686 research outputs found

    Sinkhole susceptibility mapping: A comparison between Bayes-based machine learning algorithms

    Get PDF
    Land degradation has been recognized as one of the most adverse environmental impacts during the last century. The occurrence of sinkholes is increasing dramatically in many regions worldwide contributing to land degradation. The rise in the sinkhole frequency is largely due to human-induced hydrological alterations that favour dissolution and subsidence processes. Mitigating detrimental impacts associated with sinkholes requires understanding different aspects of this phenomenon such as the controlling factors and the spatial distribution patterns. This research illustrates the development and validation of sinkhole susceptibility models in Hamadan Province, Iran, where a large number of sinkholes are occurring under poorly understood circumstances. Several susceptibility models were developed with a training sample of sinkholes, a number of conditioning factors, and four different statistical approaches: naïve Bayes, Bayes net (BN), logistic regression, and Bayesian logistic regression. Ten conditioning factors were initially considered. Factors with negligible contribution to the quality of predictions, according to the information gain ratio technique, were discarded for the development of the final models. The validation of susceptibility models, performed using different statistical indices and receiver operating characteristic curves, revealed that the BN model has the highest prediction capability in the study area. This model provides reliable predictions on the future distribution of sinkholes, which can be used by watershed and land use managers for designing hazard and land-degradation mitigation plans

    Automatic Segmentation of Sinkholes Using a Convolutional Neural Network

    Get PDF
    Sinkholes are the most abundant surface features in karst areas worldwide. Understanding sinkhole occurrences and characteristics is critical for studying karst aquifers and mitigating sinkhole-related hazards. Most sinkholes appear on the land surface as depressions or cover collapses and are commonly mapped from elevation data, such as digital elevation models (DEMs). Existing methods for identifying sinkholes from DEMs often require two steps: locating surface depressions and separating sinkholes from non-sinkhole depressions. In this study, we explored deep learning to directly identify sinkholes from DEM data and aerial imagery. A key contribution of our study is an evaluation of various ways of integrating these two types of raster data. We used an image segmentation model, U-Net, to locate sinkholes. We trained separate U-Net models based on four input images of elevation data: a DEM image, a slope image, a DEM gradient image, and a DEM-shaded relief image. Three normalization techniques (Global, Gaussian, and Instance) were applied to improve the model performance. Model results suggest that deep learning is a viable method to identify sinkholes directly from the images of elevation data. In particular, DEM gradient data provided the best input for U-net image segmentation models to locate sinkholes. The model using the DEM gradient image with Gaussian normalization achieved the best performance with a sinkhole intersection-over-union (IoU) of 45.38% on the unseen test set. Aerial images, however, were not useful in training deep learning models for sinkholes as the models using an aerial image as input achieved sinkhole IoUs below 3%

    A Study on Intrusion Detection System in Wireless Sensor Networks

    Get PDF
    The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs are extensively used in applications like military, industry, health, smart homes and smart cities. All the applications of WSN require secure communication between the sensor nodes and the base station. Adversary compromises at the sensor nodes to introduce different attacks into WSN. Hence, suitable Intrusion Detection System (IDS) is essential in WSN to defend against the security attack. IDS approaches for WSN are classified based on the mechanism used to detect the attacks. In this paper, we present the taxonomy of security attacks, different IDS mechanisms for detecting attacks and performance metrics used to assess the IDS algorithm for WSNs. Future research directions on IDS in WSN are also discussed

    Natural and Technological Hazards in Urban Areas

    Get PDF
    Natural hazard events and technological accidents are separate causes of environmental impacts. Natural hazards are physical phenomena active in geological times, whereas technological hazards result from actions or facilities created by humans. In our time, combined natural and man-made hazards have been induced. Overpopulation and urban development in areas prone to natural hazards increase the impact of natural disasters worldwide. Additionally, urban areas are frequently characterized by intense industrial activity and rapid, poorly planned growth that threatens the environment and degrades the quality of life. Therefore, proper urban planning is crucial to minimize fatalities and reduce the environmental and economic impacts that accompany both natural and technological hazardous events

    A systematic literature review

    Get PDF
    Bahaa, A., Abdelaziz, A., Sayed, A., Elfangary, L., & Fahmy, H. (2021). Monitoring real time security attacks for iot systems using devsecops: A systematic literature review. Information (Switzerland), 12(4), 1-23. [154]. https://doi.org/10.3390/info12040154In many enterprises and the private sector, the Internet of Things (IoT) has spread globally. The growing number of different devices connected to the IoT and their various protocols have contributed to the increasing number of attacks, such as denial-of-service (DoS) and remote-to-local (R2L) ones. There are several approaches and techniques that can be used to construct attack detection models, such as machine learning, data mining, and statistical analysis. Nowadays, this technique is commonly used because it can provide precise analysis and results. Therefore, we decided to study the previous literature on the detection of IoT attacks and machine learning in order to understand the process of creating detection models. We also evaluated various datasets used for the models, IoT attack types, independent variables used for the models, evaluation metrics for assessment of models, and monitoring infrastructure using DevSecOps pipelines. We found 49 primary studies, and the detection models were developed using seven different types of machine learning techniques. Most primary studies used IoT device testbed datasets, and others used public datasets such as NSL-KDD and UNSW-NB15. When it comes to measuring the efficiency of models, both numerical and graphical measures are commonly used. Most IoT attacks occur at the network layer according to the literature. If the detection models applied DevSecOps pipelines in development processes for IoT devices, they were more secure. From the results of this paper, we found that machine learning techniques can detect IoT attacks, but there are a few issues in the design of detection models. We also recommend the continued use of hybrid frameworks for the improved detection of IoT attacks, advanced monitoring infrastructure configurations using methods based on software pipelines, and the use of machine learning techniques for advanced supervision and monitoring.publishersversionpublishe

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    GIS-based spatial analysis coupled with geophysical imaging to identify and evaluate factors that control the formation of karst sinkholes in southwestern Missouri

    Get PDF
    Sinkholes are inherent features of the karst terrain underlying much of Greene County, Missouri. These features present hazards and engineering challenges to existing infrastructure unknowingly constructed on a seemingly benign ground surface. The primary objective of this research was to investigate the physical processes chiefly responsible for triggering the seemingly random distribution of sinkholes in the study area. This research employed an integrated approach encompassing regional scale GIS-based spatial analyses and site-specific geophysical data. GIS-based spatial analysis was employed to identify significant physical factors that appeared to influence the formation and distribution of sinkholes. Seven out of the twelve most cited factors influencing sinkhole development were identified in the study area. These factors were: overburden thickness, depth-to-groundwater, slope of the ground surface, distance to the nearest water course, distance to the nearest geologic structures, distance to nearest springs, and distance to the nearest roads. In the site-specific geophysical investigations, two dimensional (2D) and pseudo three dimensional (3D) - ERT, MASW, and borehole data were used to characterize the subsurface morphology of the karstified soil-bedrock interface in five selected sinkholes. From the interpretation of the 2D and pseudo 3D-ERT profiles, it was determined that four of the five sinkholes occurred at the intersections of regional systematic joint sets. The joint sets are characterized by a linear, visually prominent zones of low resistivity. The relatively low resistivity values are attributed to vertical seepage and the associated piping of fine-grained soils through preexisting fractures (often widened by solutioning) --Abstract, page iv

    Full Proceedings

    Get PDF

    Proceedings of 2016 Kentucky Water Resources Annual Symposium

    Get PDF
    This symposium was planned and conducted as a part of the state water resources research institute annual program that is supported by Grant/Cooperative Agreement Number G11AP20081 from the United States Geological Survey. The contents of this proceedings document and the views and conclusions presented at the symposium are solely the responsibility of the individual authors and presenters and do not necessarily represent the official views of the USGS or of the symposium organizers and sponsors. This publication is produced with the understanding that the United States Government is authorized to reproduce and distribute reprints for government purposes
    corecore