Search results for: vulnerable road users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4571

Search results for: vulnerable road users

3971 Structural Behavior of Subsoil Depending on Constitutive Model in Calculation Model of Pavement Structure-Subsoil System

Authors: M. Kadela

Abstract:

The load caused by the traffic movement should be transferred in the road constructions in a harmless way to the pavement as follows: − on the stiff upper layers of the structure (e.g. layers of asphalt: abrading and binding), and − through the layers of principal and secondary substructure, − on the subsoil, directly or through an improved subsoil layer. Reliable description of the interaction proceeding in a system “road construction – subsoil” should be in such case one of the basic requirements of the assessment of the size of internal forces of structure and its durability. Analyses of road constructions are based on: − elements of mechanics, which allows to create computational models, and − results of the experiments included in the criteria of fatigue life analyses. Above approach is a fundamental feature of commonly used mechanistic methods. They allow to use in the conducted evaluations of the fatigue life of structures arbitrarily complex numerical computational models. Considering the work of the system “road construction – subsoil”, it is commonly accepted that, as a result of repetitive loads on the subsoil under pavement, the growth of relatively small deformation in the initial phase is recognized, then this increase disappears, and the deformation takes the character completely reversible. The reliability of calculation model is combined with appropriate use (for a given type of analysis) of constitutive relationships. Phenomena occurring in the initial stage of the system “road construction – subsoil” is unfortunately difficult to interpret in the modeling process. The classic interpretation of the behavior of the material in the elastic-plastic model (e-p) is that elastic phase of the work (e) is undergoing to phase (e-p) by increasing the load (or growth of deformation in the damaging structure). The paper presents the essence of the calibration process of cooperating subsystem in the calculation model of the system “road construction – subsoil”, created for the mechanistic analysis. Calibration process was directed to show the impact of applied constitutive models on its deformation and stress response. The proper comparative base for assessing the reliability of created. This work was supported by the on-going research project “Stabilization of weak soil by application of layer of foamed concrete used in contact with subsoil” (LIDER/022/537/L-4/NCBR/2013) financed by The National Centre for Research and Development within the LIDER Programme. M. Kadela is with the Department of Building Construction Elements and Building Structures on Mining Areas, Building Research Institute, Silesian Branch, Katowice, Poland (phone: +48 32 730 29 47; fax: +48 32 730 25 22; e-mail: m.kadela@ itb.pl). models should be, however, the actual, monitored system “road construction – subsoil”. The paper presents too behavior of subsoil under cyclic load transmitted by pavement layers. The response of subsoil to cyclic load is recorded in situ by the observation system (sensors) installed on the testing ground prepared for this purpose, being a part of the test road near Katowice, in Poland. A different behavior of the homogeneous subsoil under pavement is observed for different seasons of the year, when pavement construction works as a flexible structure in summer, and as a rigid plate in winter. Albeit the observed character of subsoil response is the same regardless of the applied load and area values, this response can be divided into: - zone of indirect action of the applied load; this zone extends to the depth of 1,0 m under the pavement, - zone of a small strain, extending to about 2,0 m.

Keywords: road structure, constitutive model, calculation model, pavement, soil, FEA, response of soil, monitored system

Procedia PDF Downloads 345
3970 Flood Vulnerability Zoning for Blue Nile Basin Using Geospatial Techniques

Authors: Melese Wondatir

Abstract:

Flooding ranks among the most destructive natural disasters, impacting millions of individuals globally and resulting in substantial economic, social, and environmental repercussions. This study's objective was to create a comprehensive model that assesses the Nile River basin's susceptibility to flood damage and improves existing flood risk management strategies. Authorities responsible for enacting policies and implementing measures may benefit from this research to acquire essential information about the flood, including its scope and susceptible areas. The identification of severe flood damage locations and efficient mitigation techniques were made possible by the use of geospatial data. Slope, elevation, distance from the river, drainage density, topographic witness index, rainfall intensity, distance from road, NDVI, soil type, and land use type were all used throughout the study to determine the vulnerability of flood damage. Ranking elements according to their significance in predicting flood damage risk was done using the Analytic Hierarchy Process (AHP) and geospatial approaches. The analysis finds that the most important parameters determining the region's vulnerability are distance from the river, topographic witness index, rainfall, and elevation, respectively. The consistency ratio (CR) value obtained in this case is 0.000866 (<0.1), which signifies the acceptance of the derived weights. Furthermore, 10.84m2, 83331.14m2, 476987.15m2, 24247.29m2, and 15.83m2 of the region show varying degrees of vulnerability to flooding—very low, low, medium, high, and very high, respectively. Due to their close proximity to the river, the northern-western regions of the Nile River basin—especially those that are close to Sudanese cities like Khartoum—are more vulnerable to flood damage, according to the research findings. Furthermore, the AUC ROC curve demonstrates that the categorized vulnerability map achieves an accuracy rate of 91.0% based on 117 sample points. By putting into practice strategies to address the topographic witness index, rainfall patterns, elevation fluctuations, and distance from the river, vulnerable settlements in the area can be protected, and the impact of future flood occurrences can be greatly reduced. Furthermore, the research findings highlight the urgent requirement for infrastructure development and effective flood management strategies in the northern and western regions of the Nile River basin, particularly in proximity to major towns such as Khartoum. Overall, the study recommends prioritizing high-risk locations and developing a complete flood risk management plan based on the vulnerability map.

Keywords: analytic hierarchy process, Blue Nile Basin, geospatial techniques, flood vulnerability, multi-criteria decision making

Procedia PDF Downloads 57
3969 Evaluation of Manual and Automatic Calibration Methods for Digital Tachographs

Authors: Sarp Erturk, Levent Eyigel, Cihat Celik, Muhammet Sahinoglu, Serdar Ay, Yasin Kaya, Hasan Kaya

Abstract:

This paper presents a quantitative analysis on the need for automotive calibration methods for digital tachographs. Digital tachographs are mandatory for vehicles used in people and goods transport and they are an important aspect for road safety and inspection. Digital tachographs need to be calibrated for workshops in order for the digital tachograph to display and record speed and odometer values correctly. Calibration of digital tachographs can be performed either manual or automatic. It is shown in this paper that manual calibration of digital tachographs is prone to errors and there can be differences between manual and automatic calibration parameters. Therefore automatic calibration methods are imperative for digital tachograph calibration. The presented experimental results and error analysis clearly support the claims of the paper by evaluating and statistically comparing manual and automatic calibration methods.

Keywords: digital tachograph, road safety, tachograph calibration, tachograph workshops

Procedia PDF Downloads 320
3968 Bringing the Confidence Intervals into Choropleth Mortality Map: An Example of Tainan, Taiwan

Authors: Tzu-Jung Tseng, Pei-Hsuen Han, Tsung-Hsueh Lu

Abstract:

Background: Choropleth mortality map is commonly used to identify areas with higher mortality risk. However, the use of choropleth map alone might result in the misinterpretation of differences in mortality rates between areas. Two areas with different color shades might not actually have a significant difference in mortality rates. The mortality rates estimated for an area with a small population would be less stable. We suggest of bringing the 95% confidence intervals (CI) into the choropleth mortality map to help users interpret the areal mortality rate difference more properly. Method: In the first choropleth mortality map, we used only three color to indicate standardized mortality ratio (SMR) for each district in Tainan, Taiwan. The red color denotes that the SMR of that district was significantly higher than the Tainan average; on the contrary, the green color suggests that the SMR of that district was significantly lower than the Tainan average. The yellow color indicates that the SMR of that district was not statistically significantly different from the Tainan average. In the second choropleth mortality map, we used traditional sequential color scheme (color ramp) for different SMR in 37 districts in Tainan City with bar chart of each SMR with 95% CI in which the users could examine if the line of 95% CI of SMR of two districts overlapped (nonsignificant difference). Results: The all-causes SMR of each district in Tainan for 2008 to 2013 ranged from 0.77 (95% CI 0.75 to 0.80) in East District to 1.39 Beimen (95% CI 1.25 to 1.52). In the first choropleth mortality map, only 16 of 37 districts had red color and 8 districts had green color. For different causes of death, the number of districts with red color differed. In the first choropleth mortality map we added a bar chart with line of 95% CI of SMR in each district, in which the users could visualize the SMR differences between districts. Conclusion: Through the use of 95% CI the users could interpret the aral mortality differences more properly.

Keywords: choropleth map, small area variation, standardized mortality ratio (SMR), Taiwan

Procedia PDF Downloads 309
3967 Improving Usability of e-Government for the Elderly

Authors: Tamas Molnar

Abstract:

Electronic government systems are currently in the same development stage as e-commerce applications were about in the late 1990s. Wide adoption by the majority of population is near, as such services are not only more and more desired by the users, but also strongly advocated and pushed by the state, as a means to increase effectiveness and cut expenses at the same time. Diffusion is however hampered by the low motivation caused by usability issues which will cause more and more frustration as the general population ages. Usability centred design is essential when creating such services. Elderly users, who have statistically the least experience, have the most problems, and therefore reject unusable systems first. The goal of our research was to find a way to map the needs of the elderly and create guidelines for the design of electronic government systems which are usable for the whole population. The first phase of our research, started mid-2009, was centred on the idea to gather information about the needs of the target group, in both Germany and Hungary with over 70 participants. This was done with the help of scenarios, interviews and questionnaires. The supplied data enabled to choose an eGovernment system for tests on the target group. Tests conducted in Germany and Hungary were based on the design and functions of the German electronic ID card, in the native languages. Scenarios mirroring common, every day transactions requiring an identification procedure were used. The obtained results allowed us to develop a generalised solution, the IGUAN guideline. This guideline makes a standardised approach to the usability improvement process possible. It contains the special requirements of elderly users, and a catalogue of criteria, which helps to develop an application in line with the set requirements. The third phase of our research was used a proof of concept for the IGUAN. The guideline was evaluated and tested with an iterative prototyping. The successful completion of this phase indicates that the IGUAN can be used to measurably increase the acceptance of e-government systems by elderly users. We could therefore demonstrate that improvements in the interface make e-government application possible which are perceived useful and easy to use by elderly users. These improvements will measurably increase the user motivation and experience. This can however only be achieved with a structured design process, and requires a framework which takes the requirements of the elderly users into account.

Keywords: e-Government, usability, acceptance, guidelines

Procedia PDF Downloads 530
3966 An Investigation of the Operation and Performance of London Cycle Hire Scheme

Authors: Amer Ali, Jessica Cecchinelli, Antonis Charalambous

Abstract:

Cycling is one of the most environmentally friendly, economic and healthy modes of transport but it needs more efficient cycle infrastructure and more effective safety measures. This paper represents an investigation into the performance and operation of the London Cycle Hire Scheme which started to operate in July 2010 using 5,000 cycles and 315 docking stations and currently has more than 10,000 cycles and over 700 docking stations across London which are available 24/7, 365 days a year. The study, which was conducted during the second half of 2014, consists of two parts; namely, the longitudinal review of the hire scheme between its introduction in 2010 and November 2014, and a field survey in November 2014 in the form of face-face interviews of the users of the cycle scheme to ascertain the existing limitations and difficulties experienced by those users and how it could be improved in terms of capability and safety. The study also includes a correlation between the usage of the cycle scheme and the corresponding weather conditions. The main findings are that on average the number of users (hiring frequency) had increased from just over two millions hires in 2010 to just less than ten millions in 2014. The field survey showed that 80% of the users are satisfied with the performance of the scheme whilst 50% of the users raised concern about the safety level of using the available cycle routes and infrastructure. The study also revealed that a high percentage of the cycle trips were relatively short (less than 30 minutes). Although the weather condition had some effect on cycling, the cost of using the cycle scheme and the main events in London had more effect on the number of cycle hires. The key conclusions are that despite the safety concern and the lack of infrastructure for continuous routes there was an encouraging number of people who opted for cycling as a clean, affordable, and healthy mode of transport. There is a need to expand the scheme by providing more cycles and docking stations and to support that by more well-designed and maintained cycle routes. More details about the development of London Cycle Hire Scheme during the last five years, its performance and the key issues revealed by the surveyed users will be reported in the full version of the paper.

Keywords: cycling mode of transport, london cycle hire scheme, safety, environmental and health benefits, user satisfaction

Procedia PDF Downloads 378
3965 Quantifying Mobility of Urban Inhabitant Based on Social Media Data

Authors: Yuyun, Fritz Akhmad Nuzir, Bart Julien Dewancker

Abstract:

Check-in locations on social media provide information about an individual’s location. The millions of units of data generated from these sites provide knowledge for human activity. In this research, we used a geolocation service and users’ texts posted on Twitter social media to analyze human mobility. Our research will answer the questions; what are the movement patterns of a citizen? And, how far do people travel in the city? We explore the people trajectory of 201,118 check-ins and 22,318 users over a period of one month in Makassar city, Indonesia. To accommodate individual mobility, the authors only analyze the users with check-in activity greater than 30 times. We used sampling method with a systematic sampling approach to assign the research sample. The study found that the individual movement shows a high degree of regularity and intensity in certain places. The other finding found that the average distance an urban inhabitant can travel per day is as far as 9.6 km.

Keywords: mobility, check-in, distance, Twitter

Procedia PDF Downloads 153
3964 Background Check System for Turkish IT Companies

Authors: Arzu Baloglu, Ugur Kaplancali

Abstract:

This paper focuses on Background Check Systems and Pre-Employment Screening. In our study, we attempted to make an online background checking site that will help employers when hiring employees. Our site has two types of users which are free and powered user. Free users are the employees and powered users are the employers which will hire employers. The database of the site will contain all the information about the employees and employers which are registered in the system so the employers can make a search based on their searching criteria to find the suitable employee for the job. The web site also has a comments and points system. The current employer can make comments to his/her employees and can also give them points. The comments will be shown on employee’s profile, so; when an employer searches for an employee he/she can check the points and comments of the employee to see whether he or she is capable of the job or not. The employers can also follow some employees if they desire. This paper has been designed and implemented with using ASP.NET, C# and JavaScript. The outputs have a user friendly interface. The interface also aimed to provide the useful information for Turkish Technology Companies.

Keywords: background, checking, verification, human resources, online

Procedia PDF Downloads 188
3963 Solar Powered Front Wheel Drive (FWD) Electric Trike: An Innovation

Authors: Michael C. Barbecho, Romeo B. Morcilla

Abstract:

This study focused on the development of a solar powered front wheel drive electric trike for personal use and short distance travel, utilizing solar power and a variable speed transmission to adapt in places where varying road grades and unavailability of plug-in charging stations are of great problems. The actual performance of the vehicle was measured in terms of duration of charging using solar power, distance travel and battery power duration, top speed developed at full power, and load capacity. This project followed the research and development process which involved planning, designing, construction, and testing. Solar charging tests revealed that the vehicle requires 6 to 8 hours sunlight exposure to fully charge the batteries. At full charge, the vehicle can travel 35 km utilizing battery power down to 42%. Vehicle showed top speed of 25 kph at 0 to 3% road grade carrying a maximum load of 122 kg. The maximum climbing grade was 23% with the vehicle carrying a maximum load of 122 kg. Technically the project was feasible and can be a potential model for possible conversion of traditional Philippine made “pedicabs” and gasoline engine powered tricycle into modern electric vehicles. Moreover, it has several technical features and advantages over a commercialized electric vehicle such as the use solar charging system and variable speed power transmission and front drive power train for adaptability in any road gradient.

Keywords: electric vehicle, solar vehicles, front drive, solar, solar power

Procedia PDF Downloads 556
3962 Travellers’ Innovation Segmentation for Shared Accommodation: Comparing Travellers’ Segmentation Pre- and Post-adoption in Shanghai, China

Authors: Lei Qin

Abstract:

As shared accommodation has become one of the most important market developments in the tourism industry, numerous contributions have emerged on travelers’ motivations to choose shared accommodation. A debated question, however, resides in the heterogeneity of travelers based on motivations. This paper aims to reconcile opposing perspectives by comparing motivation segmentation at two distinct phases of innovation adoption of this new hospitality option: (i) before the first travel – potential users showing interest (n=420) and (ii) after the first travel – users (n=420). Interestingly, we find that travelers (including pre-and-post adopters) have a stronger agreement in experiential motivations than practical motivations. However, the heterogeneity of motivations among travelers is significantly higher in users, increasing from two to six clusters, which means travelers cluster into more and distinct motivation groups after adoption. Rather than invalidating specific assumptions used in the literature in terms of motivation heterogeneity, this paper reconciles opposing findings by putting them along with one another in the process of innovation adoption. A subsequent tourists’ segmentation based on motivations were conducted according to their innovation adoption stages.

Keywords: motivation, pre-and-post adoption, shared accommodation, segmentation

Procedia PDF Downloads 130
3961 Financial Liberalization and Allocation of Bank Credit in Malaysia

Authors: Chow Fah Yee, Eu Chye Tan

Abstract:

The main purpose of developing a modern and sophisticated financial system is to mobilize and allocate the country’s resources for productive uses and in the process contribute to economic growth. Financial liberalization introduced in Malaysia in 1978 was said to be a step towards this goal. According to Mc-Kinnon and Shaw, the deregulation of a country’s financial system will create a more efficient and competitive market driven financial sector; with savings being channelled to the most productive users. This paper aims to assess whether financial liberalization resulted in bank credit being allocated to the more productive users, for the case of Malaysia by: firstly, using Chi-square test to if there exists a relationship between financial liberalization and bank lending in Malaysia. Secondly, to analyze on a comparative basis, the share of loans secured by 9 major economic sectors, using data on bank loans from 1975 to 2003. Lastly, present value analysis and rank correlation was used to determine if the recipients of bigger loans are the more efficient users. Chi-square test confirmed the generally observed trend of an increase in bank credit with the adoption of financial liberalization. While the comparative analysis of loans showed that the bulk of credit were allocated to service sectors, consumer loans and property related sectors, at the expense of industry. Results for rank correlation analysis showed that there is no relationship between the more productive users and amount of loans obtained. This implies that the recipients (sectors) that received more loans were not the more efficient sectors.

Keywords: allocation of resources, bank credit, financial liberalization, economics

Procedia PDF Downloads 432
3960 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 289
3959 Flood-prone Urban Area Mapping Using Machine Learning, a Case Sudy of M'sila City (Algeria)

Authors: Medjadj Tarek, Ghribi Hayet

Abstract:

This study aims to develop a flood sensitivity assessment tool using machine learning (ML) techniques and geographic information system (GIS). The importance of this study is integrating the geographic information systems (GIS) and machine learning (ML) techniques for mapping flood risks, which help decision-makers to identify the most vulnerable areas and take the necessary precautions to face this type of natural disaster. To reach this goal, we will study the case of the city of M'sila, which is among the areas most vulnerable to floods. This study drew a map of flood-prone areas based on the methodology where we have made a comparison between 3 machine learning algorithms: the xGboost model, the Random Forest algorithm and the K Nearest Neighbour algorithm. Each of them gave an accuracy respectively of 97.92 - 95 - 93.75. In the process of mapping flood-prone areas, the first model was relied upon, which gave the greatest accuracy (xGboost).

Keywords: Geographic information systems (GIS), machine learning (ML), emergency mapping, flood disaster management

Procedia PDF Downloads 79
3958 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 469
3957 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 175
3956 Assessment of Heavy Metal Contamination for the Sustainable Management of Vulnerable Mangrove Ecosystem, the Sundarbans

Authors: S. Begum, T. Biswas, M. A. Islam

Abstract:

The present research investigates the distribution and contamination of heavy metals in core sediments collected from three locations of the Sundarbans mangrove forest. In this research, quality of the analysis is evaluated by analyzing certified reference materials IAEA-SL-1 (lake sediment), IAEA-Soil-7, and NIST-1633b (coal fly ash). Total concentrations of 28 heavy metals (Na, Al, K, Ca, Sc, Ti, V, Cr, Mn, Fe, Co, Zn, Ga, As, Sb, Cs, La, Ce, Sm, Eu, Tb, Dy, Ho, Yb, Hf, Ta, Th, and U) have determined in core sediments of the Sundarbans mangrove by neutron activation analysis (NAA) technique. When compared with upper continental crustal (UCC) values, it is observed that mean concentrations of K, Ti, Zn, Cs, La, Ce, Sm, Hf, and Th show elevated values in the research area is high. In this research, the assessments of metal contamination levels using different environmental contamination indices (EF, Igeo, CF) indicate that Ti, Sb, Cs, REEs, and Th have minor enrichment of the sediments of the Sundarbans. The modified degree of contamination (mCd) of studied samples of the Sundarbans ecosystem show low contamination. The pollution load index (PLI) values for the cores suggested that sampling points are moderately polluted. The possible sources of the deterioration of the sediment quality can be attributed to the different chemical carrying cargo accidents, port activities, ship breaking, agricultural and aquaculture run-off of the area. Pearson correlation matrix (PCM) established relationships among elements. The PCM indicates that most of the metal's distributions have been controlled by the same factors such as Fe-oxy-hydroxides and clay minerals, and also they have a similar origin. The poor correlations of Ca with most of the elements in the sediment cores indicate that calcium carbonate has a less significant role in this mangrove sediment. Finally, the data from this research will be used as a benchmark for future research and help to quantify levels of metal pollutions, as well as to manage future ecological risks of the vulnerable mangrove ecosystem, the Sundarbans.

Keywords: contamination, core sediment, trace element, sundarbans, vulnerable

Procedia PDF Downloads 111
3955 Lean and Six Sigma in the Freight Railway Supplier Base in South Africa: Factors Leading to Their Application

Authors: Hilda Kundai Chikwanda, Lawrence Thabo Mokhadi

Abstract:

The study aimed to review the factors that lead the freight railway suppliers base in South Africa (SA) to apply the Lean and Six Sigma (L&SS) methodologies. A thorough review of the factors that lead organisations, in the different industries, to implement these methodologies was done. L&SS applications were found to be prominent in the automotive industry. In particular, the railway industry in SA and the region were reviewed in terms of challenges in capturing the freight logistics market and growing market share. Qualitative methods have been used to collect primary data and descriptive statistics was used to calculate, describe, and summarize collected research data. The results show that external factors have a greater influence on the implementation of L&SS. The study drew inferences between freight railway supplier base and the application of Lean and Six Sigma (L&SS) methodologies in the SA context. It identified challenges that leads the SA freight railway to lose market share to road freight users. It further observes and recommends that L&SS methodologies are the ideal strategy required to implement a turnaround in the trajectory of freight railways as a competitive freight transport solution.

Keywords: production, methodology, manufacturing, lean, six sigma

Procedia PDF Downloads 30
3954 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 106
3953 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 333
3952 Estimation of PM2.5 Emissions and Source Apportionment Using Receptor and Dispersion Models

Authors: Swetha Priya Darshini Thammadi, Sateesh Kumar Pisini, Sanjay Kumar Shukla

Abstract:

Source apportionment using Dispersion model depends primarily on the quality of Emission Inventory. In the present study, a CMB receptor model has been used to identify the sources of PM2.5, while the AERMOD dispersion model has been used to account for missing sources of PM2.5 in the Emission Inventory. A statistical approach has been developed to quantify the missing sources not considered in the Emission Inventory. The inventory of each grid was improved by adjusting emissions based on road lengths and deficit in measured and modelled concentrations. The results showed that in CMB analyses, fugitive sources - soil and road dust - contribute significantly to ambient PM2.5 pollution. As a result, AERMOD significantly underestimated the ambient air concentration at most locations. The revised Emission Inventory showed a significant improvement in AERMOD performance which is evident through statistical tests.

Keywords: CMB, GIS, AERMOD, PM₂.₅, fugitive, emission inventory

Procedia PDF Downloads 325
3951 A Generalized Framework for Adaptive Machine Learning Deployments in Algorithmic Trading

Authors: Robert Caulk

Abstract:

A generalized framework for adaptive machine learning deployments in algorithmic trading is introduced, tested, and released as open-source code. The presented software aims to test the hypothesis that recent data contains enough information to form a probabilistically favorable short-term price prediction. Further, the framework contains various adaptive machine learning techniques that are geared toward generating profit during strong trends and minimizing losses during trend changes. Results demonstrate that this adaptive machine learning approach is capable of capturing trends and generating profit. The presentation also discusses the importance of defining the parameter space associated with the dynamic training data-set and using the parameter space to identify and remove outliers from prediction data points. Meanwhile, the generalized architecture enables common users to exploit the powerful machinery while focusing on high-level feature engineering and model testing. The presentation also highlights common strengths and weaknesses associated with the presented technique and presents a broad range of well-tested starting points for feature set construction, target setting, and statistical methods for enforcing risk management and maintaining probabilistically favorable entry and exit points. The presentation also describes the end-to-end data processing tools associated with FreqAI, including automatic data fetching, data aggregation, feature engineering, safe and robust data pre-processing, outlier detection, custom machine learning and statistical tools, data post-processing, and adaptive training backtest emulation, and deployment of adaptive training in live environments. Finally, the generalized user interface is also discussed in the presentation. Feature engineering is simplified so that users can seed their feature sets with common indicator libraries (e.g. TA-lib, pandas-ta). The user also feeds data expansion parameters to fill out a large feature set for the model, which can contain as many as 10,000+ features. The presentation describes the various object-oriented programming techniques employed to make FreqAI agnostic to third-party libraries and external data sources. In other words, the back-end is constructed in such a way that users can leverage a broad range of common regression libraries (Catboost, LightGBM, Sklearn, etc) as well as common Neural Network libraries (TensorFlow, PyTorch) without worrying about the logistical complexities associated with data handling and API interactions. The presentation finishes by drawing conclusions about the most important parameters associated with a live deployment of the adaptive learning framework and provides the road map for future development in FreqAI.

Keywords: machine learning, market trend detection, open-source, adaptive learning, parameter space exploration

Procedia PDF Downloads 77
3950 Climate Change and Its Impacts: The Case of Coastal Fishing Communities of the Meghna River in South-Central Bangladesh

Authors: Md. Royhanur Islam, Thomas Cansse, Md. Sahidul Islam, Atiqur Rahman Sunny

Abstract:

The geographical location of Bangladesh makes it one of the most vulnerable countries to climate change. Climate-induced phenomena mainly affect the south-central region of Bangladesh (Laxmipur district) where they have begun to occur more frequently. The aim of the study was to identify the hydro-climatic factors that lead to weather-related disasters in the coastal areas and analyse the consequences of these factors on coastal livelihoods, with possible adaptation options using participatory rural appraisal (PRA) tools. The present study showed several disasters such as land erosion, depressions and cyclones, coastal flooding, storm surge, and precipitation. The frequency of these disasters is of a noticeable rate. Surveys have also discovered that land erosion is ongoing. Tidal water is being introduced directly into the mainland, and as a result of the salt intrusion, production capacity is declining. The coastal belt is an important area for fishing activities, but due to changed fishing times and a lack of Alternative Income Generating Activities (AIGAs), people have been forced to search for alternative livelihood options by taking both short-term and long-term adaptation options. Therefore, in order to increase awareness and minimize the losses, vulnerable communities must be fully incorporated into disaster response strategies. The government as well as national and international donor organizations should come forward and resolve the present situation of these vulnerable groups since otherwise, they will have to endure endless and miserable suffering due to the effects of climate change ahead in their lives.

Keywords: adaptation, community, fishery development, livelihood

Procedia PDF Downloads 112
3949 Impact of Task Technology Fit on User Effectiveness, Efficiency and Creativity in Iranian Pharmaceutical Oraganizations

Authors: Milad Keshvardoost, Amir Khanlari, Nader Khalesi

Abstract:

Background: Any firm in the pharmaceutical industry requires efficient and effective management information systems (MIS) to support managerial functions. Purpose: The aim of this study is to investigate the impact of Task-Technology Fit on user effectiveness, efficiency, and creativity in Iranian pharmaceutical companies. Methodology: 345 reliable and validate questionnaires were distributed among selected samples, through the cluster method, to Information system users of eight leading Iranian pharmaceutical companies, based on the likert scale. The proposed model of the article is based on a model with Task technology fit, on user performance with the definition of efficiency, effectiveness, and creativity through mediation effects of perceived usefulness and ease of use. Results: This study confirmed that TTF with definitions of adequacy and compatibility has positive impacts on user performance Conclusion: We concluded that pharmaceutical users of IS, utilizing a system with a precise and intense observation of users' demands, may make facilitation for them to design an exclusive IS framework.

Keywords: information systems, user performance, pharmaceuticals, task technology fit

Procedia PDF Downloads 158
3948 Spectrum Allocation in Cognitive Radio Using Monarch Butterfly Optimization

Authors: Avantika Vats, Kushal Thakur

Abstract:

This paper displays the point at issue, improvement, and utilization of a Monarch Butterfly Optimization (MBO) rather than a Genetic Algorithm (GA) in cognitive radio for the channel portion. This approach offers a satisfactory approach to get the accessible range of both the users, i.e., primary users (PUs) and secondary users (SUs). The proposed enhancement procedure depends on a nature-inspired metaheuristic algorithm. In MBO, all the monarch butterfly individuals are located in two distinct lands, viz. Southern Canada and the northern USA (land 1), and Mexico (Land 2). The positions of the monarch butterflies are modernizing in two ways. At first, the offsprings are generated (position updating) by the migration operator and can be adjusted by the migration ratio. It is trailed by tuning the positions for different butterflies by the methods for the butterfly adjusting operator. To keep the population unaltered and minimize fitness evaluations, the aggregate of the recently produced butterflies in these two ways stays equivalent to the first population. The outcomes obviously display the capacity of the MBO technique towards finding the upgraded work values on issues regarding the genetic algorithm.

Keywords: cognitive radio, channel allocation, monarch butterfly optimization, evolutionary, computation

Procedia PDF Downloads 49
3947 Barriers and Facilitators of Community Based Mental Health Intervention (CMHI) in Rural Bangladesh: Findings from a Descriptive Study

Authors: Rubina Jahan, Mohammad Zayeed Bin Alam, Sazzad Chowdhury, Sadia Chowdhury

Abstract:

Access to mental health services in Bangladesh is a tale of urban privilege and rural struggle. Mental health services in the country are primarily centered in urban medical hospitals, with only 260 psychiatrists for a population of more than 162 million, while rural populations face far more severe and daunting challenges. In alignment with the World Health Organization's perspective on mental health as a basic human right and a crucial component for personal, community, and socioeconomic development; SAJIDA Foundation a value driven non-government organization in Bangladesh has introduced a Community Based Mental Health (CMHI) program to fill critical gaps in mental health care, providing accessible and affordable community-based services to protect and promote mental health, offering support for those grappling with mental health conditions. The CMHI programme is being implemented in 3 districts in Bangladesh, 2 of them are remote and most climate vulnerable areas targeting total 6,797 individual. The intervention plan involves a screening of all participants using a 10-point vulnerability assessment tool to identify vulnerable individuals. The assumption underlying this is that individuals assessed as vulnerable is primarily due to biological, psychological, social and economic factors and they are at an increased risk of developing common mental health issues. Those identified as vulnerable with high risk and emergency conditions will receive Mental Health First Aid (MHFA) and undergo further screening with GHQ-12 to be identified as cases and non-cases. The identified cases are then referred to community lay counsellors with basic training and knowledge in providing 4-6 sessions on problem solving or behavior activation. In situations where no improvement occurs post lay counselling or for individuals with severe mental health conditions, a referral process will be initiated, directing individuals to ensure appropriate mental health care. In our presentation, it will present the findings from 6-month pilot implementation focusing on the community-based screening versus outcome of the lay counseling session and barriers and facilitators of implementing community based mental health care in a resource constraint country like Bangladesh.

Keywords: community-based mental health, lay counseling, rural bangladesh, treatment gap

Procedia PDF Downloads 22
3946 Reintegrating Forensic Mental Health Service Users into Communities in the Western Cape, South Africa

Authors: Zolani Metu

Abstract:

The death of more than 140 psychiatric patients who were unethically deinstitutionalized from the Life Esidimeni hospital Johannesburg, in 2016, shined a light on South Africa’s failing public mental healthcare system. Compounded by insufficient research evidence on African deinstitutionalization, this necessitates inquiries into deinstitutionalized mental healthcare, reintegration and community-based mental healthcare within the South African context. This study employed a quantitative research approach which utilized a cross-sectional research design, to investigate experiences with the reintegration of institutionalized forensic mental health service users into communities in the Western Cape, South Africa. A convenience sample of 100 mental health care workers from different occupational and organizational backgrounds in the Western Cape was purposively selected using the Western Cape Health Directorate as a sampling frame. A self-administered questionnaire (SAQ) was used as the data collection instrument. The results of the study indicate that criminogenic factors such as substance use, history of violent behaviour, criminal history and disruptive social behaviour complicate the reintegration of forensic mental health service users into communities. The current extent of reintegration of forensic mental health service users was found to be 'poor' (46%; n= 46); and financial difficulties, criminogenic factors and limited Community-Based Care (CBC) facilities were identified as key barriers to the reintegration process. 56% of all job applications for forensic mental health service users were unsuccessful, and 53% of all applications for their admission into CBC facilities were declined. Although social support (informal) was found to be essential for successful reintegration, institutional support (formal) through assertive community treatment (35%; n= 35) and CBC facilities (21%) and the disability grant (DG=50%) was found to be more important for family coping and reintegration. Moreover, 72% of respondents had positive perceptions about the process of reintegration; no statistically significant relationship was found between years of experience and perceptions about reintegration (P-value = 0.062); and perceptions were not found to be a barrier to reintegration. No statistically significant relationship was found between years of working experience and understanding the legislative framework of deinstitutionalization (P-Value =.0.061). However, using a Chi-square test, a significant relationship (P-value = 0.021) was found between sex and understanding the legal framework involved in the process of reintegration. The study recommends a post-2020 deinstitutionalization agenda that factors-in criminogenic realities associated with forensic mental health service users, and affirms the strengthening of PHC and community based care systems as precedents of successful deinstitutionalization and reintegration of mental health service users.

Keywords: forensic mental health, deinstitutionalization, reintegration, mental health service users

Procedia PDF Downloads 150
3945 A Conceptual Framework for Vulnerability Assessment of Climate Change Impact on Oil and Gas Critical Infrastructures in the Niger Delta

Authors: Justin A. Udie, Subhes C. Bhatthacharyya, Leticia Ozawa-Meida

Abstract:

The impact of climate change is severe in the Niger Delta and critical oil and gas infrastructures are vulnerable. This is partly due to lack of specific impact assessment framework to assess impact indices on both existing and new infrastructures. The purpose of this paper is to develop a framework for the assessment of climate change impact on critical oil and gas infrastructure in the region. Comparative and documentary methods as well as analysis of frameworks were used to develop a flexible, integrated and conceptual four dimensional framework underpinning; 1. Scoping – the theoretical identification of inherent climate burdens, review of exposure, adaptive capacities and delineation of critical infrastructure; 2. Vulnerability assessment – presents a systematic procedure for the assessment of infrastructure vulnerability. It provides real time re-scoping, practical need for data collection, analysis and review. Physical examination of systems is encouraged to complement the scoped data and ascertain the level of exposure to relevant climate risks in the area; 3. New infrastructure – consider infrastructures that are still at developmental level. It seeks to suggest the inclusion of flexible adaptive capacities in original design of infrastructures in line with climate threats and projections; 4. The Mainstreaming Climate Impact Assessment into government’s environmental decision making approach. Though this framework is designed specifically for the estimation of exposure, adaptive capacities and criticality of vulnerable oil and gas infrastructures in the Niger Delta to climate burdens; it is recommended for researchers and experts as a first-hand generic and practicable tool which can be used for the assessment of other infrastructures perceived as critical and vulnerable. The paper does not provide further tools that synch into the methodological approach but presents pointers upon which a pragmatic methodology can be developed.

Keywords: adaptation, assessment, conceptual, climate, change, framework, vulnerability

Procedia PDF Downloads 303
3944 Exploring Health-Related Inequalities between Private, Public and Active Transport Users, Using Relative Importance Index: Case Study on Santiago de Chile

Authors: Beatriz Mella Lira, Karla Yohannessen, Robin Hickman

Abstract:

The aim of the paper is recognising inequalities through the self-assessment of health-related factors, in the context of daily mobilities in Santiago de Chile. Human capabilities will be used as the theoretical basis for the recognition and assessment of these factors regarding the functioning (what people are currently able to do) and capabilities (what people want to achieve and what is valuable for them), reflecting differences across social groups and among types of transport users. The self-assessment of health-related factors considers perceptions of stress, physical effort, proximity to other transport users, pollution, safety, and comfort. The types of transport users are classified as: private (cars, taxis, colectivos, motos), public (buses and metro) and active (bicycles and walking). The methodology follows a capability-based questionnaire, which was applied in different areas of Santiago de Chile, considering concepts extracted from the human capabilities list. The self-assessment of these health-related factors examines the context of peoples’ mobilities for performing their daily activities, considering socioeconomic differences as income, age, gender, disabilities, residence location and primary mode choice. The paper uses Relative Importance Index (RII) for weighting the relative influence or valuation of the factors. The respondents were asked to rate the importance of each factor on a scale from 1 to 5, in an ascending order of importance. The results suggest that these health-related factors impact not just the perceptions of users, but their well-being and their propensity for achieving their capabilities and the things they value in life. The paper is focused on the development of an applicable approach, measuring factors that should be included in transport project appraisal, as a more comprehensive and complementary method.

Keywords: active transport, health, human capabilities, Santiago de Chile, transport inequalities, transportation planning, urban planning

Procedia PDF Downloads 178
3943 Study on Moisture-Induced-Damage of Semi-Rigid Base under Hydrodynamic Pressure

Authors: Baofeng Pan, Heng Liu

Abstract:

Because of the high strength and large carrying capacity, the semi-rigid base is widely used in modern road engineering. However, hydrodynamic pressure, which is one of the main factors to cause early damage of semi-rigid base, cannot be avoided in the nature environment when pavement is subjected to some loadings such as the passing vehicles. In order to investigating how moisture-induced-damage of semi-rigid base influenced by hydrodynamic pressure, a new and effective experimental research method is provided in this paper. The results show that: (a) The washing action of high hydrodynamic pressure is the direct cause of strength reducing of road semi-rigid base. (b) The damage of high hydrodynamic pressure mainly occurs at the beginning of the scoring test and with the increasing of testing time the influence reduces. (c) Under the same hydrodynamic pressure, the longer the specimen health age, the stronger ability to resist moisture induced damage.

Keywords: semi-rigid base, hydrodynamic pressure, moisture-induced-damage, experimental research

Procedia PDF Downloads 309
3942 The Application of Collision Damage Analysis in Reconstruction of Sedan-Scooter Accidents

Authors: Chun-Liang Wu, Kai-Ping Shaw, Cheng-Ping Yu, Wu-Chien Chien, Hsiao-Ting Chen, Shao-Huang Wu

Abstract:

Objective: This study analyzed three criminal judicial cases. We applied the damage analysis of the two vehicles to verify other evidence, such as dashboard camera records of each accident, reconstruct the scenes, and pursue the truth. Methods: Evidence analysis, the method is to collect evidence and the reason for the results in judicial procedures, then analyze the involved damage evidence to verify other evidence. The collision damage analysis method is to inspect the damage to the vehicles and utilize the principles of tool mark analysis, Newtonian physics, and vehicle structure to understand the relevant factors when the vehicles collide. Results: Case 1: Sedan A turned right at the T junction and collided with Scooter B, which was going straight on the left road. The dashboard camera records showed that the left side of Sedan A’s front bumper collided with the body of Scooter B and rider B. After the analysis of the study, the truth was that the front of the left side of Sedan A impacted the right pedal of Scooter B and the right lower limb of rider B. Case 2: Sedan C collided with Scooter D on the left road at the crossroads. The dashboard camera record showed that the left side of the Sedan C’s front bumper collided with the body of Scooter D and rider D. After the analysis of the study, the truth was that the left side of the Sedan C impacted the left side of the car body and the front wheel of Scooter D and rider D. Case 3: Sedan E collided with Scooter F on the right road at the crossroads. The dashboard camera record showed that the right side of the Sedan E’s front bumper collided with the body of Scooter F and rider F. After the analysis of the study, the truth was that the right side of the front bumper and the right side of the Sedan F impacted the Scooter. Conclusion: The application of collision damage analysis in the reconstruction of a sedan-scooter collision could discover the truth and provide the basis for judicial justice. The cases and methods could be the reference for the road safety policy.

Keywords: evidence analysis, collision damage analysis, accident reconstruction, sedan-scooter collision, dashboard camera records

Procedia PDF Downloads 66