Search results for: traffic surveillance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1602

Search results for: traffic surveillance

672 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 98
671 Hybrid Approach for Face Recognition Combining Gabor Wavelet and Linear Discriminant Analysis

Authors: A: Annis Fathima, V. Vaidehi, S. Ajitha

Abstract:

Face recognition system finds many applications in surveillance and human computer interaction systems. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In this paper, a hybrid approach for face recognition combining Gabor Wavelet and Linear Discriminant Analysis (HGWLDA) is proposed. The normalized input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. LDA, a subspace analysis techniques are used to reduce the intra-class space and maximize the inter-class space. The techniques used are 2-dimensional Linear Discriminant Analysis (2D-LDA), 2-dimensional bidirectional LDA ((2D)2LDA), Weighted 2-dimensional bidirectional Linear Discriminant Analysis (Wt (2D)2 LDA). LDA reduces the feature dimension by extracting the features with greater variance. k-Nearest Neighbour (k-NN) classifier is used to classify and recognize the test image by comparing its feature with each of the training set features. The HGWLDA approach is robust against illumination conditions as the Gabor features are illumination invariant. This approach also aims at a better recognition rate using less number of features for varying expressions. The performance of the proposed HGWLDA approaches is evaluated using AT&T database, MIT-India face database and faces94 database. It is found that the proposed HGWLDA approach provides better results than the existing Gabor approach.

Keywords: face recognition, Gabor wavelet, LDA, k-NN classifier

Procedia PDF Downloads 467
670 Transit Network Design Problem Issues and Challenges

Authors: Mahmoud Owais

Abstract:

Public Transit (P.T) is very important means to reduce traffic congestion, to improve urban environmental conditions and consequently affects people social lives. Planning, designing and management of P.T are the key issues for offering a competitive mode that can compete with the private transportation. These transportation planning, designing and management issues are addressed in the Transit Network Design Problem (TNDP). It deals with a complete hierarchy of decision making process. It includes strategic, tactical and operational decisions. The main body of TNDP is two stages, namely; route design stage and frequency setting. The TNDP is extensively studied in the last five decades; however the research gate is still widely open due to its many practical and modeling challenges. In this paper, a comprehensive background is given to illustrate the issues and challenges related to the TNDP to help in directing the incoming researches towards the untouched areas of the problem.

Keywords: frequency setting, network design, transit planning, urban planning

Procedia PDF Downloads 386
669 Performance Evaluation of Al Jame’s Roundabout Using SIDRA

Authors: D. Muley, H. S. Al-Mandhari

Abstract:

This paper evaluates the performance of a multi-lane four-legged modern roundabout operating in Muscat using SIDRA model. The performance measures include Degree of Saturation (DOS), average delay, and queue lengths. The geometric and traffic data were used for model preparation. Gap acceptance parameters, critical gap, and follow-up headway were used for calibration of SIDRA model. The results from the analysis showed that currently the roundabout is experiencing delays up to 610 seconds with DOS 1.67 during peak hour. Further, sensitivity analysis for general and roundabout parameters was performed, amongst lane width, cruise speed, inscribed diameter, entry radius, and entry angle showed that inscribed diameter is the most crucial factor affecting delay and DOS. Upgradation of the roundabout to the fully signalized junction was found as the suitable solution which will serve for future years with LOS C for design year having DOS of 0.9 with average control delay of 51.9 seconds per vehicle.

Keywords: performance analysis, roundabout, sensitivity analysis, SIDRA

Procedia PDF Downloads 384
668 Numerical Modeling of Structural Failure of a Ship During the Collision Event

Authors: Adjal Yassine, Semmani Amar

Abstract:

During the last decades, The risk of collision has been increased, especially in high maritime traffic. As the consequence, the demand is required for safety at sea and environmental protection. For this purpose, the consequences prediction of ship collisions is recommended in order to minimize structural failure. additionally, at the design stage of the ship, damage generated during the collision event must be taken into consideration. This structural failure, in some cases, can develop into the progressive collapse of other structural elements and generate catastrophic consequences. The present study investigates the progressive collapse of ships damaged by collisions using the Non -linear finite element method. The failure criteria are taken into account. The impacted area has a refined mesh in order to have more reliable results. Finally, a parametric study was conducted in this study to highlight the effect of the ship's speed, as well as the different impacted areas of double-bottom ships.

Keywords: collsion, strucural failure, ship, finite element analysis

Procedia PDF Downloads 100
667 A New Method to Reduce 5G Application Layer Payload Size

Authors: Gui Yang Wu, Bo Wang, Xin Wang

Abstract:

Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.

Keywords: 5G, JSON, payload size, service-based interface

Procedia PDF Downloads 187
666 Impact of Node Density and Transmission Range on the Performance of OLSR and DSDV Routing Protocols in VANET City Scenarios

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) used to establish communications and exchange information among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET is seen as a promising technology used to provide safety, efficiency, assistance and comfort to the road users. Routing is an important issue in Vehicular Ad Hoc Network to find and maintain communication between vehicles due to the highly dynamic topology, frequently disconnected network and mobility constraints. This paper evaluates the performance of two most popular proactive routing protocols OLSR and DSDV in real city traffic scenario on the basis of three metrics namely Packet delivery ratio, throughput and average end to end delay by varying vehicles density and transmission range.

Keywords: DSDV, OLSR, quality of service, routing protocols, VANET

Procedia PDF Downloads 471
665 Oral Sex Practice among Men Who Have Sex with Men: A Cross-Sectional Study in Indonesian Urban Settings

Authors: I Putu Yuda Hananta, Inke Kusumastuti

Abstract:

The latest Indonesian Biology and Behavior Surveillance (IBBS) conducted by Indonesian Ministry of Health reported a large proportion of men who have sex with men (MSM) engaging in oral sex in their recent sexual history. While it is considered as a pleasuring and safe, oral sex might facilitate the transmission of various sexually transmitted infection (STI) pathogens. This study was aimed to investigate the oral sex practice among MSM in Indonesian urban settings to help delineate demographic and behavior determinants of such practice. In 2014, 501 MSM in 8 clinic-based and outreach STI services were recruited in Jakarta, Yogyakarta and Denpasar, Indonesia. Respondents completed a self-administered questionnaire inquiring about their demographics and sexual history. Median age (interquartile range) of the respondents was 27 (24-30) years; most completed senior high school (54.3%), worked in informal jobs (57.9%), and single (60.9%); and 32.3% reported receiving money in exchange for sex. Oral sex was practiced by most respondents: insertive only (10.0%), receptive only (6.0%), and both (82.4%). A separate multivariable analysis was performed using logistic regression to identify the determinants for receptive and insertive oral sex. Factors associated with receptive oral sex were having more than 10 sex partner(s) in the preceding 6 months vs 1 partner, adjusted odds ratio (aOR) [95% CI]=3.40 [1.22-9.42], p=0.03; and history of receptive-insertive anal sex vs no history, aOR=4.37 [1.76-10.82], p=0.01. Factors associated with insertive oral sex were receiving money for sex vs. not receiving, aOR=2.98 [1.10-8.04], p=0.02; and history of receptive-insertive anal sex vs. no history, aOR=2.10 [0.51-8.74], p<0.001. Only a few respondents reported consistent condom use (11.6% and 12.0% for receptive and insertive oral sex, respectively). Our findings demonstrated that while oral sex is a common practice among MSM, the consistency of condom use in oral sex is very low. In addition, certain sex behavior (number of sex partners, sex work and history of anal sex) were associated with oral sex, and this might need to be addressed during health promotion efforts on STI prevention through oral-genital contact.

Keywords: behavior, Indonesia, men who have sex with men, oral sex

Procedia PDF Downloads 243
664 A Rare Neck Trauma by Bicycle Handlebar in Road Traffic Accident

Authors: Parthasarathi Pramanik

Abstract:

Paediatric blunt abdominal trauma associated with superficial bruise, hematoma, or laceration and internal organ damage secondary to bicycle handlebar is widely documented in the literature. In this article, we have presented a case of bicycle handlebar inflicted fatal neck laceration in a road accident. The deceased sustained a horizontally placed laceration injury over the front and both sides of the middle third of neck (13 cm x 5-8 cm x 2-3.5 cm).The margins of the wound were irregular and focally abraded. The right corner of the injury was pointed whereas the left one was ended with a skin flap. Multiple graze abrasions, contusions and lacerations were found on different parts of body. Autopsy findings and other circumstantial evidences revealed that the victim died due to exsanguination because of severance of carotid artery and jugular vein of both sides. Analysis of the wound suggests the decease sustained the wound by the revolving bicycle handle bar while he had lost the balance.

Keywords: bicycle handle bar, neck injury, lacerated injury, road acident

Procedia PDF Downloads 317
663 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 156
662 Clinical, Demographic and Molecular Characterization of Dengue, Chikungunya and Zika Viruses Causing Hemorrhagic Fever in North India

Authors: Suruchi Shukla, Shantanu Prakash, Amita Jain

Abstract:

Introduction: Arboviral diseases are one of the most common causes of viral hemorrhagic fever (VHF). Of which, Dengue and Chikungunya pose a significant health problem in India. Arbovirus has a tendency to cross the territories and emerge in the new region. Considering the above issues, in the current study active surveillance was conducted among viral hemorrhagic fever (VHF) cases reported from Uttar Pradesh (UP), India. We studied the arboviral etiology of VHF; mainly Dengue, Chikungunya, and ZIKA. Methods: Clinical samples of 465 suspected VHF cases referred to tertiary care referral center of UP, India were enrolled in the study during a period from 15th May 2016 to 9th March 2018. Serum specimens were collected and analyzed for the presence of Dengue, Chikungunya, and ZIKA either by serology and/or by molecular assays. Results: Of all tested, 165 (35.4%) cases were positive for either Dengue or Chikungunya. Dengue (21.2%) was found to be the most prevalent, followed by Chikungunya, (6.6%). None of the cases tested positive for ZIKA virus. Serum samples of 35 (7.5%) cases were positive for both Dengue and Chikungunya. DEN-2 serotype was the most predominant serotype. Phylogenetic and sequence analysis of DEN-2 strains showed 100% clustering with the Cosmopolitan genotype strain. Bleeding from several sites, jaundice, abdominal pain, arthralgia, haemoconcentration, and thrombocytopenia were significantly higher in dengue hemorrhagic cases. However, the rash was significantly more common in Chikungunya patients. Most of the Dengue and Chikungunya positive cases (Age group 6-40 years) were seen in post monsoon season (September to November). Conclusion: Only one-third of total VHF cases are positive for either Dengue/Chikungunya or both. This necessitates the screening of other etiologies capable of causing hemorrhagic manifestations.

Keywords: viral hemorrhagic fever, dengue, chikungunya, zika, India

Procedia PDF Downloads 156
661 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Authors: Abdullah Al Mamun, Tarek R. Sheltami

Abstract:

Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.

Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN

Procedia PDF Downloads 331
660 Design and Analysis of Wireless Charging Lane for Light Rail Transit

Authors: Watcharet Kongwarakom, Tosaphol Ratniyomchai, Thanatchai Kulworawanichpong

Abstract:

This paper presents a design and analysis of wireless charging lane system (WCLS) for light rail transit (LRT) by considering the performance of wireless charging, traffic conditions and energy consumption drawn by the LRT system. The dynamic of the vehicle movement in terms of the vehicle speed profile during running on the WCLS, a dwell time during stopping at the station for taking the WCLS and the capacity of the WCLS in each section are taken into account to alignment design of the WCLS. This paper proposes a case study of the design of the WCLS into 2 sub-cases including continuous and discontinuous WCLS with the same distance of WCLS in total. The energy consumption by the LRT through the WCLS with the different designs of the WCLS is compared to find out the better configuration of those two cases by considering the best performance of the power transfer between the LRT and the WCLS.

Keywords: Light rail transit, Wireless charging lane, Energy consumption, Power transfer

Procedia PDF Downloads 154
659 Capex Planning with and without Additional Spectrum

Authors: Koirala Abarodh, Maghaiya Ujjwal, Guragain Phani Raj

Abstract:

This analysis focuses on defining the spectrum evaluation model for telecom operators in terms of total cost of ownership (TCO). A quantitative approach for specific case analysis research methodology was used for identifying the results. Specific input parameters like target User experience, year on year traffic growth, capacity site limit per year, target additional spectrum type, bandwidth, spectrum efficiency, UE penetration have been used for the spectrum evaluation process and desired outputs in terms of the number of sites, capex in USD and required spectrum bandwidth have been calculated. Furthermore, this study gives a comparison of capex investment for target growth with and without addition spectrum. As a result, the combination of additional spectrum bands of 700 and 2600 MHz has a better evaluation in terms of TCO and performance. It is our recommendation to use these bands for expansion rather than expansion in the current 1800 and 2100 bands.

Keywords: spectrum, capex planning, case study methodology, TCO

Procedia PDF Downloads 65
658 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 544
657 Evaluating the Use of Manned and Unmanned Aerial Vehicles in Strategic Offensive Tasks

Authors: Yildiray Korkmaz, Mehmet Aksoy

Abstract:

In today's operations, countries want to reach their aims in the shortest way due to economical, political and humanitarian aspects. The most effective way of achieving this goal is to be able to penetrate strategic targets. Strategic targets are generally located deep inside of the countries and are defended by modern and efficient surface to air missiles (SAM) platforms which are operated as integrated with Intelligence, Surveillance and Reconnaissance (ISR) systems. On the other hand, these high valued targets are buried deep underground and hardened with strong materials against attacks. Therefore, to penetrate these targets requires very detailed intelligence. This intelligence process should include a wide range that is from weaponry to threat assessment. Accordingly, the framework of the attack package will be determined. This mission package has to execute missions in a high threat environment. The way to minimize the risk which depends on loss of life is to use packages which are formed by UAVs. However, some limitations arising from the characteristics of UAVs restricts the performance of the mission package consisted of UAVs. So, the mission package should be formed with UAVs under the leadership of a fifth generation manned aircraft. Thus, we can minimize the limitations, easily penetrate in the deep inside of the enemy territory with minimum risk, make a decision according to ever-changing conditions and finally destroy the strategic targets. In this article, the strengthens and weakness aspects of UAVs are examined by SWOT analysis. And also, it revealed features of a mission package and presented as an example what kind of a mission package we should form in order to get marginal benefit and penetrate into strategic targets with the development of autonomous mission execution capability in the near future.

Keywords: UAV, autonomy, mission package, strategic attack, mission planning

Procedia PDF Downloads 550
656 Modeling Driving Distraction Considering Psychological-Physical Constraints

Authors: Yixin Zhu, Lishengsa Yue, Jian Sun, Lanyue Tang

Abstract:

Modeling driving distraction in microscopic traffic simulation is crucial for enhancing simulation accuracy. Current driving distraction models are mainly derived from physical motion constraints under distracted states, in which distraction-related error terms are added to existing microscopic driver models. However, the model accuracy is not very satisfying, due to a lack of modeling the cognitive mechanism underlying the distraction. This study models driving distraction based on the Queueing Network Human Processor model (QN-MHP). This study utilizes the queuing structure of the model to perform task invocation and switching for distracted operation and control of the vehicle under driver distraction. Based on the assumption of the QN-MHP model about the cognitive sub-network, server F is a structural bottleneck. The latter information must wait for the previous information to leave server F before it can be processed in server F. Therefore, the waiting time for task switching needs to be calculated. Since the QN-MHP model has different information processing paths for auditory information and visual information, this study divides driving distraction into two types: auditory distraction and visual distraction. For visual distraction, both the visual distraction task and the driving task need to go through the visual perception sub-network, and the stimuli of the two are asynchronous, which is called stimulus on asynchrony (SOA), so when calculating the waiting time for switching tasks, it is necessary to consider it. In the case of auditory distraction, the auditory distraction task and the driving task do not need to compete for the server resources of the perceptual sub-network, and their stimuli can be synchronized without considering the time difference in receiving the stimuli. According to the Theory of Planned Behavior for drivers (TPB), this study uses risk entropy as the decision criterion for driver task switching. A logistic regression model is used with risk entropy as the independent variable to determine whether the driver performs a distraction task, to explain the relationship between perceived risk and distraction. Furthermore, to model a driver’s perception characteristics, a neurophysiological model of visual distraction tasks is incorporated into the QN-MHP, and executes the classical Intelligent Driver Model. The proposed driving distraction model integrates the psychological cognitive process of a driver with the physical motion characteristics, resulting in both high accuracy and interpretability. This paper uses 773 segments of distracted car-following in Shanghai Naturalistic Driving Study data (SH-NDS) to classify the patterns of distracted behavior on different road facilities and obtains three types of distraction patterns: numbness, delay, and aggressiveness. The model was calibrated and verified by simulation. The results indicate that the model can effectively simulate the distracted car-following behavior of different patterns on various roadway facilities, and its performance is better than the traditional IDM model with distraction-related error terms. The proposed model overcomes the limitations of physical-constraints-based models in replicating dangerous driving behaviors, and internal characteristics of an individual. Moreover, the model is demonstrated to effectively generate more dangerous distracted driving scenarios, which can be used to construct high-value automated driving test scenarios.

Keywords: computational cognitive model, driving distraction, microscopic traffic simulation, psychological-physical constraints

Procedia PDF Downloads 93
655 The Population Death Model and Influencing Factors from the Data of The "Sixth Census": Zhangwan District Case Study

Authors: Zhou Shangcheng, Yi Sicen

Abstract:

Objective: To understand the mortality patterns of Zhangwan District in 2010 and provide the basis for the development of scientific and rational health policy. Methods: Data are collected from the Sixth Census of Zhangwan District and disease surveillance system. The statistical analysis include death difference between age, gender, region and time and the related factors. Methods developed for the Global Burden of Disease (GBD) Study by the World Bank and World Health Organization (WHO) were adapted and applied to Zhangwan District population health data. DALY rate per 1,000 was calculated for varied causes of death. SPSS 16 is used by statistic analysis. Results: From the data of death population of Zhangwan District we know the crude mortality rate was 6.03 ‰. There are significant differences of mortality rate in male and female population which was respectively 7.37 ‰ and 4.68 ‰. 0 age group population life expectancy in Zhangwan District in 2010 was 78.40 years old(Male 75.93, Female 81.03). The five leading causes of YLL in descending order were: cardiovascular diseases(42.63DALY/1000), malignant neoplasm (23.73DALY/1000), unintentional injuries (5.84DALY/1000), Respiratory diseases(5.43 DALY/1000), Respiratory infections (2.44DALY/1000). In addition, there are strong relation between the marital status , educational level and mortality in some to a certain extend. Conclusion Zhangwan District, as city level, is at lower mortality levels. The mortality of the total population of Zhangwan District has a downward trend and life expectancy is rising.

Keywords: sixth census, Zhangwan district, death level differences, influencing factors, cause of death

Procedia PDF Downloads 271
654 “Polytic Iconography”: The Sky and Pants of Nicolas-Antoine Taunay (1755-1830)

Authors: Bárbara Dantas

Abstract:

Nicolas-Antoine Taunay had everything to have a quiet life with his numerous family, his colleagues from the Paris Academy of Art, and as a renowned painter of the French Court, but the conjuncture was quite complicated in those final years of the eighteenth century and first decades of the 19th century. The painter had to adapt to various political and social ruptures: from royalty to the French Revolution, from the empire of Napoleon Bonaparte to the empire of King John VI. According to the method of analysis that involves the idea of "political iconography" from Carlo Ginzburg and the concept of "representation" associated with Georges Didi-Huberman, this work wishes to insert Taunay in its context through the analysis of his portrait made by a colleague of the profession and of a Brazilian landscape painted of his own (1816-1821) and, in which he represented himself. Finally, the intention is to find in these two paintings how Nicolas-Antoine Taunay faced himself and in the middle that surrounded him in the traffic that was forced to make it between Paris and Rio de Janeiro.

Keywords: Nicolas-Antoine Taunay, politic iconography, French art, Brazilian art, 19th century

Procedia PDF Downloads 96
653 Commericializing Fashion Goods in the Digital Age

Authors: Jianli Hu

Abstract:

The internet has fundamentally revolutionized access to data and ushered new ways of creating and accessing information for commercializing products. Digital media such as computer programs, software, apps, websites, and social media have allowed the proliferation of information and ideas to grow exponentially. In recent years, a new wave of innovative e-commerce formats has begun to emerge in the fashion marketplace, responding to the ever-greater need for transparency and connectivity. For example, many fashion wholesalers and retailers have modified their operations using software systems that enable brands to cost, track, and analyze products and client orders, sales tools that connect buyers and brands to create a more dynamic market-place, as well as retailer-end apps designed to drive traffic back to brick-and-mortar stores. In this paper, we review the recently developed tools and applications of commercializing fashion, and present results of several field studies and interviews with fashion producers and buyers.

Keywords: fashion, digital media, commercializing products, internet

Procedia PDF Downloads 379
652 Analysis of Sound Loss from the Highway Traffic through Lightweight Insulating Concrete Walls and Artificial Neural Network Modeling of Sound Transmission

Authors: Mustafa Tosun, Kevser Dincer

Abstract:

In this study, analysis on whether the lightweight concrete walled structures used in four climatic regions of Turkey are also capable of insulating sound was conducted. As a new approach, first the wall’s thermal insulation sufficiency’s were calculated and then, artificial neural network (ANN) modeling was used on their cross sections to check if they are sound transmitters too. The ANN was trained and tested by using MATLAB toolbox on a personal computer. ANN input parameters that used were thickness of lightweight concrete wall, frequency and density of lightweight concrete wall, while the transmitted sound was the output parameter. When the results of the TS analysis and those of ANN modeling are evaluated together, it is found from this study, that sound transmit loss increases at higher frequencies, higher wall densities and with larger wall cross sections.

Keywords: artificial neuron network, lightweight concrete, sound insulation, sound transmit loss

Procedia PDF Downloads 252
651 Are There Any Positive Effects of Motivational Interviewing on Motion Sickness?

Authors: Unal Demirtas, Mehmet Ergin Dipcin, Mehmet Cetin

Abstract:

Background: Applied to student candidates prior to entering the air force academy, under the name of Cadet selection flights and executed as 7-8 sorties under the surveillance of flight instructors, this training is mainly towards appraising students’ characteristics of flying ability. All pilot cadets are gone through physical examination before cadet selection flight in a military hospital. Some cadets may show motion sickness symptoms during this flights. The most common symptoms: Nausea, vomiting, vertigo, headache, anxiety, paresthaesia, asthenia, muscle contraction and excitement. These cadets are examined by flight surgeon, after this flight surgeon and psychologist have an motivational interviewing with these cadets. Method: In this study, we have applied a survey that we question the severity of the symptom to the candidates that have motion sickness after the first sortie. We have questioned the candidate who had a motivational interviewing by the psychologist after the treatment of the flight surgeon that whether the candidate relived the complaints that he has at the previous sortie after the second sortie and whether there is decrease or increase in the severity of the complaints compared to the previous flight. Findings: 15 candidates have applied for the flight surgeon with at least one of the motion sickness symptoms. 11 of the 15 candidates showing motion sickness symptoms after the first flight expressed that their complaints are decreased after the motivational interviewing and 4 of the candidates stated that there are no changes in their complaints. The frequently expressed complaints are nausea, vertigo, headache, exhaustion and vomiting respectively. 7 out of 15 candidates expressed that they have same kind of complains in bus, ship etc. Conclusion: It is observed in our study that only conducting motivational interviewing with the candidates without any organic disorders without giving any drugs has a positive effect on the candidates in terms of motion sickness.

Keywords: aeromedicine, candidate, motion sickness, motivational interviewing, pilot

Procedia PDF Downloads 475
650 The Clinical and Survival Differences between Primary B-Cell and T/NK-Cell Non-Hodgkin Lymphomas in the Nasopharynx, Nasal Cavity, and Nasal Sinus: A Population-Based Study of 3839 Cases in the Seer Database

Authors: Jiajia Peng, Danni Cheng, Jianqing Qiu, Yufang Rao, Minzi Mao, Ke Qiu, Junhong Li, Fei Chen, Feng Liu, Jun Liu, Xiaosong Mu, Wenxin Yu, Wei Zhang, Wei Xu, Yu Zhao, Jianjun Ren

Abstract:

Background: Currently, primary B-cell non-Hodgkin lymphoma (B-NHL) and T/NK-cell non-Hodgkin lymphoma (NKT-NHL) originated from the nasal cavity (NC), nasopharynx (NP) and nasal sinus (NS) distinguished unclearly in the clinic. Objective: We sought to compare the clinical and survival differences of B-NHL and NKT-NHL that occurred in NC, NP, and NS, respectively. Methods: Retrospective data of patients diagnosed with nasal cavity lymphoma (NCL), nasopharyngeal lymphoma (NPL), and nasal sinus lymphoma (NSL) between 1975 and 2017 from the Surveillance, Epidemiology, and End Results (SEER) database were collected. We identified the B/NKT-NHL patients based on the histological type and performed univariate, multivariate, and Kaplan-Meier analyses to investigate the survival rates. Results: Of the identified 3,101 B-NHL and 738 NKT-NHL patients, those with B-NHL in NP were the majority (43%) and had better cancer-specific survival than those in NC and NS from 2010 to 2017 (5-year-CSS, NC vs. NP vs. NS: 81% vs. 83% vs. 82%). In contrast, most of the NKT-NHL originated from NC (68%) and had the highest CSS rate in the recent seven years (2010-2017, 5-year-CSS: 63%). Additionally, the survival outcomes of patients with NKT-NHL-NP (HR: 1.34, 95% CI: 0.62-2.89, P=0.460) who had received surgery were much worse than those of patients with NKT-NHL-NC (HR: 1.07, 95% CI: 0.75-1.52, P=0.710) and NKT-NHL-NS (HR: 1.11, 95% CI: 0.59-2.07, P=0.740). NKT-NHL-NS patients who had radiation performed (HR: 0.38, 95% CI: 0.19-0.73, P=0.004) showed the highest survival rates, while chemotherapy performed (HR: 1.01, 95% CI: 0.43-2.37, P=0.980) presented opposite results. Conclusions: Although B-NHL and NKT-NHL originating from NC, NP and NS had similar anatomical locations, their clinical characteristics, treatment therapies, and prognoses were different in this study. Our findings may suggest that B-NHL and NKT-NHL in NC, NP, and NS should be treated as different diseases in the clinic.

Keywords: nasopharyngeal lymphoma, nasal cavity lymphoma, nasal sinus lymphoma, B-cell non-Hodgkin lymphoma, T/NK-cell non-Hodgkin lymphoma

Procedia PDF Downloads 187
649 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 116
648 Smoking, Bullying, and Being Bullied among Secondary School Students: Their Associations with Attachment Styles

Authors: Ruziana Masiran, Hamidin Awang, Cheah Y. T. Jun, Nor Fauziah Hashim, Archana Premkumar, Mohd. Feizel Aisiddiq, Mohd. Fakharuddin

Abstract:

Risk behaviours among secondary school students are common and show an increasing trend over the years. Existing attachment styles between the students and their parents influence the psychosocial development of this group of population hence contributing to the adoption of risk behaviours. The aim of this study was to determine the associations between three risk behaviours; smoking, bullying and being bullied among secondary school students and their styles of attachment to parents in a district in Malaysia. Using multistage simple random sampling, a cross-sectional study was designed with the level of significance, α set at 0.05. The validated self-administered Inventory of Parent and Peer Attachment (IPPA) and Youth Risk Behaviours Surveillance Questionnaire focusing on smoking and bullying were utilized. Secondary school students aged 13 to 17 years old from ten schools in the district of Hulu Langat, Malaysia were sampled. Prevalence of smoking was 15.8%, bullying 8.5% and being bully victims 19.0%. It was found that male gender was a significant risk factor for smoking (p < 0.001), while being Chinese (OR=0.156, 95%CI=0.029-0.837, p=0.030) and having married parents (OR=0.490, 95%CI=0.302-0.796, p=0.490) are protective against smoking. Students with insecure attachment to mothers (OR=1.650, 95%CI=1.018-2.675, p=0.042) and fathers (OR=2.039, 95%CI=1.285-3.234, p=0.002) are at 1.6 and 2 times risk respectively to smoke compared to those with secure attachment. The odds of male students bullying is almost twice than that for female students (OR=2.017, 95%CI=1.416-2.873, p < 0.001), and the odds of being bullied is 1.5 times higher for male students (OR=1.519, 95%CI=1.183-1.950, p=0.001). Those who are insecurely attached to fathers are at 1.8 times higher risk to be bullies (OR=1.867, 95%CI=1.272-2.740, p < 0.001) and 1.5 times higher risk to be bullied (OR=1.546, 95%CI=1.026-2.329, p=0.037). In conclusion, insecure attachment shows a strong association with smoking, bullying and being bullied among secondary school students in Malaysia.

Keywords: attachment styles, bullied, bullying, insecure attachment, risk behaviours, smoking and attachment

Procedia PDF Downloads 332
647 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks

Authors: Jayesh M. Patel, Bharat P. Modi

Abstract:

The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.

Keywords: cellular, Wi-Fi, mobile, smart phone

Procedia PDF Downloads 366
646 Quality Characteristics of Road Runoff in Coastal Zones: A Case Study in A25 Highway, Portugal

Authors: Pedro B. Antunes, Paulo J. Ramísio

Abstract:

Road runoff is a linear source of diffuse pollution that can cause significant environmental impacts. During rainfall events, pollutants from both stationary and mobile sources, which have accumulated on the road surface, are dragged through the superficial runoff. Road runoff in coastal zones may present high levels of salinity and chlorides due to the proximity of the sea and transported marine aerosols. Appearing to be correlated to this process, organic matter concentration may also be significant. This study assesses this phenomenon with the purpose of identifying the relationships between monitored water quality parameters and intrinsic site variables. To achieve this objective, an extensive monitoring program was conducted on a Portuguese coastal highway. The study included thirty rainfall events, in different weather, traffic and salt deposition conditions in a three years period. The evaluations of various water quality parameters were carried out in over 200 samples. In addition, the meteorological, hydrological and traffic parameters were continuously measured. The salt deposition rates (SDR) were determined by means of a wet candle device, which is an innovative feature of the monitoring program. The SDR, variable throughout the year, appears to show a high correlation with wind speed and direction, but mostly with wave propagation, so that it is lower in the summer, in spite of the favorable wind direction in the case study. The distance to the sea, topography, ground obstacles and the platform altitude seems to be also relevant. It was confirmed the high salinity in the runoff, increasing the concentration of the water quality parameters analyzed, with significant amounts of seawater features. In order to estimate the correlations and patterns of different water quality parameters and variables related to weather, road section and salt deposition, the study included exploratory data analysis using different techniques (e.g. Pearson correlation coefficients, Cluster Analysis and Principal Component Analysis), confirming some specific features of the investigated road runoff. Significant correlations among pollutants were observed. Organic matter was highlighted as very dependent of salinity. Indeed, data analysis showed that some important water quality parameters could be divided into two major clusters based on their correlations to salinity (including organic matter associated parameters) and total suspended solids (including some heavy metals). Furthermore, the concentrations of the most relevant pollutants seemed to be very dependent on some meteorological variables, particularly the duration of the antecedent dry period prior to each rainfall event and the average wind speed. Based on the results of a monitoring case study, in a coastal zone, it was proven that SDR, associated with the hydrological characteristics of road runoff, can contribute for a better knowledge of the runoff characteristics, and help to estimate the specific nature of the runoff and related water quality parameters.

Keywords: coastal zones, monitoring, road runoff pollution, salt deposition

Procedia PDF Downloads 239
645 Optical Multicast over OBS Networks: An Approach Based on Code-Words and Tunable Decoders

Authors: Maha Sliti, Walid Abdallah, Noureddine Boudriga

Abstract:

In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.

Keywords: optical multicast, optical burst switching networks, optical code-words, tunable decoder, virtual optical memory

Procedia PDF Downloads 608
644 Performance of Bridge Approach Slabs in Bridge Construction: A Case Study

Authors: Aurora Cerri, Niko Pullojani

Abstract:

Long-term differential settlement between the bridge structure and the bridge embankment typically results in an abrupt grade change, causing driver discomfort, impairing driver safety, and exerting a potentially excessive impact traffic loading on the abutment. This paper has analysed a case of study showing the effect of an approaching slab realized in a bridge constructed at Tirane-Elbasan Motorway. The layer thickness under the slab is modeled as homogenous, the slab is a reinforced concrete structure and over that the asphaltic layers take place. Analysis indicates that reinforced concrete approaching slab distributes the stresses quite uniformly into the road fill layers and settlements varies in a range less than 2.50 cm in the total slab length of 6.00 m with a maximum slope of 1/240. Results taken from analytical analysis are compared with topographic measurements done on field and they carry great similarities.

Keywords: approach slab, bridge, road pavement, differential settlement

Procedia PDF Downloads 223
643 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 204