Free Essay

A Comparative Study of "Fuzzy Logic, Genetic Algorithm & Neural Network" in Wireless Network Security

In:

Submitted By HopeAngel
Words 2853
Pages 12
A COMPARATIVE STUDY OF "FUZZY LOGIC, GENETIC ALGORITHM & NEURAL NETWORK" IN
WIRELESS NETWORK SECURITY (WNS)
ABSTRACT
The more widespread use of networks meaning increased the risk of being attacked. In this study illustration to compares three AI techniques. Using for solving wireless network security problem (WNSP) in Intrusion Detection Systems in network security field. I will show the methods used in these systems, giving brief points of the design principles and the major trends. Artificial intelligence techniques are widely used in this area such as fuzzy logic, neural network and Genetic algorithms. In this paper, I will focus on the fuzzy logic, neural network and Genetic algorithm technique and how it could be used in Intrusion Detection Systems giving some examples of systems and experiments proposed in this field. The purpose of this paper is comparative analysis between three AI techniques in network security domain.

1 INTRODUCTION
This paper shows a general overview of Intrusion Detection Systems (IDS) and the methods used in these systems, giving brief points of the design principles and the major trends. Hacking, Viruses, Worms and Trojan horses are various of the main attacks that fear any network systems. However, the increasing dependency on networks has increased in order to make safe the information that might be to arrive by them. As we know artificial intelligence has many techniques are widely used in this area such as fuzzy logic, neural network and Genetic algorithms etc... In this paper, In this study, I will focus on the three algorithms mentioned above by giving some examples of systems and experiments proposed that used in Intrusion Detection Systems in this area. The purpose of this paper is comparative analysis between three AI techniques in terms of performance, accuracy of decision making.

1-1 Genetic Algorithms
“A Genetic Algorithm (GA) is a programming procedure that imitates natural development as a problem-solving tactic.”[2] It is based on Darwinian’s rule of development and survival of fittest to optimize a inhabitants of candidate solutions towards a predefined suitability. [16][18] GA uses an development and ordinary collection that uses a chromosome-like data structure and develop the chromosomes using collection, Reassemble, and change operators. The procedure habitually start with randomly generated population of chromosomes, which represent all probable result of a problem that are measured candidate results. Dissimilar positions of each chromosome are encoded as bits, numbers or characters. These positions might referred to as genes. According to the requested answers, an estimation task is used to evaluate the quality of each chromosome , this task is called “Fitness Function”. Through estimation, two essential operators, intersect and change, are used to emulate the natural reproduction and change of types. The collection of chromosomes for staying and combination is partial to wards the fittest chromosomes. At first by a casual creation of initial population, then estimate and develop during collection, recombination, and change. Finally, the best personality (chromosome) is chosen out as the last result once the optimization meet its goal (Pohlheim, 2001). With the appearance of information jump in the industry world and the quick speed of communication, network systems and technologies has been of a main fear to stay up with the fast stream of information spread and communication in everywhere around the world. Enlarge of network degree, growth of complex information technologies, and other factors increase the number of probable targets for attacks versus computer networks. Hacking, Viruses, Worms and Trojan horses are several of the main attacks that fear any network systems. However, the increasing need on computer networks has increased in order to safe the information that might arrive by them. alongside with the typically used security tools like firewalls, intrusion detection systems (IDS) are appropriate of highest importance. Intrusion Detections Systems (IDS) is a new way of security systems, which provides capable path to safe computer networks. Artificial Intelligence paths have been used enormously to produce a lot of IDS. Some of these paths dependency on Genetic Algorithms to give the network with an capable classifier to know and sense intrusions events. In the next paragraph , IDS systems are briefly clear and clarified, the next stage goes briefly on AIS to provide an foreword of the next stage which clarifies the apply of genetic algorithms in ID. finally, put all jointly by presenting a brief on two diverse system case studies that uses paths by GA for IDS.

Generate
Initial
population
Ovulate Objective function Are optimization
Criteria met?
Best
Individuals
S
T
A
R
T

YesA
R
E
S
U
L
T

l t NO

Selection
Recompilation
Mutation
Generate new population

Generate
Initial
population
Ovulate Objective function Are optimization
Criteria met?
Best
Individuals
S
T
A
R
T

YesA
R
E
S
U
L
T

l t NO

Selection
Recompilation
Mutation
Generate new population

figure 1 : Structure of Simple GA [16]

Initialization
Selection
Initiation population
New population
Old population
End
Quit?
Crossover
Mutation
No
Yes
Initialization
Selection
Initiation population
New population
Old population
End
Quit?
Crossover
Mutation
No
Yes

Figure 2 : The operation of GA [8]

Figure 3 : Algorithm [8]

Figure 4 : Results of Experiment [28].

1.2 ANN (Artificial Neural Networks) Approach
Neural Networks (NN) are mathematical techniques designed to simulate the way in which the human brain a specific task, and consists of simple processing units, these units are only the elements of calculation, called neurons or nodes (Nodes, Neurons), which have a characteristic neurological. Neurons are joined with communication channels, and information flows, in the structure of arithmetical information among nodes.” [2] The capability of interconnection among nodes is during weights that are changing elements which make a dynamic ANN environment. alike to the human’s neural systems, a lot of inputs could inter a confident nerve in a similar style; the inputs are collected with the weight to be used in a transport Function which gives the last output. ANN learning techniques are mostly divided into supervised or unsupervised according to the knowledge technique used. Supervised technique must reach a desired production, if not; the numerical algorithms built in ANN will make some adjustments until it reaches the probable production. The unsupervised knowledge is the reverse technique of the previous technique, i.e. it is given a some elements for inputs and no right output. In state of IDS these knowledge techniques are used to add to the system intelligence in distinctive among normal and interloper behaviors. unlike expert systems, which can present the user with a best result if the distinctiveness, which are surveyed precisely, match those, which have been coded in the rule base, a neural network conducts an analysis of the information and provides expectedly estimation that the data matches the distinctiveness, which it has been trained on recognition of. While the probability of a match definition by a neural network can be 100%, the correctness of its decisions dependence absolutely on the experience the system gains in analyzing examples of the current problem. The Neural Network gains the experience principally by exercise the system to properly identify pre-selected examples of the problem. The echo of the Neural Network is explained and the setting of the system is polished until the neural network’s analysis of the exercising data reaches a pleasurable level. In addition to the main exercise period, the neural network also gains knowledge over time as it conducts analyses on data related to the problem.

1.3 Fuzzy Logic
Fuzzy Logic was presented as a means to the model of doubt of natural language. And due to the doubt nature of intrusions fuzzy sets are powerfully used in discovering attack actions and reducing the average of false alarms at the same time. Essentially, intrusion detection systems discriminate among two discrete types of behaviors, normal and abnormal, which create two discrete sets of system and information. Fuzzy logic could create sets that have among values where the differences among the two sets are not good defined. In this case the logic depends on linguistics by taking the minimum of set of events or maximum instead of stating OR, AND or NOT operation in the if-then-else situation. This attribute powerfully participates in reducing the false positive alarm rates in the system. [12][24].
NeGPAIM-W2 has two low-level processing units counting the fuzzy engine, which it will process the input data. This engine is liable for execute the abuse Detection methodology.
The fuzzy engine will calculate a pattern firstly, and the user action graph will be mapped versus it to decide how-ever or not a user (intruder) has been, or is performing an intrusion attack. The overall intrusion probability for the network sensors is divided into two weighted parts: one weighting for the wireless attack probability and the other for the wired network intrusion attack probability. The fuzzy engine’s network detection rules have been updated with the new NeGPAIMW 2 Model to provide a better detection rate. The rules have been updated to detect attacks at layers 2 and 3 of the OSI model, where the previous fuzzy engine specifically targeted layer 3 only. The modern model allows for improved performance by divided the network exposure into wired and wireless one by one, and weighting the outputs to form a final fuzzy intrusion attack probability as seen in Fig.2. This also give a permission to the engine to get into account the variation in broadcast of data over the unlike network mediums. The fuzzy engine will pass its intrusion probability value to the central analysis engine. This is a continuous process.

Figure 1: General Representation of NeGPAIM-W2.

Figure 2: Comparison between Traditional and Alternative
Misuse Detection.

Figure 3: High Level Detection Model.

2 COMPARATIVE ANALYSIS
Comparative analysis of chosen techniques in terms of performance accuracy of decision making.

2.1 Neural Network
When we used the neural networks in the task of alarm for the purpose of detecting intruders for 10 users. Was accurate to the degree of 96% for strangers and other activities not normal with 7% of alarms wrong.

2.2 GENETIC ALGORITHM
Chittur [26] achieved for genetic algorithm detection for the purpose of spy and actives strange success rate of 97% This is demonstrated by the low rate of false alarms.

2.3 FUZZY LOGIC
The fuzzy engine was set to this study this as an action of abuse as every scheduling wireless hardware have their MAC addresses registered. The result of the fuzzy engine at this point was set at 15% possibility of attack due to the excited common presented. The result was once again forwarded to the CAE. The CAE, at this point, still only received intrusion possibility from the fuzzy engine and, after performing the statistical calculations, the CAE output is 7.5% possibility of attack. This is still too low to apply any active or passive request. Step 3 Results At Step 3 of his/her attack, Intruder1 had broken the WEP key for AP1, from the data gathered during Step 2. The intruder then proceeded to ports can Host1, the DHCP and FTP server, which excited off one more two wireless common presented. The fuzzy engine's result at this point was set at forty percent possibility of attack. This information was then reported to the CAE as was finish before. The CAE has still only received intrusion possibility from the fuzzy engine at this point. After the stage the statistical calculations, the CAE output is 20% possibility of attack.

3 DISCUSSION
Expert Systems used in Intrusion Detection techniques as a significant objective in the increase of effective detection-based information security systems. But "expert". unluckily, Expert Systems necessitate frequent updates by a System Administrator to stay present. The require of repairs or update will degrade the security of the entire system while the system's users think that the system is safe, even if one of the key components becomes unsuccessful over time.

Advantages of Neural Network-based Intrusion Detection Systems
The primary benefit in the using of a neural network in the detection would be the litheness that the network would supply. (A N N) would be able of analyzing the data from the network, even if the data is unfinished or indistinct.
Also, the network ability to non-linear analysis of the data, because it can be exposed to several networks, coordinated attacks, has a special ability to handle data from multiple sources in a non-linear. The advantage inherent speed of neural networks. Help to detect or predict the speed of the various attacks. A Neural Network-based abuse detection system would identify the possibility that a particular event, or series of actions, was indicative of an attack against the system. As the Neural Network gains practice it will improve its capability to determine where these actions are likely to occur in the attack process. This information could then be used to produce a series of events that should happen if this is in actuality an intrusion effort. By tracking occurs following these procedures will be able to perfect the system analysis procedures, to carry out security measures and successful preventive.

Disadvantages of Neural Network-based Intrusion Detection Systems
In the past, neural networks is able to detect the infiltration methods for two main reasons. First one they are not trained good on detection methods, data and training necessary for accurate intrusion detection, secondly; black box

4 CONCLUSION in this paper, Intrusion Detection System summary was presented, giving the dissimilar trends and technologies that might be used Artificial Intelligence methods are in advance the most attention presently concerning its ability to study and develop, which makes them more exact and usefully in facing the huge number of unpredictable attacks. Three main techniques were highlighted, were the use of Genetic Algorithms, fuzzy logic and neural network providing system classifiers with extra intelligence.

References
1 “Intrusion Detection Systems using Genetic Algorithms”By: LameesAlhazzaa
ID: 426221091
Proposed to: Dr. Hassan Mathkour
2 Bobor, V. "Efficient Intrusion Detection System Architecture Based on Neural
Networks and Genetic Algorithms.", Department of Computer and Systems Sciences,
Stockholm University / Royal Institute of Technology, KTH/DSV, 2006.
3 Faraoun, K M., and A. Boukelif. "Genetic Programming Approach for Multi-Category
Pattern Classification Applied to Network Intrusions Detection.", INTERNATIONAL
JOURNAL OF COMPUTATIONAL INTELLIGENCE, Vol. 3, No. 1, 2006 pp. 79-90.
4 SHAHBAZ PERVEZ, IFTIKHAR AHMAD, ADEEL AKRAM, SAMI ULLAH
SWATI University of Engineering and Technology, Taxila, Pakistan
{Shahbaz, adeel}@uettaxila.edu.pk
5 Page, J., Heaney, J., Adkins, M. &Dolsen, G. (1989). Evaluation of Security Model Rule
Bases.Technical Report.Planning Research Corporation.

6 Lunt, T.F. (1989).Real-Time Intrusion Detection.Proceedings from IEEE COMPCON.
7 Mukherjee, B., Heberlein, L.T. & Levitt, K.N. (May/June, 1994). Network Intrusion
Detection. IEEE Network. pp. 26-41.
8 Gong, R.H. , M. Zulkernine, P. Abolmaesumi, "A Software Implementation of a
Genetic Algorithm Based Approach to Network Intrusion Detection," Proceedings of
Sixth IEEE ACIS International Conference on Software Engineering, Artificial
Intelligence, Networking, and Parallel/Distributed Computing (SNPD),May 2005,
Maryland,USA.
9 Utilizing Fuzzy Logic and Neural Networks for Effective,
Preventative Intrusion Detection in a Wireless Environment
Robert Goss. Nelson Mandela Metropolitan. University Port Elizabeth(6001) rossouw.vonsolms@nmmu.ac.za 10 Wilhelm, A. (2000).The State of the Digital Divide in USA. Retrieved May 25, 2005, from 34 http://www.digitalechancen. de/transfer/downloads/MD43.pdf 11 Miniwatts Marketing Group.(2007). Internet World Stats. Retrieved from http://www.internetworldstats.com/ 12 Yao, J. T., S.L. Zhao, and L.V. Saxton, “ A study on fuzzy intrusion detection ”,
Proceedings of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information
Assurance, And
Data Networks Security, 28 March - 1 April 2005, Orlando, Florida, USA.
13 Ryan, J., Lin, M., and Miikkulainen, R. (1997). Intrusion Detection with Neural
Networks. AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI
Workshop (Providence, Rhode Island), pp. 72-79. Menlo Park, CA: AAAI.
14 Rhodes, B., Mahaffey, J., &Cannady, J. (2000, October). Multiple Self-Organizing
Maps for Intrusion Detection. Proceedings of the 23rd National Information Systems
Security Conference.
15 Cannady, J. (2000, October). Next Generation Intrusion Detection: Autonomous
Reinforcement
Intrusion Detection. Proceedings of the 23rd National Information Systems Security
Conference.

16 Li, W., "Using Genetic Algorithm for Network Intrusion Detection," Proceedings of the
United States Department of Energy Cyber Security Group 2004 Training Conference,
May
24-27, 2004, Kansas City, Kansas, USA.
18 Marczyk, A. "Genetic Algorithms and Evolutionary Computation.", The Talk, Origins
Archive. 23 Apr. 2004. 7 Oct. 2006 <http://www.talkorigins.org/faqs/genalg/genalg.html>.
24 Gomez, J., and D. Dasgupta. "Evolving Fuzzy Classifiers for Intrusion Detection.",
Proceedings of the 2002 IEEE, Workshop on Information Assurance, United States
Military Academy, June 2001,West Point, NY .
26 Chittur, A., "Model Generation for an Intrusion Detection System Using Genetic
Algorithms.”, High School Honors Thesis, Ossining High School,Ossining, NY., 27
Nov, 2001.
27 Fox, Kevin L., Henning, Rhonda R., and Reed, Jonathan H. (1990). A Neural Network
Approach Towards Intrusion
Detection.In Proceedings of the 13th National Computer Security Conference.
28 Hammerstrom, Dan. (June, 1993). Neural Networks At Work. IEEE Spectrum. pp.
26-53.

Similar Documents

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506

Free Essay

Syllabus

...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...

Words: 13848 - Pages: 56

Premium Essay

Databasse Management

...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...

Words: 229471 - Pages: 918

Premium Essay

Ggggggg

...Retailing in the 21st Century Manfred Krafft ´ Murali K. Mantrala (Editors) Retailing in the 21st Century Current and Future Trends With 79 Figures and 32 Tables 12 Professor Dr. Manfred Krafft University of Muenster Institute of Marketing Am Stadtgraben 13±15 48143 Muenster Germany mkrafft@uni-muenster.de Professor Murali K. Mantrala, PhD University of Missouri ± Columbia College of Business 438 Cornell Hall Columbia, MO 65211 USA mantralam@missouri.edu ISBN-10 3-540-28399-4 Springer Berlin Heidelberg New York ISBN-13 978-3-540-28399-7 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2005932316 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not...

Words: 158632 - Pages: 635

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 The...

Words: 239887 - Pages: 960

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Premium Essay

Future of Technology

...THE FUTURE OF TECHNOLOGY OTHER ECONOMIST BOOKS Guide to Analysing Companies Guide to Business Modelling Guide to Business Planning Guide to Economic Indicators Guide to the European Union Guide to Financial Markets Guide to Management Ideas Numbers Guide Style Guide Dictionary of Business Dictionary of Economics International Dictionary of Finance Brands and Branding Business Consulting Business Ethics Business Strategy China’s Stockmarket Globalisation Headhunters and How to Use Them Successful Mergers Wall Street Essential Director Essential Economics Essential Finance Essential Internet Essential Investment Essential Negotiation Pocket World in Figures THE FUTURE OF TECHNOLOGY THE ECONOMIST IN ASSOCIATION WITH PROFILE BOOKS LTD Published by Profile Books Ltd 3a Exmouth House, Pine Street, London ec1r 0jh Copyright © The Economist Newspaper Ltd 2005 All rights reserved. Without limiting the rights under copyright reserved above, no part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of both the copyright owner and the publisher of this book. The greatest care has been taken in compiling this book. However, no responsibility can be accepted by the publishers or compilers for the accuracy of the information presented. Where opinion is expressed it is that of the author and does not necessarily...

Words: 128899 - Pages: 516

Premium Essay

Human Resoucre

...WINDHOEK-NAMIBIA STUDY MANUAL INFORMATION MANAGEMENT SYSTEMS CODE: BIS - 3315 TABLE OF CONTENTS CHAPTER PAGE NUMBER 1. WHY INFORMATION SYSTEMS………………………………………….6 2. Strategic role of information systems…………………..21 3. Information systems in organizations…………………..26 4. Computer and information processing…………………42 5. Managing data resources………………………………………..60 6. Networking and information systems…………………..81 7. Systems development…………………………………………………90 8. Implementation of information systems……………….97 9. Managing knowledge……………………………………………….106 10. Decision support systems………………………………………….129 THE STRUCTURE OF THIS STUDY MODULE The Module has margin icons that show the student the objectives, activities, in-text questions, feedback, further reading, key words and terms, stop and reflex signs. Chapter One covers the importance of Information Systems in running today’s organizations. Chapter Two looks at the strategic role played by information systems in today’s organizations. Chapter Three focuses on the impact of Information Systems on the organizational structure and how information systems help managers improve their decision making. Chapter Four looks at the hardware and software requirements for organizations to be able to implement information systems structures Chapter Five looks at the traditional file environments and the rise of the database management systems. Chapter 6 shows looks at networks and how...

Words: 43854 - Pages: 176

Premium Essay

Isi List

...ISI, IBSS & SA DHET - FOR 2012 SUBMISSION TITLE LIST COUNTRY ISSN E-ISSN PUBLISHER'S DETAILS Subject classifaction International Accreditation - SA JOURNALS 4Or-A Quarterly Journal Of Operations Research ISI SCIENCE A + U-Architecture And Urbanism ISI ARTS & HUMANITIES A Contrario IBSS Aaa-Arbeiten Aus Anglistik Und Amerikanistik ISI ARTS & HUMANITIES Aaohn Journal ISI SCIENCE Aaohn Journal ISI SOC SCIENCE Aapg Bulletin ISI SCIENCE Aaps Journal ISI SCIENCE Aaps Pharmscitech ISI SCIENCE Aatcc Review ISI SCIENCE Abacus: Journal Of Accounting, Finance And Business Studies IBSS Abacus-A Journal Of Accounting Finance And Business StudiesISI SOC SCIENCE Abdominal Imaging ISI SCIENCE Abhandlungen Aus Dem Mathematischen Seminar Der UniversISI SCIENCE Abstract And Applied Analysis ISI SCIENCE Abstracts Of Papers Of The American Chemical Society ISI SCIENCE Academia-Revista Latinoamericana De Administracion ISI SOC SCIENCE Academic Emergency Medicine ISI SCIENCE Academic Medicine ISI SCIENCE Academic Pediatrics ISI SCIENCE Academic Psychiatry ISI SOC SCIENCE Academic Radiology ISI SCIENCE Academy Of Management Annals ISI SOC SCIENCE Academy Of Management Journal ISI SOC SCIENCE Academy Of Management Journal IBSS Academy Of Management Learning & Education ISI SOC SCIENCE Academy Of Management Perspectives ISI SOC SCIENCE Academy Of Management Perspectives IBSS Academy Of Management Review ISI SOC SCIENCE Academy Of Management Review IBSS Academy Of Marketing Science Review IBSS Acadiensis...

Words: 151197 - Pages: 605

Premium Essay

Philosophy and Design

...Philosophy and Design Pieter E. Vermaas • Peter Kroes Andrew Light • Steven A. Moore Philosophy and Design From Engineering to Architecture Pieter E. Vermaas Delft University of Technology Delft the Netherlands Andrew Light University of Washington Seattle USA Peter Kroes Delft University of Technology Delft the Netherlands Steven A. Moore University of Texas Austin USA ISBN 978-1-4020-6590-3 e-ISBN 978-1-4020-6591-0 Library of Congress Control Number: 2007937486 © 2008 Springer Science + Business Media B.V. No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Printed on acid-free paper. 9 8 7 6 5 4 3 2 1 springer.com Contents List of Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Design in Engineering and Architecture: Towards an Integrated Philosophical Understanding . . . . . . . . . . . . . . . . . Peter Kroes, Andrew Light, Steven A. Moore, and Pieter E. Vermaas Part I Engineering Design ix 1 Design, Use, and the Physical and Intentional Aspects of Technical Artifacts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 165744 - Pages: 663

Premium Essay

Pmda Handbook New Product Developme

...THE PDMA HANDBOOK OF NEW PRODUCT DEVELOPMENT T HIRD E DITION Kenneth B. Kahn, Editor Associate Editors: Sally Evans Kay Rebecca J. Slotegraaf Steve Uban JOHN WILEY & SONS, INC. Cover image: © Les Cunliffe/iStockphoto Cover design: Elizabeth Brooks This book is printed on acid-free paper. Copyright © 2013 by John Wiley & Sons, Inc. All rights reserved Published by John Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 7486008, or online at www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with the respect to the accuracy or completeness of the contents of...

Words: 165678 - Pages: 663

Free Essay

Maglev

...*3963103* [3963] – 103 T.E. (Petroleum) (Semester – I) Examination, 2011 DRILLING & PRODUCTION OPERATIONS (2003 Course) Time : 3 Hours Max. Marks : 100 Instructions : 1) Question Nos. 1 and 5 are compulsory. Out of the remaining attempt 2 questions from Section I and 2 questions from Section II. 2) Answers to the two Sections should be written in separate books. 3) Neat diagrams must be drawn wherever necessary. 4) Black figures to the right indicate full marks. 5) Use of Logarithmic Tables, Slide Rule, Mollier Charts, Electronic Pocket Calculator and Steam Tables is allowed. 6) Assume suitable data, if necessary. SECTION – I 1. What are different systems on a drilling rig ? Explain any one in detail with suitable diagramme. 18 2. a) Calculate Bottom hole pressure if well depth is 2500 m and mud weight is 1.2 gm/cc. b) Calculate mud weight if mud gradient is 0.87 psi/ft. ′ c) Calculate volume bbl/meter for drill pipe O.D. = 5′ inch and I.D. = 4.276 inch. 2 2 2 10 8 8 16 d) Draw circulation system on a drilling rig. 3. a) Discuss IADC classification of a bit in details. b) Discuss different factors affecting rate of penetration in details. 4. Write short note on : i) Coring ii) Fishing tools iii) BOP iv) Directional well P.T.O. [3963] – 103 -2- *3963103* SECTION – II 5. a) Discuss different types of casings and function of the casings in brief. b) Discuss different types of well completion techniques. 6. a) Discuss primary cementation process with...

Words: 172166 - Pages: 689

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455