922 research outputs found
Rapid Mapping of Landslides in the Western Ghats (India) Triggered by 2018 Extreme Monsoon Rainfall Using a Deep Learning Approach
Rainfall-induced landslide inventories can be compiled using remote sensing and topographical data, gathered using either traditional or semi-automatic supervised methods. In this study, we used the PlanetScope imagery and deep learning convolution neural networks (CNNs) to map the 2018 rainfall-induced landslides in the Kodagu district of Karnataka state in theWestern Ghats of India.We used a fourfold cross-validation (CV) to select the training and testing data to remove any random results of the model. Topographic slope data was used as auxiliary information to increase the performance of the model. The resulting landslide inventory map, created using the slope data with the spectral information, reduces the false positives, which helps to distinguish the landslide areas from other similar features such as barren lands and riverbeds. However, while including the slope data did not increase the true positives, the overall accuracy was higher compared to using only spectral information to train the model. The mean accuracies of correctly classified landslide values were 65.5% when using only optical data, which increased to 78% with the use of slope data. The methodology presented in this research can be applied in other landslide-prone regions, and the results can be used to support hazard mitigation in landslide-prone regions
Landslide displacement forecasting using deep learning and monitoring data across selected sites
Accurate early warning systems for landslides are a reliable
risk-reduction strategy that may significantly reduce fatalities
and economic losses. Several machine learning methods have
been examined for this purpose, underlying deep learning (DL)
models’ remarkable prediction capabilities. The long short-term
memory (LSTM) and gated recurrent unit (GRU) algorithms are
the sole DL model studied in the extant comparisons. However,
several other DL algorithms are suitable for time series forecasting
tasks. In this paper, we assess, compare, and describe seven DL
methods for forecasting future landslide displacement: multi-layer
perception (MLP), LSTM, GRU, 1D convolutional neural network
(1D CNN), 2xLSTM, bidirectional LSTM (bi-LSTM), and an architecture
composed of 1D CNN and LSTM (Conv-LSTM). The investigation
focuses on four landslides with different geographic locations,
geological settings, time step dimensions, and measurement
instruments. Two landslides are located in an artificial reservoir
context, while the displacement of the other two is influenced just
by rainfall. The results reveal that the MLP, GRU, and LSTM models
can make reliable predictions in all four scenarios, while the Conv-
LSTM model outperforms the others in the Baishuihe landslide,
where the landslide is highly seasonal. No evident performance
differences were found for landslides inside artificial reservoirs
rather than outside. Furthermore, the research shows that MLP is
better adapted to forecast the highest displacement peaks, while
LSTM and GRU are better suited to model lower displacement
peaks. We believe the findings of this research will serve as a precious
aid when implementing a DL-based landslide early warning
system (LEWS).SUPPORTO
SCIENTIFICO PER L’OTTIMIZZAZIONE, IMPLEMENTAZIONE E
GESTIONE DEL SISTEMA DI MONITORAGGIO CON AGGIORNAMENTO
DELLE SOGLIE DI ALLERTAMENTO DEL FENOMENO
FRANOSO DI SANT’ANDREA – PERAROLO DI CADORE (BL)”
and the Spanish Grant “SARAI, PID2020-116540RB-C21,MCIN/AEI/10.13039/501100011033” and “RISKCOASTInSAR displacement data of the El Arrecife landslideGeohazard Exploitation Platform (GEP) of the European
Space AgencyNoR Projects Sponsorship
(Project ID: 63737
Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware
Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection. Threat intelligence, especially attack attribution, can benefit from the use of ML classification. False positives from rule-based intrusion detection systems can be reduced with the use of ML models. Malware analysis and classification can be made easier by developing ML frameworks to distill similarities between the malicious programs. Adversarial machine learning will also be discussed, because while ML can be used to solve problems or reduce analyst workload, it also introduces new attack surfaces
Artificial neural networks as emerging tools for earthquake detection
As seismic networks continue to spread and monitoring sensors become more efÂżcient, the abundance of data highly surpasses the processing capabilities of earthquake interpretation analysts. Earthquake catalogs are fundamental for fault system studies, event modellings, seismic hazard assessment, forecasting, and ultimately, for mitigating the seismic risk. These have fueled the research for the automation of interpretation tasks such as event detection, event identiÂżcation, hypocenter location, and source mechanism analysis. Over the last forty years, traditional algorithms based on quantitative analyses of seismic traces in the time or frequency domain, have been developed to assist interpretation. Alternatively, recentadvancesarerelatedtotheapplicationofArtiÂżcial Neural Networks (ANNs), a subset of machine learning techniques that is pushing the state-of-the-art forward in many areas. Appropriated trained ANN can mimic the interpretation abilities of best human analysts, avoiding the individual weaknesses of most traditional algorithms, and spending modest computational resources at the operational stage. In this paper, we will survey the latest ANN applications to the automatic interpretation of seismic data, with a special focus on earthquake detection, and the estimation of onset times. For a comparative framework, we give an insight into the labor of human interpreters, who may face uncertainties in the case of small magnitude earthquakes.Peer ReviewedPostprint (published version
Improving Data Transmission Rate with Self Healing Activation Model for Intrusion Detection with Enhanced Quality of Service
Several types of attacks can easily compromise a Wireless Sensor Network (WSN). Although not all intrusions can be predicted, they may cause significant damage to the network and its nodes before being discovered. Due to its explosive growth and the infinite scope in terms of applications and processing brought about by 5G, WSN is becoming more and more deeply embedded in daily life. Security breaches, downed services, faulty hardware, and buggy software can all cripple these enormous systems. As a result, the platform becomes unmaintainable when there are a million or more interconnected devices. When it comes to network security, intrusion detection technology plays a crucial role, with its primary function being to constantly monitor the health of a network and, if any aberrant behavior is detected, to issue a timely warning to network administrators. The current network's availability and dependability are directly tied to the efficacy and timeliness of the Intrusion Detection System (IDS). An Intrusion-Tolerant system would incorporate self-healing mechanisms to restore compromised data. System attributes such as readiness for accurate service, supply identical and correct data, confidentiality, and availability are necessary for a system to merit trust. In this research, self-healing methods are considered that can detect intrusions and can remove with intellectual strategies that can make a system fully autonomous and fix any problems it encounters. In this study, a new architecture for an Intrusion Tolerant Self Healing Activation Model for Improved Data Transmission Rate (ITSHAM-IDTR) is proposed for accurate detection of intrusions and self repairing the network for better performance, which boosts the server's performance quality and enables it to mend itself without any intervention from the administrator. When compared to the existing paradigm, the proposed model performs in both self-healing and increased data transmission rates.
- …