922 research outputs found

    Rapid Mapping of Landslides in the Western Ghats (India) Triggered by 2018 Extreme Monsoon Rainfall Using a Deep Learning Approach

    Get PDF
    Rainfall-induced landslide inventories can be compiled using remote sensing and topographical data, gathered using either traditional or semi-automatic supervised methods. In this study, we used the PlanetScope imagery and deep learning convolution neural networks (CNNs) to map the 2018 rainfall-induced landslides in the Kodagu district of Karnataka state in theWestern Ghats of India.We used a fourfold cross-validation (CV) to select the training and testing data to remove any random results of the model. Topographic slope data was used as auxiliary information to increase the performance of the model. The resulting landslide inventory map, created using the slope data with the spectral information, reduces the false positives, which helps to distinguish the landslide areas from other similar features such as barren lands and riverbeds. However, while including the slope data did not increase the true positives, the overall accuracy was higher compared to using only spectral information to train the model. The mean accuracies of correctly classified landslide values were 65.5% when using only optical data, which increased to 78% with the use of slope data. The methodology presented in this research can be applied in other landslide-prone regions, and the results can be used to support hazard mitigation in landslide-prone regions

    Landslide displacement forecasting using deep learning and monitoring data across selected sites

    Get PDF
    Accurate early warning systems for landslides are a reliable risk-reduction strategy that may significantly reduce fatalities and economic losses. Several machine learning methods have been examined for this purpose, underlying deep learning (DL) models’ remarkable prediction capabilities. The long short-term memory (LSTM) and gated recurrent unit (GRU) algorithms are the sole DL model studied in the extant comparisons. However, several other DL algorithms are suitable for time series forecasting tasks. In this paper, we assess, compare, and describe seven DL methods for forecasting future landslide displacement: multi-layer perception (MLP), LSTM, GRU, 1D convolutional neural network (1D CNN), 2xLSTM, bidirectional LSTM (bi-LSTM), and an architecture composed of 1D CNN and LSTM (Conv-LSTM). The investigation focuses on four landslides with different geographic locations, geological settings, time step dimensions, and measurement instruments. Two landslides are located in an artificial reservoir context, while the displacement of the other two is influenced just by rainfall. The results reveal that the MLP, GRU, and LSTM models can make reliable predictions in all four scenarios, while the Conv- LSTM model outperforms the others in the Baishuihe landslide, where the landslide is highly seasonal. No evident performance differences were found for landslides inside artificial reservoirs rather than outside. Furthermore, the research shows that MLP is better adapted to forecast the highest displacement peaks, while LSTM and GRU are better suited to model lower displacement peaks. We believe the findings of this research will serve as a precious aid when implementing a DL-based landslide early warning system (LEWS).SUPPORTO SCIENTIFICO PER L’OTTIMIZZAZIONE, IMPLEMENTAZIONE E GESTIONE DEL SISTEMA DI MONITORAGGIO CON AGGIORNAMENTO DELLE SOGLIE DI ALLERTAMENTO DEL FENOMENO FRANOSO DI SANT’ANDREA – PERAROLO DI CADORE (BL)” and the Spanish Grant “SARAI, PID2020-116540RB-C21,MCIN/AEI/10.13039/501100011033” and “RISKCOASTInSAR displacement data of the El Arrecife landslideGeohazard Exploitation Platform (GEP) of the European Space AgencyNoR Projects Sponsorship (Project ID: 63737

    Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware

    Get PDF
    Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection. Threat intelligence, especially attack attribution, can benefit from the use of ML classification. False positives from rule-based intrusion detection systems can be reduced with the use of ML models. Malware analysis and classification can be made easier by developing ML frameworks to distill similarities between the malicious programs. Adversarial machine learning will also be discussed, because while ML can be used to solve problems or reduce analyst workload, it also introduces new attack surfaces

    Artificial neural networks as emerging tools for earthquake detection

    Get PDF
    As seismic networks continue to spread and monitoring sensors become more efÂżcient, the abundance of data highly surpasses the processing capabilities of earthquake interpretation analysts. Earthquake catalogs are fundamental for fault system studies, event modellings, seismic hazard assessment, forecasting, and ultimately, for mitigating the seismic risk. These have fueled the research for the automation of interpretation tasks such as event detection, event identiÂżcation, hypocenter location, and source mechanism analysis. Over the last forty years, traditional algorithms based on quantitative analyses of seismic traces in the time or frequency domain, have been developed to assist interpretation. Alternatively, recentadvancesarerelatedtotheapplicationofArtiÂżcial Neural Networks (ANNs), a subset of machine learning techniques that is pushing the state-of-the-art forward in many areas. Appropriated trained ANN can mimic the interpretation abilities of best human analysts, avoiding the individual weaknesses of most traditional algorithms, and spending modest computational resources at the operational stage. In this paper, we will survey the latest ANN applications to the automatic interpretation of seismic data, with a special focus on earthquake detection, and the estimation of onset times. For a comparative framework, we give an insight into the labor of human interpreters, who may face uncertainties in the case of small magnitude earthquakes.Peer ReviewedPostprint (published version

    Improving Data Transmission Rate with Self Healing Activation Model for Intrusion Detection with Enhanced Quality of Service

    Get PDF
    Several types of attacks can easily compromise a Wireless Sensor Network (WSN). Although not all intrusions can be predicted, they may cause significant damage to the network and its nodes before being discovered. Due to its explosive growth and the infinite scope in terms of applications and processing brought about by 5G, WSN is becoming more and more deeply embedded in daily life. Security breaches, downed services, faulty hardware, and buggy software can all cripple these enormous systems. As a result, the platform becomes unmaintainable when there are a million or more interconnected devices. When it comes to network security, intrusion detection technology plays a crucial role, with its primary function being to constantly monitor the health of a network and, if any aberrant behavior is detected, to issue a timely warning to network administrators. The current network's availability and dependability are directly tied to the efficacy and timeliness of the Intrusion Detection System (IDS). An Intrusion-Tolerant system would incorporate self-healing mechanisms to restore compromised data. System attributes such as readiness for accurate service, supply identical and correct data, confidentiality, and availability are necessary for a system to merit trust. In this research, self-healing methods are considered that can detect intrusions and can remove with intellectual strategies that can make a system fully autonomous and fix any problems it encounters. In this study, a new architecture for an Intrusion Tolerant Self Healing Activation Model for Improved Data Transmission Rate (ITSHAM-IDTR) is proposed for accurate detection of intrusions and self repairing the network for better performance, which boosts the server's performance quality and enables it to mend itself without any intervention from the administrator. When compared to the existing paradigm, the proposed model performs in both self-healing and increased data transmission rates.
    • …
    corecore