Search results for: police traffic
559 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 127558 Double Layer Security Model for Identification Friend or Foe
Authors: Buse T. Aydın, Enver Ozdemir
Abstract:
In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 161557 Inter-Generational Benefits of Improving Access to Justice for Women: Evidence from Peru
Authors: Iva Trako, Maris Micaela Sviatschi, Guadalupe Kavanaugh
Abstract:
Domestic violence is a major concern in developing countries, with important social, economic and health consequences. However, institutions do not usually address the problems facing women or ethnic and religious minorities. For example, the police do very little to stop domestic violence in rural areas of developing countries. This paper exploits the introduction of women’s justice centers (WJCs) in Peru to provide causal estimates on the effects of improving access to justice for women and children. These centers offer a new integrated public service model for women by including medical, psychological and legal support in cases of violence against women. Our empirical approach uses a difference in difference estimation exploiting variation over time and space in the opening of WJC together with province-by-year fixed effects. Exploiting administrative data from health providers and district attorney offices, we find that after the opening of these centers, there are important improvements on women's welfare: a large reduction in femicides and female hospitalizations for assault. Moreover, using geo-coded household surveys we find evidence that the existence of these services reduces domestic violence, improves women's health, increases women's threat points and, therefore, lead to household decisions that are more aligned with their interests. Using administrative data on the universe of schools, we find large gains on human capital for their children: affected children are more likely to enroll, attend school and have better grades in national exams, instead of working for the family. In sum, the evidence in this paper shows that providing access to justice for women can be a powerful tool to reduce domestic violence and increase education of children, suggesting a positive inter-generational benefit.Keywords: access to justice, domestic violence, education, household bargaining
Procedia PDF Downloads 186556 Strengthening of Bridges by Additional Prestressing
Authors: A. Bouhaloufa, T. Kadri, S. Zouaoui, A. Belhacene
Abstract:
To put more durable bridges, it is important to maintain existing structures, rather than investing in new structures. Instead of demolishing the old bridge and replace them with new, we must preserve and upgrade using better methods of diagnosis, auscultation and repair, the interest of this work is to increase the bearing capacity bridges damaged by additional prestressing, this type of reinforcement is growing continuously. In addition to excellent static strength, prestressing also has a very high resistance to fatigue, so it is suitable to solve the problem of failure of the bearing capacity of the bridges. This failure often comes to the development of overloads in quantity and quality, that is our daily traffic has increased and become very complicated, on the other hand its constituents are advanced in weight and speed and therefore almost all old bridges became unable to support the movement of the latter and remain disabled to all these problems. The main purpose of this work includes the following three aspects: - Determination of the main diseases and factors affecting the deterioration of bridges in Algeria, - Evaluation of the bearing capacity of bridges, - Proposal technical reinforcement to improve the bearing capacity of a degraded structure.Keywords: bridges, repair, auscultation, diagnosis, pathology, additional prestressing
Procedia PDF Downloads 614555 An Exploratory Factor and Cluster Analysis of the Willingness to Pay for Last Mile Delivery
Authors: Maximilian Engelhardt, Stephan Seeck
Abstract:
The COVID-19 pandemic is accelerating the already growing field of e-commerce. The resulting urban freight transport volume leads to traffic and negative environmental impact. Furthermore, the service level of parcel logistics service provider is lacking far behind the expectations of consumer. These challenges can be solved by radically reorganize the urban last mile distribution structure: parcels could be consolidated in a micro hub within the inner city and delivered within time windows by cargo bike. This approach leads to a significant improvement of consumer satisfaction with their overall delivery experience. However, this approach also leads to significantly increased costs per parcel. While there is a relevant share of online shoppers that are willing to pay for such a delivery service there are no deeper insights about this target group available in the literature. Being aware of the importance of knowing target groups for businesses, the aim of this paper is to elaborate the most important factors that determine the willingness to pay for sustainable and service-oriented parcel delivery (factor analysis) and to derive customer segments (cluster analysis). In order to answer those questions, a data set is analyzed using quantitative methods of multivariate statistics. The data set was generated via an online survey in September and October 2020 within the five largest cities in Germany (n = 1.071). The data set contains socio-demographic, living-related and value-related variables, e.g. age, income, city, living situation and willingness to pay. In a prior work of the author, the data was analyzed applying descriptive and inference statistical methods that only provided limited insights regarding the above-mentioned research questions. The analysis in an exploratory way using factor and cluster analysis promise deeper insights of relevant influencing factors and segments for user behavior of the mentioned parcel delivery concept. The analysis model is built and implemented with help of the statistical software language R. The data analysis is currently performed and will be completed in December 2021. It is expected that the results will show the most relevant factors that are determining user behavior of sustainable and service-oriented parcel deliveries (e.g. age, current service experience, willingness to pay) and give deeper insights in characteristics that describe the segments that are more or less willing to pay for a better parcel delivery service. Based on the expected results, relevant implications and conclusions can be derived for startups that are about to change the way parcels are delivered: more customer-orientated by time window-delivery and parcel consolidation, more environmental-friendly by cargo bike. The results will give detailed insights regarding their target groups of parcel recipients. Further research can be conducted by exploring alternative revenue models (beyond the parcel recipient) that could compensate the additional costs, e.g. online-shops that increase their service-level or municipalities that reduce traffic on their streets.Keywords: customer segmentation, e-commerce, last mile delivery, parcel service, urban logistics, willingness-to-pay
Procedia PDF Downloads 108554 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 15553 Is Class Struggle Still Useful for the Street Children Who Are Working and Committing Crimes in the Urban City of Bangladesh?
Authors: Shidratul Moontaha Suha
Abstract:
Violence is organized and utilized differently in various communities across the globe. The capacity to employ violence in numerous societies is largely limited to the apparatus of the state, like law enforcement officers, and in a small share of contexts, it is controlled within the state institutions as per the rule of law. Contrastingly, in many other societies, a broad array of players, mainly organized criminal gangs, are using violence on a substantial scale to agitate against social ills or attain personal interests. The present paper examined the role of social injustice in driving children living off and on the streets of Dhaka, Bangladesh, into joining organized criminal gangs and committing crimes. The study entailed a comprehensive review of existing literature with theoretical analyses based on three theories: the Marxist’s theory of capitalism and class struggle, the Weberian model of social stratification theory, and the social disorganization theory. The analysis revealed that, in Dhaka, Bangladesh, criminal gangs emerged from social disorganization of communities characterized by absolute poverty, residential mobility, and population heterogeneity, which promote deviance among the youth, and subsequently, led to the rise of organized gangs and delinquency. Although the latter was formed as a response to class struggle, they have been employed by the state and police as the tools of exploitation and oppression to rule the working class. The criminal gangs exploit the vulnerability of street children by using them as sources of cheap labor to peddle drugs, extort, or kill specific individuals who are against their ideals. In retrospect, the street children receive individual, group, and social protection. Therefore, social class struggle plays a central role in the proliferation of organized criminal gangs and the engagement of street children in criminal activities in Dhaka, Bangladesh.Keywords: cheap labor, organized crimes, poverty, social stratification, social children
Procedia PDF Downloads 149552 Long Short-Time Memory Neural Networks for Human Driving Behavior Modelling
Authors: Lu Zhao, Nadir Farhi, Yeltsin Valero, Zoi Christoforou, Nadia Haddadou
Abstract:
In this paper, a long short-term memory (LSTM) neural network model is proposed to replicate simultaneously car-following and lane-changing behaviors in road networks. By combining two kinds of LSTM layers and three input designs of the neural network, six variants of the LSTM model have been created. These models were trained and tested on the NGSIM 101 dataset, and the results were evaluated in terms of longitudinal speed and lateral position, respectively. Then, we compared the LSTM model with a classical car-following model (the intelligent driving model (IDM)) in the part of speed decision. In addition, the LSTM model is compared with a model using classical neural networks. After the comparison, the LSTM model demonstrates higher accuracy than the physical model IDM in terms of car-following behavior and displays better performance with regard to both car-following and lane-changing behavior compared to the classical neural network model.Keywords: traffic modeling, neural networks, LSTM, car-following, lane-change
Procedia PDF Downloads 263551 The Effect of Gas Pollutants on Museum Environment: Case Study of an Oil Paintings in Ethnographic Museum, Egypt
Authors: Hagar Ezzat, Mostafa Attia, Ahmed Bedeir, Abdelrazek Elnagger, Matija Strlic
Abstract:
Ethnographic Museum in Cairo- Egypt is a place of valuable collections (manuscripts, paintings, textiles and other ethnographic materials), the museum experiences serious neglecting with unacceptable display and storage conditions, the museum is located in Tahrir sq., which consider a high traffic area where pollution levels exceed the acceptable levels in museums. The materials used in manufacturing the display cases are expected to be source of many pollutants which affecting the sensitive oil paintings objects in the galleries. 24 diffusion tubes (12 No2, So2 & 12 O3) have been used in "winter 2014 and spring 2014" for monitoring museum environment with three cases "outdoor & indoor and in the gallery display". A series of analytical techniques with scientific tools: Ion Chromatography have been used to assess measurements and effects of gas pollutants on the museum which help us to make good assessment for the damage of oil paintings objects and the condition of the museum and understand the effect of the museum environment on the deterioration of the sensitive oil paintings.Keywords: environment, museum, paintings, ethnographic, conservation
Procedia PDF Downloads 242550 A Brief Review of Urban Green Vegetation (Green Wall) in Reduction of Air Pollution
Authors: Masoumeh Pirhadi
Abstract:
Air pollution is becoming a major health problem affecting millions. In support of this observation, the world health organization estimates that many people feel unhealthy due to pollution. This is a coupled fact that one of the main global sources of air pollution in cities is greenhouse gas emissions due heavy traffic. Green walls are developed as a sustainable strategy to reduce pollution by increasing vegetation in developed areas without occupying space in the city. This concept an offer advantageous environmental benefits and they can also be proposed for aesthetic purposes, and today they are used to preserve the urban environment. Green walls can also create environments that can promote a healthy lifestyle. Findings of multiple studies also indicate that Green infrastructure in cities is a strategy for improving air quality and increasing the sustainability of cities. Since these green solutions (green walls) act as porous materials that affect the diffusion of air pollution they can also act as a removing air vents that clean the air. Therefore, implementation of this strategy can be considered as a prominent factor in achieving a cleaner environment.Keywords: green vegetation, air pollution, green wall, urban area
Procedia PDF Downloads 155549 Accident analysis in Small and Medium Enterprises (SMEs) in India
Authors: Pranab Kumar Goswami, Elena Gurung
Abstract:
Small and medium enterprises (SME) are considered as the driving force for the economic growth of a developing country like India. Most of the SMEs are located in residential/non-industrial areas to avoid legal obligations of occupational safety and health (OSH) provisions. This study was conducted in Delhiwith a view to analyze the accidents that occurredduringthe year 2019 & 2020. The objective of the study was to find out the accident prone SMEs in Delhi and major causes of such accidents. Methods: Survey and comprehensive data analysis methods, followed by applying simple statistical techniques, were used for this study. The accident reports for the study period collected from the labour department and police stations were analyzed for the study. The injured workers were interviewed to ascertain safety compliances, training and awareness programs, etc. The study was completed in March2021. Results: It was found that most of the accidents took place in SMEs located in residential/non- industrial areas in Delhi. The accident-prone machines were found to be power presses (42%) and injection moulding machines (37%). Predominantly unsafe machinery or unsafe working conditions and lack of training of worker were observed to be the major causes of accidents in such industries. Conclusions: It was concluded from the study that unsafe machinery/equipment and lack of proper training to the workers were two main reasons for increase in accidents.It was also concluded that the industries located in industrial areas were better placed in terms of workplace compliances. The managements who were running their operations from residential/non-industrial areaswere found to be less aware on health and safety issues. Lack of enforcement by government agencies in such areas has escalated this problem. Adequate training to workers, managing safe & healthy workplace, and sustained enforcement can reduce accidents in such industries.Keywords: SME, accident prevention, cause of accident, unorganised
Procedia PDF Downloads 102548 Remote Sensing Application on Snow Products and Analyzing Disaster-Forming Environments Xinjiang, China
Authors: Gulijianati Abake, Ryutaro Tateishi
Abstract:
Snow is one kind of special underlying surface, has high reflectivity, low thermal conductivity, and snow broth hydrological effect. Every year, frequent snow disaster in Xinjiang causing considerable economic loss and serious damage to towns and farms, such as livestock casualties, traffic jams and other disaster, therefore monitoring SWE (snow volume) in Xinjiang has a great significance. The problems of how this disaster distributes and what disaster-forming environments are important to its occurrence are the most pressing problems in disaster risk assessment and salvage material arrangement. The present study aims 1) to monitor accurate SWE using MODIS, AMSRE, and CMC data, 2) to establish the regularity of snow disaster outbreaks and the important disaster-forming environmental factors. And a spatial autocorrelation analysis method and a canonical correlation analysis method are used to answer these two questions separately, 3) to prepare the way to salvage material arrangements for snow disasters.Keywords: snow water equivalent (snow volume), AMSR-E, CMC snow depth, snow disaster
Procedia PDF Downloads 370547 Assessment of Pollution of the Rustavi City’s Atmosphere with Microaerosols
Authors: Natia Gigauri, Aleksandre Surmava
Abstract:
According to observational data, experimental measurements, and numerical modeling, is assessed pollution of one of the industrial centers of Georgia, Rustavi city’s atmosphere with microaerosols. Monthly, daily and hourly changes of the concentrations of PM2.5 and PM10 in the city atmosphere are analyzed. It is accepted that PM2.5 concentrations are always lower than PM10 concentrations, but their change curve is the same. In addition, it has been noted that the maximum concentrations of particles in the atmosphere of Rustavi city will be reached at any part of the day, which is determined by the total impact of the traffic flow and industrial facilities. By numerical modeling has calculated the influence of background western light air and gentle and fresh breeze on the distribution of PM particles in the atmosphere. Calculations showed that background light air and gentle breeze lead to an increase the concentrations of microaerosols in the city's atmosphere, while fresh breeze contribute to the dispersion of dusty clouds. As a result, the level of dust in the city is decreasing, but the distribution area is expanding.Keywords: pollution, modelling, PM2.5, PM10, experimental measurement
Procedia PDF Downloads 89546 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 360545 Simulation of Communication and Sensing Device in Automobiles Using VHDL
Authors: Anirudh Bhaikhel
Abstract:
The exclusive objective of this paper is to develop a device which can pass on the interpreted result of the sensed information to the interfaced communicable devices to avoid or minimise accidents. This device may also be used in case of emergencies like kidnapping, robberies, medical emergencies etc. The present era has seen a rapid metamorphosis in the automobile industry with increasing use of technology and speed. The increase in purchasing power of customers and price war of automobile companies has made an easy access to the automobile users. The use of automobiles has increased tremendously in last 4-5 years thus causing traffic congestions and thus making vehicles more prone to accidents. This device can be an effective measure to counteract cases of abduction. Risks of accidents can be decreased tremendously through the notifications received by these alerts. It will help to detect the upcoming emergencies. This paper includes the simulation of the communication and sensing device required in automobiles using VHDL.Keywords: automobiles, communication, component, cyclic redundancy check (CRC), modulo-2 arithmetic, parity bits, receiver, sensors, transmitter, turns, VHDL (VHSIC hardware descriptive language)
Procedia PDF Downloads 270544 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)
Authors: Muazzam A. Khan, Muhammad Wasim
Abstract:
Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict
Procedia PDF Downloads 535543 Exploring the Impact of Cultural Values on the Performance of Women Bureaucrats in Pakistan
Authors: Fariya Tahreen
Abstract:
Women are an important part of the society comprising more than 50% population of the world. Participation of women in public services is increasing in the present era while cultural values embedded with gender differences still influencing the performance of working women. Many researches have been carried out on cultural impact on working women like managers, doctors, and lawyers and other public servants. But very rare efforts were made to study the impact of cultural values on the performance of women bureaucrats. The present study aimed to find out the relationship of cultural values (i.e., collective identity, gender segregation, and gender asymmetrical relations) with the performance of women bureaucrats. Sample of the present study comprised of 130 women bureaucrats from the Office Management Group, Inland Revenue, District Management Group, and Pakistan Police Services which is selected by convenient sampling technique. The locale of the study was Islamabad, Rawalpindi and Lahore city. The current research study was conducted by using a quantitative approach in research method and data were collected through survey method. The measures used in the study included: personal information, three main cultural values, and performance of women bureaucrats. Uni-variate and bi-variate analyses were implied by using correlation and multiple linear regression test. The current study shows a negative significant relationship between cultural values and performance of women bureaucrats (R²= 0.790, p-value 0.000). It shows that cultural values (collective identity, gender segregation and gender asymmetrical relations) significantly influence the performance of women bureaucrats. Due to the influence and pressure of these cultural values, women bureaucrats give less time to the office and avail more leaves. They also avoid contacting with male colleagues, public dealings, field visits and playing leadership role. Further, they attend fewer meetings of policy formulation due to given less importance for it. In a nutshell, the study concluded that cultural values significantly influence the performance of women bureaucrats in Pakistan.Keywords: cultural values, performance, Pakistan, women bureaucrats
Procedia PDF Downloads 127542 High-Intensity, Short-Duration Electric Pulses Induced Action Potential in Animal Nerves
Authors: Jiahui Song, Ravindra P. Joshi
Abstract:
The use of high-intensity, short-duration electric pulses is a promising development with many biomedical applications. The uses include irreversible electroporation for killing abnormal cells, reversible poration for drug and gene delivery, neuromuscular manipulation, and the shrinkage of tumors, etc. High intensity, short-duration electric pulses result in the creation of high-density, nanometer-sized pores in the cellular membrane. This electroporation amounts to localized modulation of the transverse membrane conductance, and effectively provides a voltage shunt. The electrically controlled changes in the trans-membrane conductivity could be used to affect neural traffic and action potential propagation. A rat was taken as the representative example in this research. The simulation study shows the pathway from the sensorimotor cortex down to the spinal motoneurons, and effector muscles could be reversibly blocked by using high-intensity, short-duration electrical pulses. Also, actual experimental observations were compared against simulation predictions.Keywords: action potential, electroporation, high-intensity, short-duration
Procedia PDF Downloads 269541 Integrated Planning, Designing, Development and Management of Eco-Friendly Human Settlements for Sustainable Development of Environment, Economic, Peace and Society of All Economies
Authors: Indra Bahadur Chand
Abstract:
This paper will focus on the need for development and application of global protocols and policy in planning, designing, development, and management of systems of eco-towns and eco-villages so that sustainable development will be assured from the perspective of environmental, economical, peace, and harmonized social dynamics. This perspective is essential for the development of civilized and eco-friendly human settlements in the town and rural areas of the nation that will be a milestone for developing a happy and sustainable lifestyle of rural and urban communities of the nation. The urban population of most of the town of developing economies has been tremendously increasing, whereas rural people have been tremendously migrating for the past three decades. Consequently, the urban lifestyle in most towns has stressed in terms of environmental pollution, water crisis, congested traffic, energy crisis, food crisis, and unemployment. Eco-towns and villages should be developed where lifestyle of all residents is sustainable and happy. Built up environment of settlement should reduce and minimize the problems of non ecological CO2 emissions, unbalanced utilization of natural resources, environmental degradation, natural calamities, ecological imbalance, energy crisis, water scarcity, waste management, food crisis, unemployment, deterioration of cultural heritage, social, the ratio among the public and private land ownership, ratio of land covered with vegetation and area of settlement, the ratio of people in the vehicles and foot, the ratio of people employed outside of town and village, ratio of resources recycling of waste materials, water consumption level, the ratio of people and vehicles, ratio of the length of the road network and area of town/villages, a ratio of renewable energy consumption with total energy, a ratio of religious/recreational area out of the total built-up area, the ratio of annual suicide case out of total people, a ratio of annual injured and death out of total people from a traffic accident, a ratio of production of agro foods within town out of total food consumption will be used to assist in designing and monitoring of each eco-towns and villages. An eco-town and villages should be planned and developed to offer sustainable infrastructure and utilities that maintain CO2 level in individual homes and settlements, home energy use, transport, food and consumer goods, water supply, waste management, conservation of historical heritages, healthy neighborhood, conservation of natural landscape, conserving bio-diversity and developing green infrastructures. Eco-towns and villages should be developed on the basis of master planning and architecture that affect and define the settlement and its form. Master planning and engineering should focus in delivering the sustainability criteria of eco towns and eco village. This will involve working with specific landscape and natural resources of locality.Keywords: eco-town, ecological habitation, master plan, sustainable development
Procedia PDF Downloads 180540 Effect of Rubber Tyre and Plastic Wastes Use in Asphalt Concrete Pavement
Authors: F. Onyango, Salim R. Wanjala, M. Ndege, L. Masu
Abstract:
Asphalt concrete pavements have a short life cycle, failing mainly due to temperature changes, traffic loading and ageing. Modified asphalt mixtures provide the technology to produce a bituminous binder with improved viscoelastic properties which remain in balance over a wider temperature range and loading conditions. In this research, 60/70 penetration grade asphalt binder was modified by adding 2, 4, 6, 8, and 10 percent by weight of asphalt binder following the wet process and the mineral aggregate was modified by adding 1, 2, 3, 4, and 5 percent crumb rubber by volume of the mineral aggregate following the dry process. The LDPE modified asphalt binder Rheological properties were evaluated. The laboratory results showed an increase in viscosity, softening point and stiffness of the binder. The modified asphalt was then used in preparing asphalt mixtures by Marshall Mix design procedure. The Marshall stability values for mixes containing 2% crumb rubber and 4% LDPE were found to be 30% higher than the conventional asphalt concrete mix.Keywords: crumb rubber, dry process, hot mix asphalt, wet process
Procedia PDF Downloads 368539 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
Authors: Jinghui Peng, Shanyu Tang, Jia Li
Abstract:
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.Keywords: steganalysis, security, Fast Fourier Transform, streaming media
Procedia PDF Downloads 148538 Afghan Women’s Perceptions on Domestic Violence and Child Protection in Finland
Authors: Laleh Golamrej Eliasi
Abstract:
Finland is the second most violent country for women in the European Union (EU). 47% of women in Finland claimed to have experienced domestic violence against women (DVAW), compared to an average of 33% in the EU. Although the statistics in Finland are transparent, to the author’s best knowledge, there are no statisticsonDV by nationality in Finland. On the other hand, being a Muslim woman in a non-Muslim-majority country represents a position of double vulnerability to violence. There are 10404 Afghan refugees in Finland who are Muslim. Barriers such as unfamiliarity with support services, fear of the police, racism, language, economic and practical dependence, social isolation, and family commitments all lead to a lack of reporting of DVAW among migrants. Although witnessing and experiencing DV have devastating effects on women’s and children’s health and well-being, there is a lack of studies about DVAW among Afghan families in Finland. To fill this knowledge gap, Afghan women living in Finland are selected as the target group to assess their views on DVAW and child protection. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAW in Afghan families. Interviews with Afghan women and content analysis are used to find out participants' views on DVAW, its risk factors, and approaches and methods to improve protection for women and children. Main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase child protection. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of immigrant families. The expected results will contribute to sustainable gender equality, which is in line with the fifth goal of the Sustainable Development Goals.Keywords: domestic violence, immigrant women, immigrant child protection, social work
Procedia PDF Downloads 85537 Bridge Construction and Type of Bridges and Their Construction Methods
Authors: Mokhtar Nikgoo
Abstract:
Definition of bridge: A bridge is a structure that allows people to pass through the communication road with two points. There are many different types of bridges, each of which is designed to perform a specific function. This article introduces the concept, history, components, uses, types, construction methods, selected factors, damage factors and principles of bridge maintenance. A bridge is a structure to cross a passage such as a water, valley or road without blocking another path underneath. This structure makes it possible to pass obstacles that are difficult or impossible to pass. There are different designs for bridge construction, each of which is used for a particular function and condition. In the old definition, a bridge is an arch over a river, valley, or any type of passage that makes traffic possible. But today, in the topic of urban management, the bridge is considered as a structure to cross physical barriers, so that while using space (not just the surface of the earth), it can facilitate the passage and access to places. The useful life of bridges may be between 30 and 80 years depending on the location and the materials used. But with proper maintenance and improvement, their life may last for hundreds of years.Keywords: bridge, road construction, surveying, transportation
Procedia PDF Downloads 512536 Vehicle Type Classification with Geometric and Appearance Attributes
Authors: Ghada S. Moussa
Abstract:
With the increase in population along with economic prosperity, an enormous increase in the number and types of vehicles on the roads occurred. This fact brings a growing need for efficiently yet effectively classifying vehicles into their corresponding categories, which play a crucial role in many areas of infrastructure planning and traffic management. This paper presents two vehicle-type classification approaches; 1) geometric-based and 2) appearance-based. The two classification approaches are used for two tasks: multi-class and intra-class vehicle classifications. For the evaluation purpose of the proposed classification approaches’ performance and the identification of the most effective yet efficient one, 10-fold cross-validation technique is used with a large dataset. The proposed approaches are distinguishable from previous research on vehicle classification in which: i) they consider both geometric and appearance attributes of vehicles, and ii) they perform remarkably well in both multi-class and intra-class vehicle classification. Experimental results exhibit promising potentials implementations of the proposed vehicle classification approaches into real-world applications.Keywords: appearance attributes, geometric attributes, support vector machine, vehicle classification
Procedia PDF Downloads 338535 Design and Implementation of Power Generation Mechanism Using Speed Breaker
Authors: Roman Kalvin, Anam Nadeem, Saba Arif, Juntakan Taweekun
Abstract:
In the current scenario demand of power is increasing day by day with increasing population. It is needed to sort out this problem with a technique which will not only overcome this energy crisis but also should be environment friendly. This project emphasizes on idea which shows that power could be generated by specially designed speed breaker. This project shows clearly how power can be generated by using Cam Mechanism where basically linear motion is converted into rotatory motion that can be used to generate electricity. When vehicle passes over the speed breaker, presses the cam with the help of connecting rod which rotate main shaft attached with large pulley. A flywheel is coupled with the shaft whose purpose is to normalize the oscillation in the energy and to make the energy unvarying. So, the shafts will spin with firm rpm. These shafts are coupled from end to end with a belt drive. The results show that power generated from this mechanism is 12 watts. The generated electricity does not required any fuel consumption it only generates power which can be used for the street light as well as for the traffic signals.Keywords: revolution per minute, RPM, cam, speed breaker, rotatory motion
Procedia PDF Downloads 213534 UPPAAL-based Design and Analysis of Intelligent Parking System
Authors: Abobaker Mohammed Qasem Farhan, Olof M. A. Saif
Abstract:
The demand for parking spaces in urban areas, particularly in developing countries, has led to a significant issue in the absence of sufficient parking spaces in crowded areas, which results in daily traffic congestion as drivers search for parking. This not only affects the appearance of the city but also has indirect impacts on the economy, society, and environment. In response to these challenges, researchers from various countries have sought technical and intelligent solutions to mitigate the problem through the development of smart parking systems. This paper aims to analyze and design three models of parking lots, with a focus on parking time and security. The study used computer software and Uppaal tools to simulate the models and determine the best among them. The results and suggestions provided in the paper aim to reduce the parking problems and improve the overall efficiency and safety of the parking process. The conclusion of the study highlights the importance of utilizing advanced technology to address the pressing issue of insufficient parking spaces in urban areas.Keywords: preliminaries, system requirements, timed Au- tomata, Uppaal
Procedia PDF Downloads 149533 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 109532 Relay Mining: Verifiable Multi-Tenant Distributed Rate Limiting
Authors: Daniel Olshansky, Ramiro Rodrıguez Colmeiro
Abstract:
Relay Mining presents a scalable solution employing probabilistic mechanisms and crypto-economic incentives to estimate RPC volume usage, facilitating decentralized multitenant rate limiting. Network traffic from individual applications can be concurrently serviced by multiple RPC service providers, with costs, rewards, and rate limiting governed by a native cryptocurrency on a distributed ledger. Building upon established research in token bucket algorithms and distributed rate-limiting penalty models, our approach harnesses a feedback loop control mechanism to adjust the difficulty of mining relay rewards, dynamically scaling with network usage growth. By leveraging crypto-economic incentives, we reduce coordination overhead costs and introduce a mechanism for providing RPC services that are both geopolitically and geographically distributed.Keywords: remote procedure call, crypto-economic, commit-reveal, decentralization, scalability, blockchain, rate limiting, token bucket
Procedia PDF Downloads 55531 From Service Delivery Strikes to Anti-Immigrant March: A Paradigm Shift in the Post-Colonial Discourse of Politics of Belonging in the Twenty-First Century South Africa
Authors: Israel Ekanade, Richard Molapo, Patrick Dzimiri, Isaac Ndlovu
Abstract:
This study aims to unravel the myth behind animosity towards foreign nationals in South Africa. Systemic violence against foreign African nationals since 2008 to date necessitates critical research with regards to migration issues connected to social upheavals. Extensive research ubiquitously tagged black-on-black violence as xenophobia or Afrophobia. In all, escalation of violence indicates a connotation of belonging. With unemployment rates approaching a crescendo, other vices have also soared in the same regard. As a result, this present generation seems cynical as the South African state has not fulfilled her obligations towards the indigent population; a situation pitching locals against foreigners. Locals have repeatedly blamed African foreign nationals for the economic downturn, using service delivery strikes to express their grievances. These strikes have continued unabatedly over the years but February 2017 marked a turning point in ‘insider-outsider’ relations as the strike was now turned to an anti-immigrant march resulting into widespread violence as the police failed to restore normalcy at some point. Over time, migration has been a harbinger of violence against the foreign black population in South Africa. Our paper encourages the state and civil society to invent new peace-building mechanisms to reduce xenophobic orchestrated violence. Our paper also contends that since the political class has hijacked the situation by using the youths for political propaganda during crises periods, a re-education of the political class and a culture of tolerance is inevitable for peace and harmony between locals and foreigners in post-apartheid South Africa.Keywords: anti-immigrant march, politics of belonging, service delivery strikes, South Africa
Procedia PDF Downloads 309530 Study of the Behavior of Geogrid Mechanically Stabilized Earth Walls Under Cyclic Loading
Authors: Yongzhe Zhao, Ying Liu, Zhiyong Liu, Hui You
Abstract:
The soil behind retaining wall is normally subjected to cyclic loading, for example traffic loading. Geotextile has been widely used to reinforce the soil for the purpose of reducing the settlement of the soil. A series of physical model tests were performed to investigate the settlement of footing under cyclic loading. The settlement of the footing, ground deformation and the vertical earth pressure in subsoil were presented and discussed under different types of geotextiles. The results indicate that including geotextiles significantly decreases the footing settlement and the stiffer the geotextile, the less the settlement. Under cyclic loading, the soil below the footing shows dilation within certain depths and beyond that it experiences contraction. The location of footing relative to the retaining wall has important effects on the deformation behavior of the soil in the ground, and the closer the footing to the retaining wall, the greater the contraction soil shows. This is because the retaining wall experienced greater lateral displacement.Keywords: physical model tests, reinforced retaining wall, cyclic loading, footing
Procedia PDF Downloads 155