Search results for: traffic security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3712

Search results for: traffic security

3532 Empirical Investigations on Speed Differentiations of Traffic Flow: A Case Study on a Basic Freeway Segment of O-2 in Istanbul

Authors: Hamed Rashid Sarand, Kemal Selçuk Öğüt

Abstract:

Speed is one of the fundamental variables of road traffic flow that stands as an important evaluation criterion for traffic analyses in several aspects. In particular, varieties of speed variable, such as average speed, free flow speed, optimum speed (capacity speed), acceleration/deceleration speed and so on, have been explicitly considered in the analysis of not only road safety but also road capacity. In the purpose of realizing 'road speed – maximum speed difference across lanes' and 'road flow rate – maximum speed difference across lanes' relations on freeway traffic, this study presents a case study conducted on a basic freeway segment of O-2 in Istanbul. The traffic data employed in this study have been obtained from 5 remote traffic microwave sensors operated by Istanbul Metropolitan Municipality. The study stretch is located between two successive freeway interchanges: Ümraniye and Kavacık. Daily traffic data of 4 years (2011-2014) summer months, July and August are used. The speed data are analyzed into two main flow areas such as uncongested and congested flows. In this study, the regression analyses were carried out in order to examine the relationship between maximum speed difference across lanes and road speed. These investigations were implemented at uncongested and congested flows, separately. Moreover, the relationship between maximum speed difference across lanes and road flow rate were evaluated by applying regression analyses for both uncongested and congested flows separately. It is concluded that there is the moderate relationship between maximum speed difference across lanes and road speed in 50% cases. Additionally, it is indicated that there is the moderate relationship between maximum speed difference across lanes and road flow rate in 30% cases. The maximum speed difference across lanes decreases as the road flow rate increases.

Keywords: maximum speed difference, regression analysis, remote traffic microwave sensor, speed differentiation, traffic flow

Procedia PDF Downloads 328
3531 The Effects of Key Factors in Traffic-Oriented Road Alignment Adjustment for Low Emissions Profile: A Case Study in Norway

Authors: Gaylord K. Booto, Marinelli Giuseppe, Helge Brattebø, Rolf A. Bohne

Abstract:

Emissions reduction has emerged among the principal targets in the process of planning and designing road alignments today. Intelligent road design methods that can result in optimized alignment constitute concrete and innovative responses towards better alternatives and more sustainable road infrastructures. As the largest amount of emissions of road infrastructures occur in the operation stage, it becomes very important to consider traffic weight and distribution in alignment design process. This study analyzes the effects of four traffic factors (i.e. operating speed, vehicle category, technology and fuel type) on adjusting the vertical alignment of a given road, using optimization techniques. Further, factors’ effects are assessed qualitatively and quantitatively, and the emission profiles of resulting alignment alternatives are compared.

Keywords: alignment adjustment, emissions reduction, optimization, traffic-oriented

Procedia PDF Downloads 344
3530 Assessment and Evaluation of Traffic Noise in Selected Government Healthcare Facilities at Birnin Kebbi, Kebbi State-Nigeria

Authors: Muhammad Naziru Yahaya, Buhari Samaila, Nasiru Abubakar

Abstract:

Noise pollution caused by vehicular movement in urban cities has reached alarming proportions due to continuous increases in vehicles and industrialization. Traffic noise causes deafness, annoyance, and other health challenges. According to World Health Organization recommends 60Db daytime sound levels and 40db night time sound levels in hospitals, schools, and other residential areas. Measurements of traffic noise were taken at six different locations of selected healthcare facilities at Birnin Kebbi (Sir Yahaya Memorial Hospital and Federal Medical Centre Birnin Kebbi). The data was collected in the vicinity of hospitals using the slow setting of the device and pointed at noise sources. An integrated multifunctional sound level GM1352, KK2821163 model, was used for measuring the emitted noise and temperatures. The data was measured and recorded at three different periods of the day 8 am – 12 pm, 3 pm – 6 pm, and 6 pm – 8:30 pm, respectively. The results show that a fair traffic flow producing an average sound level in the order of 38db – 64db was recorded at GOPDF, amenityF, and ante-natalF. Similarly, high traffic noise was observed at GOPDS, amenityS, and Fati-LamiS in the order of 52db – 78db unsatisfactory threshold for human hearing.

Keywords: amenities, healthcare, noise, hospital, traffic

Procedia PDF Downloads 72
3529 Evaluating the Influence of Road Markings Retroreflectivity on Road Safety in Low Visibility Conditions

Authors: Darko Babic, Maja Modric, Dario Babic, Mario Fiolic

Abstract:

For road markings as a part of traffic control plan, it is considered to have a positive impact on road safety. Their importance is particularly evident in low visibility conditions when the field of vision and the driver's visual acuity are significantly reduced. The aim of this article is to analyze how road marking retroreflectivity affects the frequency of traffic accidents in low visibility conditions. For this purpose, 10,417.4 km single carriageway roads were analysed across Croatia in the period from 2012 to 2016. The research included accidents that may be significantly affected by marking retroreflectivity: head-on collisions, running off the road, hitting a stationary object on the road and hitting a stationary roadside object. The results have shown that the retroreflectivity level is negatively correlated to the total number of accidents and the number of casualties and injuries, which ultimately means that the risk of traffic accidents and deaths and/or injuries of participants will be lower with the increase of road markings retroreflectivity. These results may assist in defining minimum values of retroreflectivity that the markings must meet at any time as well as the suitable technologies and materials for their implementation.

Keywords: retroreflectivity, road markings, traffic accidents, traffic safety

Procedia PDF Downloads 126
3528 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 104
3527 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 467
3526 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 132
3525 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 242
3524 Development Process and Design Methods for Shared Spaces in Europe

Authors: Kazuyasu Yoshino, Keita Yamaguchi, Toshihiko Nishimura, Masashi Kawasaki

Abstract:

Shared Space, the planning and design concept that allows pedestrians and vehicles to coexist in a street space, has been advocated and developed according to the traffic conditions in each country in Europe. Especially in German/French-speaking countries, the "Meeting Zone," which is a traffic rule combining speed regulation (20km/h) and pedestrian priority, is often applied when designing shared spaces at intersections, squares, and streets in the city center. In this study, the process of establishment and development of the Meeting Zone in Switzerland, France, and Austria was chronologically organized based on the descriptions in the major discourse and guidelines in each country. Then, the characteristics of the spatial design were extracted by analyzing representative examples of Meeting Zone applications. Finally, the relationships between the different approaches to designing of Meeting Zone and traffic regulations in different countries were discussed.

Keywords: shared space, traffic calming, meeting zone, street design

Procedia PDF Downloads 58
3523 Effect of On-Road Vehicular Traffic on Noise Pollution in Bhubaneswar City, Eastern India

Authors: Dudam Bharath Kumar, Harsh Kumar, Naveed Ahmed

Abstract:

Vehicular traffic on the road-side plays a significant role in affecting the noise pollution in most of the cities over the world. To assess the correlation of the road-traffic on noise pollution in the city environment, continuous measurements were carried out in an entire daytime starting from 8:00 AM IST to 6:00 PM IST at a single point for each 5 minutes (8:00-8:05, 9:00-9:05, 10:00-10:05 AM, ...) near the KIIT University campus road. Noise levels were observed using a mobile operated app of android cell phone and a handheld noise meter. Calibration analysis shows high correlation about 0.89 for the study location for the day time period. Results show diurnal variability of atmospheric noise pollution levels go hand-in and with the vehicular number which pass through a point of observation. The range of noise pollution levels in the daytime period is observed as 55 to 75 dB(A). As a day starts, sudden upsurge of noise levels is observed from 65 to 71 dB(A) in the early morning, 64 dB(A) in late morning, regains the same quantity 68-71 dB(A) in the afternoon, and rises 70 dB(A) in the early evening. Vehicular number of the corresponding noise levels exhibits 115-120, 150-160, and 140-160, respectively. However, this preliminary study suggests the importance of vehicular traffic on noise pollution levels in the urban environment and further to study population exposed to noise levels. Innovative approaches help curb the noise pollution through modelling the traffic noise pollution spatially and temporally over the city environments.

Keywords: noise pollution, vehicular traffic, urban environment, noise meter

Procedia PDF Downloads 261
3522 Dynamic Network Approach to Air Traffic Management

Authors: Catia S. A. Sima, K. Bousson

Abstract:

Congestion in the Terminal Maneuvering Areas (TMAs) of larger airports impacts all aspects of air traffic flow, not only at national level but may also induce arrival delays at international level. Hence, there is a need to monitor appropriately the air traffic flow in TMAs so that efficient decisions may be taken to manage their occupancy rates. It would be desirable to physically increase the existing airspace to accommodate all existing demands, but this question is entirely utopian and, given this possibility, several studies and analyses have been developed over the past decades to meet the challenges that have arisen due to the dizzying expansion of the aeronautical industry. The main objective of the present paper is to propose concepts to manage and reduce the degree of uncertainty in the air traffic operations, maximizing the interest of all involved, ensuring a balance between demand and supply, and developing and/or adapting resources that enable a rapid and effective adaptation of measures to the current context and the consequent changes perceived in the aeronautical industry. A central task is to emphasize the increase in air traffic flow management capacity to the present day, taking into account not only a wide range of methodologies but also equipment and/or tools already available in the aeronautical industry. The efficient use of these resources is crucial as the human capacity for work is limited and the actors involved in all processes related to air traffic flow management are increasingly overloaded and, as a result, operational safety could be compromised. The methodology used to answer and/or develop the issues listed above is based on the advantages promoted by the application of Markov Chain principles that enable the construction of a simplified model of a dynamic network that describes the air traffic flow behavior anticipating their changes and eventual measures that could better address the impact of increased demand. Through this model, the proposed concepts are shown to have potentials to optimize the air traffic flow management combined with the operation of the existing resources at each moment and the circumstances found in each TMA, using historical data from the air traffic operations and specificities found in the aeronautical industry, namely in the Portuguese context.

Keywords: air traffic flow, terminal maneuvering area, TMA, air traffic management, ATM, Markov chains

Procedia PDF Downloads 103
3521 A Research Review of Cycling Suitability Assessment for Mountainous Cities

Authors: Xiaofeng Fu

Abstract:

This paper begins with the deconstruction of the localization of China's bicycle renaissance. Then think about how to scientifically plan bicycle traffic in a sustainable way in typed cities, especially in mountainous cities, because they need to respond to more serious geographical issues. Therefore, by sorting out the international research on bicycle traffic in mountainous cities, bike-ability is summarized as a prevalent qualitative analysis medium. Then this paper lists the influencing factors of likeability, the general research framework, and responds to the common problem of mountain cities, that is, the treatment of road longitudinal slopes, to assist urban managers in assessing whether the city's complex terrain is suitable for cycling and identifying possible improvements.

Keywords: traffic planning, bikeability, cycling suitability, mountainous cities

Procedia PDF Downloads 54
3520 Particulate Pollution and Its Effect on Respiratory Symptoms of Exposed Personnel's in Three Heavy Traffic Cities (Roads), Kathmandu, Nepal

Authors: Sujen Man Shrestha, Kanchan Thapa, Tista Prasai Joshi

Abstract:

Background: The present study was carried out to determine suspended particles and respirable particles of diameter less than 1 micrometers (PM1) on road side and some distance of outside from road; and to compare the respiratory symptoms between traffic police men and shop keepers directly 'exposed' to traffic fumes and office worker stay in 'protected' enclosed environment. Methods: Semi structured questionnaire was used to collect the data among case and control after getting verbal informed consent among the convenience sample of traffic police, shopkeepers and officials in three different locations in Kathmandu. Secondary data analysis of hospital data of three hospitals of Kathmandu was also performed. The data on air Particulate Matter was taken by Haz Dust. Results: The result showed air quality of road side traffic is unhealthy and there was increasing trends of respiratory illness in hospital outpatient department (OPD). The people who were exposed found to have more risk of developing respiratory diseases symptoms. Conclusions: The study concluded that air pollution level is strong contributing factor for respiratory diseases and further recommended strong, epidemiological studies with larger sample size, less bias, and also measuring other significant physical and chemicals parameters of air pollution.

Keywords: heavy traffic cities, Kathmandu, particulate pollution, respiratory symptoms

Procedia PDF Downloads 276
3519 Optimization of Traffic Agent Allocation for Minimizing Bus Rapid Transit Cost on Simplified Jakarta Network

Authors: Gloria Patricia Manurung

Abstract:

Jakarta Bus Rapid Transit (BRT) system which was established in 2009 to reduce private vehicle usage and ease the rush hour gridlock throughout the Jakarta Greater area, has failed to achieve its purpose. With gradually increasing the number of private vehicles ownership and reduced road space by the BRT lane construction, private vehicle users intuitively invade the exclusive lane of BRT, creating local traffic along the BRT network. Invaded BRT lanes costs become the same with the road network, making BRT which is supposed to be the main public transportation in the city becoming unreliable. Efforts to guard critical lanes with preventing the invasion by allocating traffic agents at several intersections have been expended, lead to the improving congestion level along the lane. Given a set of number of traffic agents, this study uses an analytical approach to finding the best deployment strategy of traffic agent on a simplified Jakarta road network in minimizing the BRT link cost which is expected to lead to the improvement of BRT system time reliability. User-equilibrium model of traffic assignment is used to reproduce the origin-destination demand flow on the network and the optimum solution conventionally can be obtained with brute force algorithm. This method’s main constraint is that traffic assignment simulation time escalates exponentially with the increase of set of agent’s number and network size. Our proposed metaheuristic and heuristic algorithms perform linear simulation time increase and result in minimized BRT cost approaching to brute force algorithm optimization. Further analysis of the overall network link cost should be performed to see the impact of traffic agent deployment to the network system.

Keywords: traffic assignment, user equilibrium, greedy algorithm, optimization

Procedia PDF Downloads 209
3518 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 74
3517 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 220
3516 An Integrated DANP-PROMETHEE II Approach for Air Traffic Controllers’ Workload Stress Problem

Authors: Jennifer Loar, Jason Montefalcon, Kissy Mae Alimpangog, Miriam Bongo

Abstract:

The demanding, professional roles that air traffic controllers (ATC) play in air transport operation provided the main motivation of this paper. As the controllers’ workload stress becomes more complex due to various stressors, the challenge to overcome these in the pursuit of improving the efficiency of controllers and safety level of aircrafts has been relevant. Therefore, in order to determine the main stressors and surface the best alternative, two widely-known multi-criteria decision-making (MCDM) methods, DANP and PROMETHEE II, are applied. The proposed method is demonstrated in a case study at Mactan Civil Aviation Authority of the Philippines (CAAP). The results showed that the main stressors are high air traffic volume, extraneous traffic, unforeseen events, limitations and reliability of equipment, noise/distracter, micro climate, bad posture, relations with supervisors and colleagues, private life conditions/relationships, and emotional conditions. In the outranking of alternatives, compartmentalization is believed to be the most preferred alternative to overcome controllers’ workload stress. This implies that compartmentalization can best be applied to reduce controller workload stress.

Keywords: air traffic controller, DANP, MCDM, PROMETHEE II, workload stress

Procedia PDF Downloads 246
3515 Economic Growth Relations to Domestic and International Air Passenger Transport in Brazil

Authors: Manoela Cabo da Silva, Elton Fernandes, Ricardo Pacheco, Heloisa Pires

Abstract:

This study examined cointegration and causal relationships between economic growth and regular domestic and international passenger air transport in Brazil. Total passengers embarked and disembarked were used as a proxy for air transport activity and gross domestic product (GDP) as a proxy for economic development. The test spanned the period from 2000 to 2015 for domestic passenger traffic and from 1995 to 2015 for international traffic. The results confirm the hypothesis that there is cointegration between passenger traffic series and economic development, showing a bi-directional Granger causal relationship between domestic traffic and economic development and unidirectional influence by economic growth on international passenger air transport demand. Variance decomposition of the series showed that domestic air transport was far more important than international transport to promoting economic development in Brazil.

Keywords: air passenger transport, cointegration, economic growth, GDP, Granger causality

Procedia PDF Downloads 193
3514 The Comparison between Modelled and Measured Nitrogen Dioxide Concentrations in Cold and Warm Seasons in Kaunas

Authors: A. Miškinytė, A. Dėdelė

Abstract:

Road traffic is one of the main sources of air pollution in urban areas associated with adverse effects on human health and environment. Nitrogen dioxide (NO2) is considered as traffic-related air pollutant, which concentrations tend to be higher near highways, along busy roads and in city centres and exceedances are mainly observed in air quality monitoring stations located close to traffic. Atmospheric dispersion models can be used to examine emissions from many various sources and to predict the concentration of pollutants emitted from these sources into the atmosphere. The study aim was to compare modelled concentrations of nitrogen dioxide using ADMS-Urban dispersion model with air quality monitoring network in cold and warm seasons in Kaunas city. Modelled average seasonal concentrations of nitrogen dioxide for 2011 year have been verified with automatic air quality monitoring data from two stations in the city. Traffic station is located near high traffic street in industrial district and background station far away from the main sources of nitrogen dioxide pollution. The modelling results showed that the highest nitrogen dioxide concentration was modelled and measured in station located near intensive traffic street, both in cold and warm seasons. Modelled and measured nitrogen dioxide concentration was respectively 25.7 and 25.2 µg/m3 in cold season and 15.5 and 17.7 µg/m3 in warm season. While the lowest modelled and measured NO2 concentration was determined in background monitoring station, respectively 12.2 and 13.3 µg/m3 in cold season and 6.1 and 7.6 µg/m3 in warm season. The difference between monitoring station located near high traffic street and background monitoring station showed that better agreement between modelled and measured NO2 concentration was observed at traffic monitoring station.

Keywords: air pollution, nitrogen dioxide, modelling, ADMS-Urban model

Procedia PDF Downloads 386
3513 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 202
3512 On the Inequality between Queue Length and Virtual Waiting Time in Open Queueing Networks under Conditions of Heavy Traffic

Authors: Saulius Minkevicius, Edvinas Greicius

Abstract:

The paper is devoted to the analysis of queueing systems in the context of the network and communications theory. We investigate the inequality in an open queueing network and its applications to the theorems in heavy traffic conditions (fluid approximation, functional limit theorem, and law of the iterated logarithm) for a queue of customers in an open queueing network.

Keywords: fluid approximation, heavy traffic, models of information systems, open queueing network, queue length of customers, queueing theory

Procedia PDF Downloads 257
3511 The Impact of Ship Traffic and Harbor Activities on the Atmospheric Pollution in Two Northern Adriatic Ports: Venice and Rijeka

Authors: Elena Barbaro, Elena Gregoris, Rossano Piazza, Boris Mifka, Tatjana Ivošević, Ivo Orlić, Ana Alebić-Juretić, Andrea Gambaro, Daniele Contini

Abstract:

The aim of the POSEIDON project is to quantify the relative contribution of maritime traffic and harbor activities to atmospheric pollutants concentration in four port-cities of the Adriatic Sea. This study focuses on the harbors of Venice and Rijeka. In order to investigate the main pollution sources, emission inventories were used as input for receptor models: PMF (positive matrix factorization) and PCA (principal components analysis); moreover source identification was also conducted using PAHs diagnostic ratios. The ship traffic impact was quantified: i) on gaseous and particulate PAHs, collected using a new method which consisted in a double simultaneous sampling, in different wind sectors; ii) applying PMF to data of metals, PAHs and ions in PM10; iii) using the vanadium concentration according to the Agrawal methodology.

Keywords: ship traffic, PMF, harbor, POSEIDON

Procedia PDF Downloads 572
3510 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 160
3509 A Comprehensive Evaluation of the Bus Rapid Transit Project from Gazipur to Airport at Dhaka Focusing on Environmental Impacts

Authors: Swapna Begum, Higano Yoshiro

Abstract:

Dhaka is the capital city of Bangladesh. It is considered as one of the traffic congested cities in the world. The growth of the population of this city is increasing day by day. The land use pattern and the increased socio-economic characteristics increase the motor vehicle ownership of this city. The rapid unplanned urbanization and poor transportation planning have deteriorated the transport environment of this city. Also, the huge travel demand with non-motorized traffics on streets is accounted for enormous traffic congestion in this city. The land transport sector in Dhaka is mainly dependent on road transport comprised of both motorized and non-motorized modes of travel. This improper modal mix and the un-integrated system have resulted in huge traffic congestion in this city. Moreover, this city has no well-organized public transport system and any Mass Transit System to cope with this ever increasing demand. Traffic congestion causes serious air pollution and adverse impact on the economy by deteriorating the accessibility, level of service, safety, comfort and operational efficiency. Therefore, there is an imperative need to introduce a well-organized, properly scheduled mass transit system like (Bus Rapid Transit) BRT minimizing the existing problems.

Keywords: air pollution, BRT, mass transit, traffic congestion

Procedia PDF Downloads 375
3508 Driver Behavior Analysis and Inter-Vehicular Collision Simulation Approach

Authors: Lu Zhao, Nadir Farhi, Zoi Christoforou, Nadia Haddadou

Abstract:

The safety test of deploying intelligent connected vehicles (ICVs) on the road network is a critical challenge. Road traffic network simulation can be used to test the functionality of ICVs, which is not only time-saving and less energy-consuming but also can create scenarios with car collisions. However, the relationship between different human driver behaviors and the car-collision occurrences has been not understood clearly; meanwhile, the procedure of car-collisions generation in the traffic numerical simulators is not fully integrated. In this paper, we propose an approach to identify specific driver profiles from real driven data; then, we replicate them in numerical traffic simulations with the purpose of generating inter-vehicular collisions. We proposed three profiles: (i) 'aggressive': short time-headway, (ii) 'inattentive': long reaction time, and (iii) 'normal' with intermediate values of reaction time and time-headway. These three driver profiles are extracted from the NGSIM dataset and simulated using the intelligent driver model (IDM), with an extension of reaction time. At last, the generation of inter-vehicular collisions is performed by varying the percentages of different profiles.

Keywords: vehicular collisions, human driving behavior, traffic modeling, car-following models, microscopic traffic simulation

Procedia PDF Downloads 148
3507 A Machine Learning Approach for Intelligent Transportation System Management on Urban Roads

Authors: Ashish Dhamaniya, Vineet Jain, Rajesh Chouhan

Abstract:

Traffic management is one of the gigantic issue in most of the urban roads in al-most all metropolitan cities in India. Speed is one of the critical traffic parameters for effective Intelligent Transportation System (ITS) implementation as it decides the arrival rate of vehicles on an intersection which are majorly the point of con-gestions. The study aimed to leverage Machine Learning (ML) models to produce precise predictions of speed on urban roadway links. The research objective was to assess how categorized traffic volume and road width, serving as variables, in-fluence speed prediction. Four tree-based regression models namely: Decision Tree (DT), Random Forest (RF), Extra Tree (ET), and Extreme Gradient Boost (XGB)are employed for this purpose. The models' performances were validated using test data, and the results demonstrate that Random Forest surpasses other machine learning techniques and a conventional utility theory-based model in speed prediction. The study is useful for managing the urban roadway network performance under mixed traffic conditions and effective implementation of ITS.

Keywords: stream speed, urban roads, machine learning, traffic flow

Procedia PDF Downloads 27
3506 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 271
3505 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 139
3504 Traffic Prediction with Raw Data Utilization and Context Building

Authors: Zhou Yang, Heli Sun, Jianbin Huang, Jizhong Zhao, Shaojie Qiao

Abstract:

Traffic prediction is essential in a multitude of ways in modern urban life. The researchers of earlier work in this domain carry out the investigation chiefly with two major focuses: (1) the accurate forecast of future values in multiple time series and (2) knowledge extraction from spatial-temporal correlations. However, two key considerations for traffic prediction are often missed: the completeness of raw data and the full context of the prediction timestamp. Concentrating on the two drawbacks of earlier work, we devise an approach that can address these issues in a two-phase framework. First, we utilize the raw trajectories to a greater extent through building a VLA table and data compression. We obtain the intra-trajectory features with graph-based encoding and the intertrajectory ones with a grid-based model and the technique of back projection that restore their surrounding high-resolution spatial-temporal environment. To the best of our knowledge, we are the first to study direct feature extraction from raw trajectories for traffic prediction and attempt the use of raw data with the least degree of reduction. In the prediction phase, we provide a broader context for the prediction timestamp by taking into account the information that are around it in the training dataset. Extensive experiments on several well-known datasets have verified the effectiveness of our solution that combines the strength of raw trajectory data and prediction context. In terms of performance, our approach surpasses several state-of-the-art methods for traffic prediction.

Keywords: traffic prediction, raw data utilization, context building, data reduction

Procedia PDF Downloads 95
3503 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 234