network flow is proposed. Accordingly, in our research, network traffic is analyzed into IP-based network flows, then the IP information is reconstructed from flow, and finally deep learning models are used to extract features for detecting APT attack IPs from other IPs. Additionally, a combined deep learning model using Bidirectional Long Short-Term Memory (BiLSTM) and Graph Convolutional Networks (GCN) is introduced. The new detection model is evaluated and compared with some traditional machine learning models, i.e. Multi-layer perceptron (MLP) and single GCN models, in the experiments. Experimental results show that BiLSTM-GCN model has the best performance in all evaluation scores. This not only shows that deep learning application on flow network analysis to detect APT attacks is a good decision but also suggests a new direction for network intrusion detection techniques based on deep learning.


2021 ◽  
Author(s):  
Reena Patel

Bio-structures owe their remarkable mechanical properties to their hierarchical geometrical arrangement as well as heterogeneous material properties. This dissertation presents an integrated, interdisciplinary approach that employs computational mechanics combined with flow network analysis to gain fundamental insights into the failure mechanisms of high performance, light-weight, structured composites by examining the stress flow patterns formed in the nascent stages of loading for the rostrum of the paddlefish. The data required for the flow network analysis was generated from the finite element analysis of the rostrum. The flow network was weighted based on the parameter of interest, which is stress in the current study. The changing kinematics of the structural system was provided as input to the algorithm that computes the minimum-cut of the flow network. The proposed approach was verified using two classical problems three- and four-point bending of a simply-supported concrete beam. The current study also addresses the methodology used to prepare data in an appropriate format for a seamless transition from finite element binary database files to the abstract mathematical domain needed for the network flow analysis. A robust, platform-independent procedure was developed that efficiently handles the large datasets produced by the finite element simulations. Results from computational mechanics using Abaqus and complex network analysis are presented.


2020 ◽  
Vol 14 (6) ◽  
pp. 929-936 ◽  
Author(s):  
Payam Shams Ghahfarokhi ◽  
Ants Kallaste ◽  
Anouar Belahcen ◽  
Toomas Vaimann

2018 ◽  
Vol 36 (3) ◽  
pp. 378-399 ◽  
Author(s):  
Jiang Wu ◽  
Jingxuan Cai ◽  
Miao Jin ◽  
Ke Dong

Purpose Although interdisciplinary research is an increasing trend in scientific funding projects, they are suffering from a lower probability of being funded. The purpose of this paper is to analyze the current situation on successful case of funding application and provides suggestions on how libraries can expand services to help scientific funding application. Design/methodology/approach This paper utilizes the co-occurrences of disciplinary application codes to construct an interdisciplinary knowledge flow network. Based on 193517 sponsored projects of the National Natural Science Foundation of China, the authors study the interdisciplinary flow of knowledge and investigate the evolution of network structure using social network analysis. Findings Results show that the interdisciplinary knowledge flow network is not only a small-world network but also a scale-free network. Two main knowledge flow paths across scientific departments exist, showing the heterogeneity of knowledge distributions across scientific disciplines. The authors also find that if two disciplines in the same scientific department both have a wide influence to other disciplines, they are more prone to link together and create a knowledge chain. Originality/value Funding consultation currently has not occupied an advisory role either in library services or in the research team. This paper conducts a co-occurrences network analysis of interdisciplinary knowledge flow in scientific funding projects. Considering the complexity of funding application and the advantage of traditional library services on information collection, integration, and utilization, the authors conclude the possibility and necessity of embedding funding consultation in traditional library services.


2007 ◽  
Author(s):  
Sihong Jiao ◽  
Yonghua Qu ◽  
Zhigang Liu ◽  
Quanxian Feng ◽  
Jie Ren ◽  
...  

2019 ◽  
Vol 11 (16) ◽  
pp. 4370
Author(s):  
Feng ◽  
Sun ◽  
Gong

(1) Background: The pyramid scheme has caused a large-scale plunder of finances due to the unsustainability of its operating model, which seriously jeopardizes economic development and seriously affects social stability. In various types of networks, the finance flow network plays an extremely important role in the pyramid scheme organization. Through the study of the finance network, the operational nature of pyramid scheme organizations can be effectively explored, and the understanding of pyramid scheme organizations can be deepened to provide a basis for dealing with them. (2) Methods: This paper uses the motifs analysis and exponential random graph model in social network analysis to study the micro-structure and the network construction process of the “5.03” pyramid scheme finance flow network in Hunan, China. (3) Results: The finance flow network is sparse, the microstructure shows a typical pyramid structure; finance flows within the community and eventually flows to the most critical personnel, there is no finance relationship between different communities, and there are few finance relationships between pyramid salesmen of the same level. The inductees are in a key position in the network, which may explain why they are transferred to prosecution.


2012 ◽  
Vol 20 (02) ◽  
pp. 1250005 ◽  
Author(s):  
BUM-SHIN KIM ◽  
SEONG-YEON YOO ◽  
WOONG-SUN CHO

Flow network which consists of a number of flow paths and their junctions is popularly used in analysis of flow and pressure distribution for complicated pipe or channel flow structure. In order to analyze flow network, it is required to resolve mass conservation equation at each junction and energy conservation equation on all independent closed loops of the flow network. Topologic matrix which reflects characteristics of network connectivity simply transforms continuity equations into linear algebraic equations. However, typical solving procedure based on topologic matrix and linear analysis includes complicated algorithm to retrieve basic closed loop for energy conservation equations. It must confront the problem of nondeterministic polynomial completion. To resolve the problem of typical flow network analysis, the theory of constitutive topologic matrix equation is known to be effective. This paper describes a program algorithm of flow network analysis based on constitutive topological matrix theory and shows user interface of the program. Additionally, comparing analysis results of developed program with commercial software is provided to prove accuracy and reliability of developed program.


Sign in / Sign up

Export Citation Format

Share Document