scholarly journals Efficient Information Gathering using NMAP and NBTSCAN: Case study on 172.19.19.0 IP Address

2019 ◽  
Vol 12 (28) ◽  
pp. 1-13
Author(s):  
Sanskar Kaushik ◽  
Arifa Bhutto ◽  
Bishwajeet Pandey ◽  
◽  
◽  
...  
Author(s):  
K Ramakrishna Kini ◽  
Muddu Madakyaru

AbstractThe task of fault detection is crucial in modern chemical industries for improved product quality and process safety. In this regard, data-driven fault detection (FD) strategy based on independent component analysis (ICA) has gained attention since it improves monitoring by capturing non-gaussian features in the process data. However, presence of measurement noise in the process data degrades performance of the FD strategy since the noise masks important information. To enhance the monitoring under noisy environment, wavelet-based multi-scale filtering is integrated with the ICA model to yield a novel multi-scale Independent component analysis (MSICA) FD strategy. One of the challenges in multi-scale ICA modeling is to choose the optimum decomposition depth. A novel scheme based on ICA model parameter estimation at each depth is proposed in this paper to achieve this. The effectiveness of the proposed MSICA-based FD strategy is illustrated through three case studies, namely: dynamic multi-variate process, quadruple tank process and distillation column process. In each case study, the performance of the MSICA FD strategy is assessed for different noise levels by comparing it with the conventional FD strategies. The results indicate that the proposed MSICA FD strategy can enhance performance for higher levels of noise in the data since multi-scale wavelet-based filtering is able to de-noise and capture efficient information from noisy process data.


2018 ◽  
Vol 138 ◽  
pp. 1-12 ◽  
Author(s):  
Quang Do ◽  
Ben Martini ◽  
Kim-Kwang Raymond Choo

2012 ◽  
Vol 5 (1) ◽  
pp. 109-125 ◽  
Author(s):  
Evan L. Frederick ◽  
Galen E. Clavio ◽  
Lauren M. Burch ◽  
Matthew H. Zimmerman

For this case study, an Internet-based survey was posted on a popular mixed-martial- arts (MMA) blog to ascertain its users’ demographics and usage trends. Data analysis revealed that users were predominantly White men between the ages of 23 and 39, with some college education and an annual income of $40,000–59,999. An exploratory factor analysis revealed 6 dimensions of gratification: evaluation, community, information gathering, knowledge demonstration, argumentation, and diversion. The most salient motivation statements were related to the speed of information access, the depth of information and coverage, and the availability of information not typically found through traditional media outlets. Most users spent 1–5 hr/wk watching MMA programming and 1–10 hr/wk on MMA blogs, making 1–20 comments per week. Findings indicated that users used this particular blog for both interactive and information-gathering purposes.


Information ◽  
2020 ◽  
Vol 11 (7) ◽  
pp. 368 ◽  
Author(s):  
Hiroshi Nagaya ◽  
Teruaki Hayashi ◽  
Hiroyuki A. Torii ◽  
Yukio Ohsawa

In recent disaster situations, social media platforms, such as Twitter, played a major role in information sharing and widespread communication. These situations require efficient information sharing; therefore, it is important to understand the trends in popular topics and the underlying dynamics of information flow on social media better. Developing new methods to help us in these situations, and testing their effectiveness so that they can be used in future disasters is an important research problem. In this study, we proposed a new model, “topic jerk detector.” This model is ideal for identifying topic bursts. The main advantage of this method is that it is better fitted to sudden bursts, and accurately detects the timing of the bursts of topics compared to the existing method, topic dynamics. Our model helps capture important topics that have rapidly risen to the top of the agenda in respect of time in the study of specific social issues. It is also useful to track the transition of topics more effectively and to monitor tweets related to specific events, such as disasters. We attempted three experiments that verified its effectiveness. First, we presented a case study applied to the tweet dataset related to the Fukushima disaster to show the outcomes of the proposed method. Next, we performed a comparison experiment with the existing method. We showed that the proposed method is better fitted to sudden burst accurately detects the timing of the bursts of the topic. Finally, we received expert feedback on the validity of the results and the practicality of the methodology.


Author(s):  
Md Jahangir Alam

Universally, research shows that early childhood education (ECE) contributes to children's development in the very early years. Governments among developed countries subsidize an ample amount of money for children's early education development to generate and enhance human capital. Consequently, in developing countries like Bangladesh, ECE is driven by the family, where family socio-economic conditions make a significant contribution to children's transition from home to school, and to ensure their children begin school at a very early age. This qualitative case study explores parental socio-economic aspirations and the phenomena of ECE initiatives by the government for child transitions from home to schools in Bangladesh. This empirical research contributes by placing parental aspirations for child schooling and focusing on the information-gathering actions by parents in line with the social conditions that inspire parents to choose schools for their children.


First Monday ◽  
2021 ◽  
Author(s):  
Kevin Limonier ◽  
Frédérick Douzet ◽  
Louis Pétiniaud ◽  
Loqman Salamatian ◽  
Kave Salamatian

In this paper, we argue that data routing is of geopolitical significance. We propose new methodologies to understand and represent the new forms of power rivalries and imbalances that occur within the lower layers of cyberspace, through the analysis of Eastern Ukraine. The Internet is a network of networks where each network is an Autonomous System (ASes). ASes are independent administrative entities controlled by a variety of actors such as governments, companies, and universities. Their administrators have to agree and communicate on paths followed by packets travelling across the Internet, which is made possible by the Border Gateway Protocol (BGP). Agreements between ASes are often confidential but BGP requires neighbouring ASes to interact with each other in order to coordinate routing through the constant release of connectivity update messages. These messages announce the availability (or withdrawal) of a sequence of ASes that can be followed to reach an IP address prefix. We select Eastern Ukraine as a case study as in 2020, six years after the beginning of the war in Donbass, data is available to analyze and map changes to data routing. In our study, we conducted a longitudinal analysis of Ukraine’s connectivity through the capture and analysis of these BGP announcements. Our results show how Donbass ASes progressively migrated from Ukraine’s cyberspace towards Russia, while still sharing connections with Ukrainian ASes. Donbass cyberspace therefore sits at the interface of Ukraine and Russia but has been relegated to the periphery of both networks; it is marginalized from the Ukrainian network but not fully integrated into the Russian network. These evolutions both reflect and affect ongoing geopolitical power rivalries in the physical world and demonstrate their strategic significance. Our methodology can be used to conduct studies in other regions subject to geopolitical open conflicts and to infer the strategies developed by states in anticipation of potential threats.


Sign in / Sign up

Export Citation Format

Share Document