Search results for: traffic security
3746 Factor Study Affecting Visual Awareness on Dynamic Object Monitoring
Authors: Terry Liang Khin Teo, Sun Woh Lye, Kai Lun Brendon Goh
Abstract:
As applied to dynamic monitoring situations, the prevailing approach to situation awareness (SA) assumes that the relevant areas of interest (AOI) be perceived before that information can be processed further to affect decision-making and, thereafter, action. It is not entirely clear whether this is the case. This study seeks to investigate the monitoring of dynamic objects through matching eye fixations with the relevant AOIs in boundary-crossing scenarios. By this definition, a match is where a fixation is registered on the AOI. While many factors may affect monitoring characteristics, traffic simulations were designed in this study to explore two factors, namely: the number of inbounds/outbound traffic transfers and the number of entry and/or exit points in a radar monitoring sector. These two factors were graded into five levels of difficulty ranging from low to high traffic flow numbers. Combined permutation in terms of levels of difficulty of these two factors yielded a total of thirty scenarios. Through this, results showed that changes in the traffic flow numbers on transfer resulted in greater variations having match limits ranging from 29%-100%, as compared to the number of sector entry/exit points of range limit from 80%-100%. The subsequent analysis is able to determine the type and combination of traffic scenarios where imperfect matching is likely to occur.Keywords: air traffic simulation, eye-tracking, visual monitoring, focus attention
Procedia PDF Downloads 583745 Resource Allocation Modeling and Simulation in Border Security Application
Authors: Kai Jin, Hua Li, Qing Song
Abstract:
Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.Keywords: resource optimization, simulation, modeling, border security
Procedia PDF Downloads 5173744 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
Authors: Somayeh Sobati Moghadam
Abstract:
Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy
Procedia PDF Downloads 2723743 Long-Term Modal Changes in International Traffic - Modelling Exercise
Authors: Tomasz Komornicki
Abstract:
The primary aim of the presentation is to try to model border traffic and, at the same time to explain on which economic variables the intensity of border traffic depended in the long term. For this purpose, long series of traffic data on the Polish borders were used. Models were estimated for three variants of explanatory variables: a) for total arrivals and departures (total movement of Poles and foreigners), b) for arrivals and departures of Poles, and c) for arrivals and departures of foreigners. Each of the defined explanatory variables in the models appeared as the logarithm of the natural number of persons. Data from 1994-2017 were used for modeling (for internal Schengen borders for the years 1994-2007). Information on the number of people arriving in and leaving Poland was collected for a total of 303 border crossings. On the basis of the analyses carried out, it was found that one of the main factors determining border traffic is generally differences in the level of economic development (GDP) and the condition of the economy (level of unemployment) and the degree of border permeability. Also statistically significant for border traffic are differences in the prices of goods (fuels, tobacco, and alcohol products) and services (mainly basic ones, e.g., hairdressing services). Such a relationship exists mainly on the eastern border (border traffic determined largely by differences in the prices of goods) and on the border with Germany (in the first analysed period, border traffic was determined mainly by the prices of goods, later - after Poland's accession to the EU and the Schengen area - also by the prices of services). The models also confirmed differences in the set of factors shaping the volume and structure of border traffic on the Polish borders resulting from general geopolitical conditions, with the year 2007 being an important caesura, after which the classical population mobility factors became visible. The results obtained were additionally related to changes in traffic that occurred as a result of the CPOVID-19 pandemic and as a result of the Russian aggression against Ukraine.Keywords: border, modal structure, transport, Ukraine
Procedia PDF Downloads 1153742 Highway Capacity and Level of Service
Authors: Kidist Mesfin Nguse
Abstract:
Ethiopia is the second most densely populated nation in Africa, and about 121 million people as the 2022 Ethiopia population live report recorded. In recent years, the Ethiopian government (GOE) has been gradually growing its road network. With 138,127 kilometers (85,825 miles) of all-weather roads as of the end of 2018–19, Ethiopia possessed just 39% of the nation's necessary road network and lacked a well-organized system. The Ethiopian urban population report recorded that about 21% of the population lives in urban areas, and the high population, coupled with growth in various infrastructures, has led to the migration of the workforce from rural areas to cities across the country. In main roads, the heterogeneous traffic flow with various operational features makes it more unfavorable, causing frequent congestion in the stretch of road. The Level of Service (LOS), a qualitative measure of traffic, is categorized based on the operating conditions in the traffic stream. Determining the capacity and LOS for this city is very crucial as this affects the planning and design of traffic systems and their operation, and the allocation of route selection for infrastructure building projects to provide for a considerably good level of service.Keywords: capacity, level of service, traffic volume, free flow speed
Procedia PDF Downloads 513741 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3553740 Exploring the Role of IPv6 in Enhancing IoT Communication and Green Network Optimization for Business Sustainability
Authors: Saqib Warsi
Abstract:
The Internet of Things (IoT) has become an essential component of modern communication networks, with IPv6 playing a pivotal role in addressing the challenges posed by the rapidly growing number of connected devices. IPv6 provides an expanded address space, offering a solution to the limitations of IPv4 while enhancing routing efficiency and security. This paper explores the impact of IPv6 in improving IoT communication, focusing on its operational benefits for businesses. Additionally, we examine the integration of green communication principles, which aim to reduce energy consumption and operational costs, thus promoting environmental sustainability and business efficiency. Through qualitative analysis and simulation-based modeling, this paper investigates the benefits of IPv6 in IoT environments and evaluates the role of green communication strategies in optimizing network performance. Traffic measurement tools and network performance simulators were employed to analyze the efficiency, sustainability, and scalability of IPv6 networks. By presenting a comprehensive framework for traffic analysis, modeling, and optimization, this research highlights the potential of combining IPv6 and green communication practices to drive business growth while promoting environmental sustainability. The findings provide valuable insights for businesses adopting more sustainable and efficient communication networks.Keywords: IPv6, Internet of Things (IoT), green communications, traffic measurement and modeling, network virtualization
Procedia PDF Downloads 23739 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability
Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi
Abstract:
This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain
Procedia PDF Downloads 3933738 The Traffic Congestion in Biskra in Algeria
Authors: Selatnia Khaled Grine Ikram
Abstract:
The city of Biskra, like other Algerian cities, knows of urban traffic congestion. The concentration of investments especially in the secondary and tertiary sectors in the Wilaya has attracted a large rural population. The latter, combined with the high rate of natural growing, favored the imbalance of the spatial frame of wilayal system and consequently the traffic congestion of the primate city (Biskra). This urban disease is explained by a two-tier development. The capital of Wilaya growing faster than its others centers body and takes measurements of proportion to the whole. The consequences can only be negative. The pressure on the roads, the growth of the fleet, overloading of equipment and activities have become the characteristics of the city of Biskra, which can no longer meet the needs of its inhabitants. This research attempts to show the relationship between urban congestion of the primate city and the imbalance of the spatial structure of the micro-regional urban system.Keywords: traffic congestion, spatial structure, pressure on the roads, equipment and activities
Procedia PDF Downloads 6783737 The Effect of Traffic Load on the Maximum Response of a Cable-Stayed Bridge under Blast Loads
Authors: S. K. Hashemi, M. A. Bradford, H. R. Valipour
Abstract:
The Recent collapse of bridges has raised the awareness about safety and robustness of bridges subjected to extreme loading scenarios such as intentional/unintentional blast loads. The air blast generated by the explosion of bombs or fuel tankers leads to high-magnitude short-duration loading scenarios that can cause severe structural damage and loss of critical structural members. Hence, more attentions need to put towards bridge structures to develop guidelines to increase the resistance of such structures against the probable blast. Recent advancements in numerical methods have brought about the viable and cost effective facilities to simulate complicated blast scenarios and subsequently provide useful reference for safeguarding design of critical infrastructures. In the previous studies common bridge responses to blast load, the traffic load is sometimes not included in the analysis. Including traffic load will increase the axial compression in bridge piers especially when the axial load is relatively small. Traffic load also can reduce the uplift of girders and deck when the bridge experiences under deck explosion. For more complicated structures like cable-stayed or suspension bridges, however, the effect of traffic loads can be completely different. The tension in the cables increase and progressive collapse is likely to happen while traffic loads exist. Accordingly, this study is an attempt to simulate the effect of traffic load cases on the maximum local and global response of an entire cable-stayed bridge subjected to blast loadings using LS-DYNA explicit finite element code. The blast loads ranged from small to large explosion placed at different positions above the deck. Furthermore, the variation of the traffic load factor in the load combination and its effect on the dynamic response of the bridge under blast load is investigated.Keywords: blast, cable-stayed bridge, LS-DYNA, numerical, traffic load
Procedia PDF Downloads 3333736 Autopsy-Based Study of Abdominal Traffic Trauma Death after Emergency Room Arrival
Authors: Satoshi Furukawa, Satomu Morita, Katsuji Nishi, Masahito Hitosugi
Abstract:
We experience the autopsy cases that the deceased was alive in emergency room on arrival. Bleeding is the leading cause of preventable death after injury. This retrospective study aimed to characterize opportunities for performance improvement identified in patients who died from traffic trauma and were considered by the quality improvement of education system. The Japan Advanced Trauma Evaluation and Care (JATEC) education program was introduced in 2002. We focused the abdominal traffic trauma injury. An autopsy-based cross-sectional study conducted. A purposive sampling technique was applied to select the study sample of 41 post-mortems of road traffic accident between April 1999 and March 2014 subjected to medico-legal autopsy at the department of Forensic Medicine, Shiga University of Medical Science. 16 patients (39.0%) were abdominal trauma injury. The mean period of survival after meet with accident was 13.5 hours, compared abdominal trauma death was 27.4 hours longer. In road traffic accidents, the most injured abdominal organs were liver followed by mesentery. We thought delayed treatment was associated with immediate diagnostic imaging, and so expected to expand trauma management examination.Keywords: abdominal traffic trauma, preventable death, autopsy, emergency medicine
Procedia PDF Downloads 4543735 Nature of Traffic Robbery Victimisation Experience 2015-2023
Authors: Idenyi Goshen Peter, Oludayo Tade
Abstract:
Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications.Keywords: traffic robbery, victimisation experience, offender, routine activity
Procedia PDF Downloads 253734 Applying Pre-Accident Observational Methods for Accident Assessment and Prediction at Intersections in Norrkoping City in Sweden
Authors: Ghazwan Al-Haji, Adeyemi Adedokun
Abstract:
Traffic safety at intersections is highly represented, given the fact that accidents occur randomly in time and space. It is necessary to judge whether the intersection is dangerous or not based on short-term observations, and not waiting for many years of assessing historical accident data. There are active and pro-active road infrastructure safety methods for assessing safety at intersections. This study aims to investigate the use of quantitative and qualitative pre-observational methods as the best practice for accident prediction, future black spot identification, and treatment. Historical accident data from STRADA (the Swedish Traffic Accident Data Acquisition) was used within Norrkoping city in Sweden. The ADT (Average Daily Traffic), capacity and speed were used to predict accident rates. Locations with the highest accident records and predicted accident counts were identified and hence audited qualitatively by using Street Audit. The results from these quantitative and qualitative methods were analyzed, validated and compared. The paper provides recommendations on the used methods as well as on how to reduce the accident occurrence at the chosen intersections.Keywords: intersections, traffic conflict, traffic safety, street audit, accidents predictions
Procedia PDF Downloads 2353733 Sustainable Traffic Flow: The Case Study of Un-Signalized Pedestrian Crossing at Stationary Bottleneck and Its Impact on Traffic Flow
Authors: Imran Badshah
Abstract:
This paper study the impact of Un-signalized pedestrian on traffic flow at Stationary Bottleneck. The Highway Capacity Manual (HCM) analyze the methodology of level of service for Urban street segment but it does not include the impact of un-signalized pedestrian crossing at stationary bottleneck. The un-signalized pedestrian crossing in urban road segment causes conflict between vehicles and pedestrians. As a result, the average time taken by vehicle to travel along a road segment increased. The speed of vehicle and the level of service decreases as the running time of a segment increased. To analyze the delay, we need to determine the pedestrian speed while crossing the road at a stationary bottleneck. The objective of this research is to determine the speed of pedestrian and its impact on traffic flow at stationary bottleneck. In addition, the result of this study should be incorporated in the Urban Street Analysis Chapter of HCM.Keywords: stationary bottleneck, traffic flow, pedestrian speed, HCM
Procedia PDF Downloads 913732 Empirical Investigations on Speed Differentiations of Traffic Flow: A Case Study on a Basic Freeway Segment of O-2 in Istanbul
Authors: Hamed Rashid Sarand, Kemal Selçuk Öğüt
Abstract:
Speed is one of the fundamental variables of road traffic flow that stands as an important evaluation criterion for traffic analyses in several aspects. In particular, varieties of speed variable, such as average speed, free flow speed, optimum speed (capacity speed), acceleration/deceleration speed and so on, have been explicitly considered in the analysis of not only road safety but also road capacity. In the purpose of realizing 'road speed – maximum speed difference across lanes' and 'road flow rate – maximum speed difference across lanes' relations on freeway traffic, this study presents a case study conducted on a basic freeway segment of O-2 in Istanbul. The traffic data employed in this study have been obtained from 5 remote traffic microwave sensors operated by Istanbul Metropolitan Municipality. The study stretch is located between two successive freeway interchanges: Ümraniye and Kavacık. Daily traffic data of 4 years (2011-2014) summer months, July and August are used. The speed data are analyzed into two main flow areas such as uncongested and congested flows. In this study, the regression analyses were carried out in order to examine the relationship between maximum speed difference across lanes and road speed. These investigations were implemented at uncongested and congested flows, separately. Moreover, the relationship between maximum speed difference across lanes and road flow rate were evaluated by applying regression analyses for both uncongested and congested flows separately. It is concluded that there is the moderate relationship between maximum speed difference across lanes and road speed in 50% cases. Additionally, it is indicated that there is the moderate relationship between maximum speed difference across lanes and road flow rate in 30% cases. The maximum speed difference across lanes decreases as the road flow rate increases.Keywords: maximum speed difference, regression analysis, remote traffic microwave sensor, speed differentiation, traffic flow
Procedia PDF Downloads 3673731 The Effects of Key Factors in Traffic-Oriented Road Alignment Adjustment for Low Emissions Profile: A Case Study in Norway
Authors: Gaylord K. Booto, Marinelli Giuseppe, Helge Brattebø, Rolf A. Bohne
Abstract:
Emissions reduction has emerged among the principal targets in the process of planning and designing road alignments today. Intelligent road design methods that can result in optimized alignment constitute concrete and innovative responses towards better alternatives and more sustainable road infrastructures. As the largest amount of emissions of road infrastructures occur in the operation stage, it becomes very important to consider traffic weight and distribution in alignment design process. This study analyzes the effects of four traffic factors (i.e. operating speed, vehicle category, technology and fuel type) on adjusting the vertical alignment of a given road, using optimization techniques. Further, factors’ effects are assessed qualitatively and quantitatively, and the emission profiles of resulting alignment alternatives are compared.Keywords: alignment adjustment, emissions reduction, optimization, traffic-oriented
Procedia PDF Downloads 3703730 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture
Authors: Wiriranai Brilliant Masara
Abstract:
The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund
Procedia PDF Downloads 1403729 Competitive Intelligence within the Maritime Security Intelligence
Authors: Dicky R. Munaf, Ayu Bulan Tisna
Abstract:
Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology
Procedia PDF Downloads 5023728 Design and Implementation of a Cross-Network Security Management System
Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).Keywords: network security management, device organization, emergency response, cross-network
Procedia PDF Downloads 1693727 Assessment and Evaluation of Traffic Noise in Selected Government Healthcare Facilities at Birnin Kebbi, Kebbi State-Nigeria
Authors: Muhammad Naziru Yahaya, Buhari Samaila, Nasiru Abubakar
Abstract:
Noise pollution caused by vehicular movement in urban cities has reached alarming proportions due to continuous increases in vehicles and industrialization. Traffic noise causes deafness, annoyance, and other health challenges. According to World Health Organization recommends 60Db daytime sound levels and 40db night time sound levels in hospitals, schools, and other residential areas. Measurements of traffic noise were taken at six different locations of selected healthcare facilities at Birnin Kebbi (Sir Yahaya Memorial Hospital and Federal Medical Centre Birnin Kebbi). The data was collected in the vicinity of hospitals using the slow setting of the device and pointed at noise sources. An integrated multifunctional sound level GM1352, KK2821163 model, was used for measuring the emitted noise and temperatures. The data was measured and recorded at three different periods of the day 8 am – 12 pm, 3 pm – 6 pm, and 6 pm – 8:30 pm, respectively. The results show that a fair traffic flow producing an average sound level in the order of 38db – 64db was recorded at GOPDF, amenityF, and ante-natalF. Similarly, high traffic noise was observed at GOPDS, amenityS, and Fati-LamiS in the order of 52db – 78db unsatisfactory threshold for human hearing.Keywords: amenities, healthcare, noise, hospital, traffic
Procedia PDF Downloads 1183726 The Interpretation of World Order by Epistemic Communities in Security Studies
Authors: Gabriel A. Orozco
Abstract:
The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.Keywords: security studies, epistemic communities, international, relations
Procedia PDF Downloads 2713725 Evaluating the Influence of Road Markings Retroreflectivity on Road Safety in Low Visibility Conditions
Authors: Darko Babic, Maja Modric, Dario Babic, Mario Fiolic
Abstract:
For road markings as a part of traffic control plan, it is considered to have a positive impact on road safety. Their importance is particularly evident in low visibility conditions when the field of vision and the driver's visual acuity are significantly reduced. The aim of this article is to analyze how road marking retroreflectivity affects the frequency of traffic accidents in low visibility conditions. For this purpose, 10,417.4 km single carriageway roads were analysed across Croatia in the period from 2012 to 2016. The research included accidents that may be significantly affected by marking retroreflectivity: head-on collisions, running off the road, hitting a stationary object on the road and hitting a stationary roadside object. The results have shown that the retroreflectivity level is negatively correlated to the total number of accidents and the number of casualties and injuries, which ultimately means that the risk of traffic accidents and deaths and/or injuries of participants will be lower with the increase of road markings retroreflectivity. These results may assist in defining minimum values of retroreflectivity that the markings must meet at any time as well as the suitable technologies and materials for their implementation.Keywords: retroreflectivity, road markings, traffic accidents, traffic safety
Procedia PDF Downloads 1533724 Development Process and Design Methods for Shared Spaces in Europe
Authors: Kazuyasu Yoshino, Keita Yamaguchi, Toshihiko Nishimura, Masashi Kawasaki
Abstract:
Shared Space, the planning and design concept that allows pedestrians and vehicles to coexist in a street space, has been advocated and developed according to the traffic conditions in each country in Europe. Especially in German/French-speaking countries, the "Meeting Zone," which is a traffic rule combining speed regulation (20km/h) and pedestrian priority, is often applied when designing shared spaces at intersections, squares, and streets in the city center. In this study, the process of establishment and development of the Meeting Zone in Switzerland, France, and Austria was chronologically organized based on the descriptions in the major discourse and guidelines in each country. Then, the characteristics of the spatial design were extracted by analyzing representative examples of Meeting Zone applications. Finally, the relationships between the different approaches to designing of Meeting Zone and traffic regulations in different countries were discussed.Keywords: shared space, traffic calming, meeting zone, street design
Procedia PDF Downloads 943723 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1213722 Effect of On-Road Vehicular Traffic on Noise Pollution in Bhubaneswar City, Eastern India
Authors: Dudam Bharath Kumar, Harsh Kumar, Naveed Ahmed
Abstract:
Vehicular traffic on the road-side plays a significant role in affecting the noise pollution in most of the cities over the world. To assess the correlation of the road-traffic on noise pollution in the city environment, continuous measurements were carried out in an entire daytime starting from 8:00 AM IST to 6:00 PM IST at a single point for each 5 minutes (8:00-8:05, 9:00-9:05, 10:00-10:05 AM, ...) near the KIIT University campus road. Noise levels were observed using a mobile operated app of android cell phone and a handheld noise meter. Calibration analysis shows high correlation about 0.89 for the study location for the day time period. Results show diurnal variability of atmospheric noise pollution levels go hand-in and with the vehicular number which pass through a point of observation. The range of noise pollution levels in the daytime period is observed as 55 to 75 dB(A). As a day starts, sudden upsurge of noise levels is observed from 65 to 71 dB(A) in the early morning, 64 dB(A) in late morning, regains the same quantity 68-71 dB(A) in the afternoon, and rises 70 dB(A) in the early evening. Vehicular number of the corresponding noise levels exhibits 115-120, 150-160, and 140-160, respectively. However, this preliminary study suggests the importance of vehicular traffic on noise pollution levels in the urban environment and further to study population exposed to noise levels. Innovative approaches help curb the noise pollution through modelling the traffic noise pollution spatially and temporally over the city environments.Keywords: noise pollution, vehicular traffic, urban environment, noise meter
Procedia PDF Downloads 2973721 Dynamic Network Approach to Air Traffic Management
Authors: Catia S. A. Sima, K. Bousson
Abstract:
Congestion in the Terminal Maneuvering Areas (TMAs) of larger airports impacts all aspects of air traffic flow, not only at national level but may also induce arrival delays at international level. Hence, there is a need to monitor appropriately the air traffic flow in TMAs so that efficient decisions may be taken to manage their occupancy rates. It would be desirable to physically increase the existing airspace to accommodate all existing demands, but this question is entirely utopian and, given this possibility, several studies and analyses have been developed over the past decades to meet the challenges that have arisen due to the dizzying expansion of the aeronautical industry. The main objective of the present paper is to propose concepts to manage and reduce the degree of uncertainty in the air traffic operations, maximizing the interest of all involved, ensuring a balance between demand and supply, and developing and/or adapting resources that enable a rapid and effective adaptation of measures to the current context and the consequent changes perceived in the aeronautical industry. A central task is to emphasize the increase in air traffic flow management capacity to the present day, taking into account not only a wide range of methodologies but also equipment and/or tools already available in the aeronautical industry. The efficient use of these resources is crucial as the human capacity for work is limited and the actors involved in all processes related to air traffic flow management are increasingly overloaded and, as a result, operational safety could be compromised. The methodology used to answer and/or develop the issues listed above is based on the advantages promoted by the application of Markov Chain principles that enable the construction of a simplified model of a dynamic network that describes the air traffic flow behavior anticipating their changes and eventual measures that could better address the impact of increased demand. Through this model, the proposed concepts are shown to have potentials to optimize the air traffic flow management combined with the operation of the existing resources at each moment and the circumstances found in each TMA, using historical data from the air traffic operations and specificities found in the aeronautical industry, namely in the Portuguese context.Keywords: air traffic flow, terminal maneuvering area, TMA, air traffic management, ATM, Markov chains
Procedia PDF Downloads 1333720 A Research Review of Cycling Suitability Assessment for Mountainous Cities
Authors: Xiaofeng Fu
Abstract:
This paper begins with the deconstruction of the localization of China's bicycle renaissance. Then think about how to scientifically plan bicycle traffic in a sustainable way in typed cities, especially in mountainous cities, because they need to respond to more serious geographical issues. Therefore, by sorting out the international research on bicycle traffic in mountainous cities, bike-ability is summarized as a prevalent qualitative analysis medium. Then this paper lists the influencing factors of likeability, the general research framework, and responds to the common problem of mountain cities, that is, the treatment of road longitudinal slopes, to assist urban managers in assessing whether the city's complex terrain is suitable for cycling and identifying possible improvements.Keywords: traffic planning, bikeability, cycling suitability, mountainous cities
Procedia PDF Downloads 753719 Implications of Private Military Security Companies on Stewardship of the Profession of Arms
Authors: Kevin Krupski
Abstract:
Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.Keywords: stewardship, military profession, civil-military, security
Procedia PDF Downloads 2513718 Particulate Pollution and Its Effect on Respiratory Symptoms of Exposed Personnel's in Three Heavy Traffic Cities (Roads), Kathmandu, Nepal
Authors: Sujen Man Shrestha, Kanchan Thapa, Tista Prasai Joshi
Abstract:
Background: The present study was carried out to determine suspended particles and respirable particles of diameter less than 1 micrometers (PM1) on road side and some distance of outside from road; and to compare the respiratory symptoms between traffic police men and shop keepers directly 'exposed' to traffic fumes and office worker stay in 'protected' enclosed environment. Methods: Semi structured questionnaire was used to collect the data among case and control after getting verbal informed consent among the convenience sample of traffic police, shopkeepers and officials in three different locations in Kathmandu. Secondary data analysis of hospital data of three hospitals of Kathmandu was also performed. The data on air Particulate Matter was taken by Haz Dust. Results: The result showed air quality of road side traffic is unhealthy and there was increasing trends of respiratory illness in hospital outpatient department (OPD). The people who were exposed found to have more risk of developing respiratory diseases symptoms. Conclusions: The study concluded that air pollution level is strong contributing factor for respiratory diseases and further recommended strong, epidemiological studies with larger sample size, less bias, and also measuring other significant physical and chemicals parameters of air pollution.Keywords: heavy traffic cities, Kathmandu, particulate pollution, respiratory symptoms
Procedia PDF Downloads 3063717 Optimization of Traffic Agent Allocation for Minimizing Bus Rapid Transit Cost on Simplified Jakarta Network
Authors: Gloria Patricia Manurung
Abstract:
Jakarta Bus Rapid Transit (BRT) system which was established in 2009 to reduce private vehicle usage and ease the rush hour gridlock throughout the Jakarta Greater area, has failed to achieve its purpose. With gradually increasing the number of private vehicles ownership and reduced road space by the BRT lane construction, private vehicle users intuitively invade the exclusive lane of BRT, creating local traffic along the BRT network. Invaded BRT lanes costs become the same with the road network, making BRT which is supposed to be the main public transportation in the city becoming unreliable. Efforts to guard critical lanes with preventing the invasion by allocating traffic agents at several intersections have been expended, lead to the improving congestion level along the lane. Given a set of number of traffic agents, this study uses an analytical approach to finding the best deployment strategy of traffic agent on a simplified Jakarta road network in minimizing the BRT link cost which is expected to lead to the improvement of BRT system time reliability. User-equilibrium model of traffic assignment is used to reproduce the origin-destination demand flow on the network and the optimum solution conventionally can be obtained with brute force algorithm. This method’s main constraint is that traffic assignment simulation time escalates exponentially with the increase of set of agent’s number and network size. Our proposed metaheuristic and heuristic algorithms perform linear simulation time increase and result in minimized BRT cost approaching to brute force algorithm optimization. Further analysis of the overall network link cost should be performed to see the impact of traffic agent deployment to the network system.Keywords: traffic assignment, user equilibrium, greedy algorithm, optimization
Procedia PDF Downloads 232