Deep Analytics: Technologies for Humanity, AI & Security by Sumit Chakraborty, Suryashis Chakraborty, Kusumita - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

8. CONCLUSION

This session has outlined an interesting project for critical resources (e.g. river water) sharing among multiple entities rationally with fairness, correctness, transparency and accountability. It is also essential to control heavy rainfall which often results flood, landslide and soil erosion in urban and rural zone. Such type of project requires the support of deep analytics of river and irrigation engineering, water resource management and cloud physics. Rational resource sharing is basically the problem of real-time supply chain optimization.

It is also a critical research agenda to explore efficient risk mitigation strategies against heavy rainfall and flood. How can we fight against natural calamities like flood due to heavy rainfall? We need an optimal mix of proactive and reactive approaches. Intelligent urban and rural development planning is essential in terms of reliable infrastructures (e.g. houses, roads, bridges, flyover, drainage system etc.). Can we explore the concept of a ‘smart water grid’ to divert surplus water through pipelines, canals, rivers and drains to neighboring districts or states from flooded zone? It is rational to monitor timely release of water from various dams sequentially during rainy season; simultaneous release of water from all the dams of a state may aggravate the flood situation; it may be a conspiracy to draw flood relief fund by creating chaos through malicious artificial intelligence. Sufficient number of water storage or harvesting systems (e.g. dams) is required.

Modern, well designed networks of drainage systems should be built along with filters. Regular cleaning of drains is essential to remove mud, sand, plastic goods, polythene packets, haggis and pads to avoid congestion or jamming in rainy season. It is also required to open manholes during rain carefully monitored by municipal and cleaning staff so that there should not be water logging problems on the roads and streets. It is an interesting and feasible option to increase level of residential plots at low land using soil and bricks. Intelligent evacuation plan should be ready during natural disaster. Migration of human civilization from risky zone and fair rehabilitation is also essential. The problem should be tackled scientifically; there may be threats of false data injection attacks and rumors such as superstitions, narrow prejudices and religious curses through various broadcast communication channels. The system administrators should be alert of the readiness of natural disaster relief workforce (NDRF) and army with helicopters, choppers, life- boats and other relief equipments during rainy season. It is rational to exercise capital budgeting based on fair and correct valuation by the experts, surveys, audit and demand plan of reliable infrastructure (e.g. road, bridges, flyovers and nano- housing scheme). How can we tackle cloudbursts artificially applying the concept of cloud physics? It is an open research agenda.

It is possible to construct similar type of search mechanism like RPSM and risk mitigation strategies against the threats of geological hazards such as earthquake. For example, the risk mitigation strategies should include rational approaches in urban and rural development planning, public policy making, cautious approach and regulatory compliance on mining of earth’s soil (e.g. coal, minerals, sand, gas pipeline) and construction activities (e.g. saturation in metropolitan cities, building high storied buildings without soil testing, tunnels, metro rails, irrigation projects, dams etc.), monitoring of volcanoes and landslides in hilly zones. The aforesaid type of probabilistic search problem is really hard to solve and it is also challenging to deploy RPSM in reality and seeks extensive support, coordination, planning and corporate social responsibilities from various space research organizations and earth science institutes globally. The most critical challenges involve the innovation of automated real-time search algorithm, intelligent sensors and predictive analytics, resource planning and deployment, system administration and coordination both locally and globally. Artificial intelligence is basically simulation of human intelligence. A rational reasoning system often needs the support of an intelligent analytics. An intelligent reasoning system demands new solution methodology beyond traditional knowledge base with imagination, envision, perception and proper assessment of a hard problem like the aforesaid probabilistic search.

 

FURTHER READING

img34.pngN.Bostrum. 2014. Super intelligence: Path, dangers, strategies. Oxford University Press.

img34.pngD. Perlis. 2016. Five dimensions of reasoning in the wild. AAAI.

img34.pngD. Dasgupta (ed). 1999. Artificial Immune Systems and Their Applications. Springer.

img34.pngD.Dasgupta and F.Gonzalez. 2002. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans Evol Comput 6:1081–1088.

img34.pngJ.D.Farmer, N.H. Packard and A.S. Perelson. 1986. The immune system, adaptation, and machine learning. Physica 22:187–204.

img34.pngE.Hart and J.Timmis. 2008. Application areas of AIS: the past, the present and the future. Appl Soft Comput 8:191–201.

img34.pngS.Forrest, A.S. Perelson, L. Allen and R. Cherukuri. 1994. Self–nonself discrimination in a computer. In: Proceedings of the IEEE symposium on research in security and privacy, Oakland, CA, USA, pp 202–212.

img34.pngS. Hofmeyr and S. Forrest. 2000. Architecture for an artificial immune system. Evol Comput 7:1289–1296.

img34.pngE.Rich and K. Knight. 1991. Artificial intelligence, 2nd edn. McGraw-Hill, New York.

img34.pngG.Luger. 2005. Artificial intelligence: structures and strategies for complex problem solving, 5th edn. Addison-Wesley, New York.

img34.pngA.Cawsey. 1998. The essence of artificial intelligence. Prentice-Hall, Englewood Cliffs.

img34.pngP. Norvig. 1992. Paradigms of Artificial Intelligence Programming: Case Studies in Common Lisp. Morgan Kaufmann.

img34.pngS. J. Russell and E. H. Wefalld. 1991. Do the Right Thing: Studies in Limited Rationality. MIT Press.

img34.pngA. Konar. 1999. Artificial Intelligence and Soft Computing. CRC Press.

img34.pngJ.Kim, P.Bentley, U.Aickelin, J.Greensmith, G.Tedesco and J.Twycross J. 2007. Immune system approaches to intrusion detection - a review. Nat Comput 6:413–466.

img34.pngP.Matzinger. 1994. Tolerance, danger and the extended family. Ann Rev Immunol12:991–1045.

img34.pngP.Matzinger. 2001. The danger model in its historical context. Scand J Immunol 54:4–9.

img34.pngP.Matzinger. 2002. The danger model: a renewed sense of self. Science 296:301– 305.

img34.pngL. Castro and C.J.Timmis. 2002. Artificial Immune Systems : A New Computational Intelligence Approach. Springer.

img34.pngA.O.Tarakanov, V.A.Skormin and S.P.Sokolova. 2003. Immunocomputing: Principles and applications. Springer.

img34.pngJ.Douceur. 2002. The sybil attack. Proceedings of Workshop on P2P systems (IPTPS).

img34.pngA.K.Pal, D. Nath and S.Chakraborty. 2010. A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor. WASET, Brazil.

img34.pngS. Chakraborty. 2007. A study of several privacy preserving multi-party negotiation problems with applications to supply chain management. Indian Institute of Management Calcutta, India.

img34.pngG.Kol and M.Naor. Cryptography and game theory: Designing protocols for exchanging Information. Proceedings from 5th Theory of Cryptography Conference (TCC), 2008.

img34.pngW. Du. A study of several specific secure two-party computation problems. Doctoral dissertation, Purdue University, USA. 2001.

img34.pngY. Lindell. Composition of secure multi-party protocols a comprehensive study. Springer. 2003.

img34.pngS.Chakraborty. A study of several privacy-preserving multi-party negotiation problems with applications to supply chain management. Doctoral dissertation (unpublished), Indian Institute of Management Calcutta, 2007.

img34.pngA.L.Melnick. Biological, chemical and radiological terrorism. Springer, NY,USA, 2008.

img34.pngS. Chakraborty. Security intelligence for broadcasts: Threat analytics. Technical report. 2012.

img34.pngJ.Douceur. The sybil attack. Proceedings of Workshop on P2P systems (IPTPS). 2002.

img34.pngA.K.Pal, D. Nath and Chakraborty, S. A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor, WASET, Brazil.2010.

img34.pngM.Shema. edited by A.Ely. Seven deadliest web application attacks. Elsevier. 2010.

img34.pngF.A.Kuglin. Pharmaceutical supply chain drug quality and security act. CRC Press, Taylor & Francis Group, Boca Raton, USA.

img34.pngG.Ateniese, R.Curtmola, B. Medeiros and D.Davis. Medical information privacy assurance: Cryptographic and system aspects, Technical Report, John Hopkins University. 2003.

img34.pngM.Gertz and S.Jajodia. Handbook of database security applications and trends. 2008.

img34.pngB. Schneier. Applied Cryptography, John Wiley, New York,1996.

img34.pngW.Mao. Modern Cryptography Theory & Practice, Pearson Education. 2007.

img34.pngY.Zheng. Digital signcryption or how to achieve cost (signature & encryption)img35.png<< cost (signature) + cost (encryption). LNCS 1318, Springer-Verlag.

img34.pngS.Chakraborty. 2007. A study of several privacy-preserving multi-party negotiation problems with applications to supply chain management. Thesis, Fellow Programme, Indian Institute of Management Calcutta.

img34.pngS.Chakraborty and S.K.Sharma. 2007. Enterprise Resource Planning: an integrated strategic framework. International Journal Management and Enterprise Development, vol. 4, no. 5.

img34.pngG.Dudek and H. Stadtler 2005. Negotiation-based collaborative planning between supply chain partners. European Journal of Operational Research, 163, 668-687.

img34.pngD.Seifert. 2002. Collaborative planning, forecasting and replenishment. Galliers Business.

img34.pngS.L.Epstein. 2015. Wanted: Collaborative Intelligence. Artificial Intelligence, 221, 36-45.

img34.pngR.T.Bruintjes. 1999: A review of cloud seeding experiments to enhance precipitation and some new prospects. Bulletin of the American Meteorological Society: Vol. 80, No. 5, pp. 805-820.

img34.pngW.A.Cotton and R. A. Pielke. 1995. Human Impacts on Weather and Climate. Cambridge University Press.

img34.pngR.T. Bruintjes, D. W. Breed, V. Salazar, M. Dixon, T. Kane, G. B. Foote and B. Brown. 2001: Overview and results from the Mexican hygroscopic seeding experiment. Preprints, AMS Symposium on Planned and Inadvertent Weather Modification, Albuquerque NM.

img34.pngA.C.Cooper, R. T. Bruintjes and G. K. Mather. 1997: Calculation Pertaining to Hygroscopic Seeding with Flares. Journal of Applied Meteorology: Vol. 36, No. 3, pp. 1449-1469.

img34.pngG.K.Mather, D. E. Terblanche, F. E. Steffens and L. Fletcher. 1997. Results of the South African cloud-seeding experiments using hygroscopic flares. Journal of Applied Meteorology: vol. 36, No. 11, pp. 1433-1447.

img34.pngB.A.Silverman and W. Sukarnjanaset. 2000. Results of the Thailand warm-cloud hygroscopic seeding experiment. J. Appl. Meteor., 39, 1160-1175.

img34.pngK. Shivshankar, K.R. Chopkar, A. Gangakhedkar and B.Dhone. 2014. Cloud formation and atmospheric rain making by endothermic reaction due to plasma laser & UV radiation in the atmosphere. International Journal of Information Technology and Business Management, vol.21 No.1.

img34.pngQiu, J. & Cressey, D. Taming the sky. Nature 453, 970–974 (2008).

img34.pngUS National Research Council. Critical Issues in Weather Modification Research (National Academies, 2003).

img34.pngLangmuir, I. Growth of particles in smokes and clouds and the production of snow from supercooled clouds. Science 106, 505 (1947).

img34.pngKasparian, J. et al. White-light filaments for atmospheric analysis. Science 301, 61–64 (2003).

img34.pngCouairon A. & Mysyrowicz, A. Femtosecond filamentation in transparent media. Phys. Rep. 44, 47–189 (2007).

img34.pngBerge´, L. Skupin, S., Nuter, R., Kasparian, J. &Wolf, J.-P. Ultrashort filaments of light in weakly-ionized, optically-transparent media. Rep. Prog. Phys. 70, 1633–1713 (2007).

img34.pngKasparian, J. & Wolf, J.-P. Physics and applications of atmospheric nonlinear optics and filamentation. Opt. Express 16, 466–493 (2008).

img34.pngChin, S. L. et al. The propagation of powerful femtosecond laser pulses in optical media: physics, applications and new challenges. Can. J. Phys. 83,863–905 (2005).

img34.pngBe´jot, P. et al. Higher-order Kerr terms allow ionization-free filamentation in air. Phys. Rev. Lett. 104, 103903 (2010).

img34.pngMe´jean, G. et al. Multifilamentation transmission through fog. Phys. Rev. E. 72, 026611 (2005).

img34.pngLa Fontaine, B. et al. Filamentation of ultrashort pulse laser beams resulting from their propagation over long distances in air. Phys. Plasma 6, 1615–1621 (1999).

img34.pngRodriguez, M. et al. Kilometer-range non-linear propagation of femtosecond laser pulses. Phys. Rev. E 69, 036607 (2004).

img34.pngChin, S. L. et al. Filamentation of femtosecond laser pulses in turbulent air. Appl. Phys. B 74, 67–76 (2002).

img34.pngSalame´, R., Lascoux, N., Salmon, E., Kasparian, J. & Wolf, J.-P. Propagation of laser filaments through an extended turbulent region. Appl. Phys. Lett. 91,img35.png171106 (2007).

img34.pngMe´chain, G. et al. Propagation of fs-TW laser filaments in adverse atmospheric conditions. Appl. Phys. B 80, 785–789 (2005).

img34.pngKasparian, J. et al. Electric events synchronized with laser filaments in thunderclouds. Opt. Express 16, 5757–5763 (2008).

img34.pngWille, H. et al. Teramobile: a mobile femtosecond–terawatt laser and detection system. Eur. Phys. J. Appl. Phys. 20, 183–190 (2002).

img34.pngKasparian, J., Sauerbrey, R. & Chin, S. L. The critical laser intensity of self- guided light filaments in air. Appl. Phys. B 71, 877–879 (2000).

img34.pngPruppacher, H. R. & Klett, J. D. Microphysics of Clouds and Precipitation (Kluwer Academic Publishing, 1997).

img34.pngMeasures, R. M. Laser Remote Sensing—Fundamentals and Applications (Wileyimg35.pngInterscience, 1984).

img34.pngTzortzakis, S., Prade, B., Franco, M. & Mysyrowicz, A. Time evolution of the plasma channel at the trail of a self-guided IR femtosecond laser pulse in air. Opt. Commun. 181, 123–127 (2000).

img34.pngBraun A., Korn G., Liu X., Du D., Squier J. and Mourou G., (1995) Self- channeling of high- peak power femtosecond laser pulses in air, Opt. Lett. 20, 73-75.

img34.pngMason B.J., (1975) Clouds, Rain and Rainmaking, Second Edition, Cambridge University Press, Cambridge.

img34.pngMason B.J., (1971) The Physics of clouds, Second Edition, Calare don Press, Oxford.

img34.pngMejean G., Ackermann R., Kasparian J., Salmon E., Yu J., Wolf J. -P., Rethmeier K., Kalkner W., Rohwetter P., Stelmaszczyk K. and Woste L., (2006) Improved laser triggering and guiding of megavolt discharges with dual fs-ns pulses, App. Phys. Letts., 88, 021101-3.

img34.pngRohwetter P., Kasparian J., Stelmaszczyk K., Hao Z., Henin S., Lascoux N., Nakaema W. M., Petit Y., Queisser M., Salame R., Salmon E., Woste L. and Wolf J. -P. (2010) Laser-induced water condensation in air, doi: 10.1038/nphoton.2010.115.

img34.pngWallance J.M. and Hobbs P.V., (1977) Atmospheric Science, Academic Press, London

img34.pngYoshihara K., Takatori Y., Miyazaki K. and Kajit Y., (2007) Ultraviolet light- induced ter- droplet formation from wet ambient air, Proc. Jpn. Acad. Sci. B 83, 320-325.

img34.pngS.S.Brown. 1980. Optimal search for a moving target in discrete time space. Operations Research, volume 28, no. 6, pp. 1275-1289.

img34.pngT.Ishida. 1992. Moving target search with intelligence. AAAI-92, pp. 525-532.

img34.pngE. Kagan and I. Ben-Gal. 2013. Moving Target Search Algorithm with Informational Distance Measures. Entropy.

img34.pngP. J. Schweitzer. 1971. Threshold Probabilities when Searching for a Moving Target. Operations Research, 19(3), 707–709.

img34.pngJ. N. Eagle. 1984. The Optimal Search for a Moving Target when the Search Path is Constrained. Operations Research, 32, 1107–1115.

img34.pngL. C. Tomas and J. N. Eagle. 1995. Criteria and Approximate Methods for Path- Constrained Moving-Target Search Problems. Naval Research Logistics, 42, 27– 38.

img34.pngD. A. Grundel. 2005. Searching for a Moving Target: Optimal Path Planning. IEEE Conference on Networking, Sensing and Control, 19–22 March, 2005, 867–872.

img34.pngI. M. MacPhee and B. P. Jordan. 1995. Optimal Search for a Moving Target.

img34.pngA. Stenz. 1994. Optimal and Efficient Path Planning for Partially-Known Environments. IEEE International Conference on Robotics and Automation, San Diego, CA, USA, vol. 4, 3310–3317.

img34.pngA.Jaszkiewicz and R.Slowinski. 1999. The light beam search approach an overview of methodology and applications. European Journal of Operational Research, 113, 300-314.

img34.pngS.Simon. 1998. Comets, meteors and asteroids. Scholastic Inc.

img34.pngW.Du and M. J. Atallah. 2001. Secure multi-party computation problems and their applications: a review and open problems. In 2001 workshop on new security paradigms (pp. 13 - 22). ACM Press.

img34.pngY. Lindell. 2003. Composition of secure multi-party protocols a comprehensive study. Springer.

img34.pngR.Canetti, U.Feige, O.Goldreich and M.Naor. 1996. Adaptively secure multi- party computation.

img34.pngS. Chakraborty. 2007. A study of several privacy preserving multi-party negotiation problems with applications to supply chain management. IIMC.

 

Quiz

 

img31.pngWhat are various types of natural disasters? What are the negative impacts of such disasters on poverty and humanity, plants, animals and nature? What is  the scope of technology for global security against various types of disaster such as flood, drught, storm, earthquake, volcano, woodfire, snowfall, epidemic and pandemic outbreak, astronomical hazards, environmental pollution and attack of malicious pastes and wild animals?

/* Hints :

Flood : Smart water grid, Canals, Drainage system, Irrigation system, Water storage system (e.g. dams, lakes, ponds, rivers), Migration of human civilization from risky zone to favourable zones

Drought : Artificial rainfall, Cloud seeding, Irrigation system, Water storage  system, Fertilizer and Migration of human civilization from risky zone to favourable zones.

Storm / Cyclone : Resiliency management, Infrastructure maintenance (e.g. energy, utilities, trees, huts, houses )

Earthquake : Soil mining, Tunnel, Unplanned urban and rural development planning and civil infrastructure development, Migration of human civilization from risky zone to favourable zones

Volcano : Migration of human civilization from risky zone to favourable zones

Wood fire : Water jet, Artificial rainfall, Migration of human civilization from risky zone to favourable zones

Snowfall : Resiliency, traffic congestion Epidemic and pandemic outbreak Astronomical hazards : Private search

Environmental hazards [Air pollution (Smoke from vehicles, power plants, industrial plants (e.g. chemical, metallurgical, fertilizers, oil, gas), factories); Water pollution: cleaning of weeds i.e. kachuripana, Soil pollution: plastic, garbage, recycle and reuse; Sound pollution : fire crackers, bombs, construction works, industrial plants and factories; Sunlight pollution : Nano-housing]

Paste / wild beasts : Mosquitoes - Malaria, dengue, chickengunia ( Mosquito net, DDT, Bleaching powder, Cleaning of garbage) ; Flies : food poisoning (use covers; no animal husbandries (e.g. khatals – cows, buffaloes, goats) and poultry firms in urban zone); Attacks of wild animals, Wild-life sanctuaries (e.g. tigers, loans, elephants, snakes, rhinos, hippopotamus, lions, monkeys, baboons), Conservation of forests and cleaning of bushes. */

img34.pngWhat is artifial immune system? How can it control epidemic and pandemic outbreak?

img34.pngWhat are the basic elements of system architecture for disaster control? How to represent the structure correctly?

img34.pngWhat do you mean by technology security for artificial immune system? How to verify the security intelligence? Wh