An enhanced three-layer clustering approach and security framework for battlefeld surveillance

Author(s):  
Dhanushik R Macharla ◽  
Suhas Tejaskanda
2015 ◽  
Vol 12 (3) ◽  
pp. 209-225 ◽  
Author(s):  
Burcu Togral Koca

Turkey has followed an “open door” policy towards refugees from Syria since the March 2011 outbreak of the devastating civil war in Syria. This “liberal” policy has been accompanied by a “humanitarian discourse” regarding the admission and accommodation of the refugees. In such a context, it is widely claimed that Turkey has not adopted a securitization strategy in its dealings with the refugees. However, this article argues that the stated “open door” approach and its limitations have gone largely unexamined. The assertion is, here, refugees fleeing Syria have been integrated into a security framework embedding exclusionary, militarized and technologized border practices. Drawing on the critical border studies, the article deconstructs these practices and the way they are violating the principle of non-refoulement in particular and human rights of refugees in general. 


Author(s):  
Hussain A. Jaber ◽  
Ilyas Çankaya ◽  
Hadeel K. Aljobouri ◽  
Orhan M. Koçak ◽  
Oktay Algin

Background: Cluster analysis is a robust tool for exploring the underlining structures in data and grouping them with similar objects. In the researches of Functional Magnetic Resonance Imaging (fMRI), clustering approaches attempt to classify voxels depending on their time-course signals into a similar hemodynamic response over time. Objective: In this work, a novel unsupervised learning approach is proposed that relies on using Enhanced Neural Gas (ENG) algorithm in fMRI data for comparison with Neural Gas (NG) method, which has yet to be utilized for that aim. The ENG algorithm depends on the network structure of the NG and concentrates on an efficacious prototype-based clustering approach. Methods: The comparison outcomes on real auditory fMRI data show that ENG outperforms the NG and statistical parametric mapping (SPM) methods due to its insensitivity to the ordering of input data sequence, various initializations for selecting a set of neurons, and the existence of extreme values (outliers). The findings also prove its capability to discover the exact and real values of a cluster number effectively. Results: Four validation indices are applied to evaluate the performance of the proposed ENG method with fMRI and compare it with a clustering approach (NG algorithm) and model-based data analysis (SPM). These validation indices include the Jaccard Coefficient (JC), Receiver Operating Characteristic (ROC), Minimum Description Length (MDL) value, and Minimum Square Error (MSE). Conclusion: The ENG technique can tackle all shortcomings of NG application with fMRI data, identify the active area of the human brain effectively, and determine the locations of the cluster center based on the MDL value during the process of network learning.


2020 ◽  
Vol 13 (4) ◽  
pp. 790-797
Author(s):  
Gurjit Singh Bhathal ◽  
Amardeep Singh Dhiman

Background: In current scenario of internet, large amounts of data are generated and processed. Hadoop framework is widely used to store and process big data in a highly distributed manner. It is argued that Hadoop Framework is not mature enough to deal with the current cyberattacks on the data. Objective: The main objective of the proposed work is to provide a complete security approach comprising of authorisation and authentication for the user and the Hadoop cluster nodes and to secure the data at rest as well as in transit. Methods: The proposed algorithm uses Kerberos network authentication protocol for authorisation and authentication and to validate the users and the cluster nodes. The Ciphertext-Policy Attribute- Based Encryption (CP-ABE) is used for data at rest and data in transit. User encrypts the file with their own set of attributes and stores on Hadoop Distributed File System. Only intended users can decrypt that file with matching parameters. Results: The proposed algorithm was implemented with data sets of different sizes. The data was processed with and without encryption. The results show little difference in processing time. The performance was affected in range of 0.8% to 3.1%, which includes impact of other factors also, like system configuration, the number of parallel jobs running and virtual environment. Conclusion: The solutions available for handling the big data security problems faced in Hadoop framework are inefficient or incomplete. A complete security framework is proposed for Hadoop Environment. The solution is experimentally proven to have little effect on the performance of the system for datasets of different sizes.


2020 ◽  
Vol 14 (12) ◽  
pp. 1724-1724
Author(s):  
Dheerendra Mishra ◽  
Vinod Kumar ◽  
Dharminder Dhaminder ◽  
Saurabh Rana

Sign in / Sign up

Export Citation Format

Share Document