Search results for: vulnerable road user
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: vulnerable road user

4018 Traffic Congestion Analysis and Modeling for Urban Roads of Srinagar City

Authors: Adinarayana Badveeti, Mohammad Shafi Mir

Abstract:

In Srinagar City, in India, traffic congestion is a condition on transport networks that occurs as use increases and is characterized by slower speeds, longer trip times, and increased vehicular queuing. Traffic congestion is conventionally measured using indicators such as roadway level-of-service, the Travel Time Index and their variants. Several measures have been taken in order to counteract congestion like road pricing, car pooling, improved traffic management, etc. While new road construction can temporarily relieve congestion in the longer term, it simply encourages further growth in car traffic through increased travel and a switch away from public transport. The full paper report, on which this abstract is based, aims to provide policymakers and technical staff with the real-time data, conceptual framework and guidance on some of the engineering tools necessary to manage congestion in such a way as to reduce its overall impact on individuals, families, communities, and societies dynamic, affordable, liveable and attractive urban regions will never be free of congestion. Road transport policies, however, should seek to manage congestion on a cost-effective basis with the aim of reducing the burden that excessive congestion imposes upon travellers and urban dwellers throughout the urban road network.

Keywords: traffic congestion, modeling, traffic management, travel time index

Procedia PDF Downloads 285
4017 The Role of User Participation on Social Sustainability: A Case Study on Four Residential Areas

Authors: Hasan Taştan, Ayşen Ciravoğlu

Abstract:

The rapid growth of the human population and the environmental degradation associated with increased consumption of resources raises concerns on sustainability. Social sustainability constitutes one of the three dimensions of sustainability together with environmental and economic dimensions. Even though there is not an agreement on what social sustainability consists of, it is a well known fact that it necessitates user participation. The fore, this study aims to observe and analyze the role of user participation on social sustainability. In this paper, the links between user participation and indicators of social sustainability have been searched. In order to achieve this, first of all a literature review on social sustainability has been done; accordingly, the information obtained from researches has been used in the evaluation of the projects conducted in the developing countries considering user participation. These examples are taken as role models with pros and cons for the development of the checklist for the evaluation of the case studies. Furthermore, a case study over the post earthquake residential settlements in Turkey have been conducted. The case study projects are selected considering different building scales (differing number of residential units), scale of the problem (post-earthquake settlements, rehabilitation of shanty dwellings) and the variety of users (differing socio-economic dimensions). Decisionmaking, design, building and usage processes of the selected projects and actors of these processes have been investigated in the context of social sustainability. The cases include: New Gourna Village by Hassan Fathy, Quinta Monroy dwelling units conducted in Chile by Alejandro Aravena and Beyköy and Beriköy projects in Turkey aiming to solve the problem of housing which have appeared after the earthquake happened in 1999 have been investigated. Results of the study possible links between social sustainability indicators and user participation and links between user participation and the peculiarities of place. Results are compared and discussed in order to find possible solutions to form social sustainability through user participation. Results show that social sustainability issues depend on communities' characteristics, socio-economic conditions and user profile but user participation has positive effects on some social sustainability indicators like user satisfaction, a sense of belonging and social stability.

Keywords: housing projects, residential areas, social sustainability, user participation

Procedia PDF Downloads 360
4016 An Approach to Apply Kernel Density Estimation Tool for Crash Prone Location Identification

Authors: Kazi Md. Shifun Newaz, S. Miaji, Shahnewaz Hazanat-E-Rabbi

Abstract:

In this study, the kernel density estimation tool has been used to identify most crash prone locations in a national highway of Bangladesh. Like other developing countries, in Bangladesh road traffic crashes (RTC) have now become a great social alarm and the situation is deteriorating day by day. Today’s black spot identification process is not based on modern technical tools and most of the cases provide wrong output. In this situation, characteristic analysis and black spot identification by spatial analysis would be an effective and low cost approach in ensuring road safety. The methodology of this study incorporates a framework on the basis of spatial-temporal study to identify most RTC occurrence locations. In this study, a very important and economic corridor like Dhaka to Sylhet highway has been chosen to apply the method. This research proposes that KDE method for identification of Hazardous Road Location (HRL) could be used for all other National highways in Bangladesh and also for other developing countries. Some recommendations have been suggested for policy maker to reduce RTC in Dhaka-Sylhet especially in black spots.

Keywords: hazardous road location (HRL), crash, GIS, kernel density

Procedia PDF Downloads 274
4015 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 486
4014 Gamification of a Business Intelligence Tool

Authors: Stephen Miller

Abstract:

The act of applying game mechanics and dynamics (which have been traditionally used in video games) into business applications is being widely trialed in an effort to make conventional business software a bit more participative, fun and engaging. This new trend, named ‘gamification’ has its believers and of course, its critics who still need convincing that the concept is an effective and beneficial business tool worthy of investment. The literature reveals that user engagement of business intelligence (BI) tools is much lower than expected and investors are failing to get a good return on their investment (ROI). So, a software prototype will be designed and developed to add gamification to a BI tool to determine its effect upon the user engagement levels of test participants. The experimental study will be evaluated using the comprehensive User Engagement Scale (UES) to see if there are improvements in areas such as; aesthetics, perceived usability, endurability, novelty, felt involvement and focused attention. The results of this unique study should demonstrate whether or not ‘gamifying’ a BI tool has the potential to increase an individual’s motivation to use BI software more often.

Keywords: business intelligence, gamification, human computer interaction, user engagement

Procedia PDF Downloads 557
4013 Effects of Empathy Priming on Idea Generation

Authors: Tejas Dhadphale

Abstract:

The user-centered design (UCD) approach has led to an increased interest in empathy within the product development process. Designers have explored several empathetic methods and tools such as personas, empathy maps, journey maps, user needs statements and user scenarios to capture and visualize users’ needs. The goal of these tools is not only to generate a deeper and shared understanding of user needs but also to become a point of reference for subsequent decision making, brainstorming and concept evaluation tasks. The purpose of this study is to measure the effect of empathy priming on divergent brainstorming tasks. This study compares the effects of three empathy tools, personas, empathy maps and user needs statements, on ideation fluency and originality of ideas during brainstorming tasks. In a three-between-subjects experimental design study, sixty product design students were randomly assigned to one of three conditions: persona, empathy maps and user needs statements. A one-way, between-subjects analysis of variance (ANOVA) revealed a a statistically significant difference in empathy priming on fluency and originality of ideas. Participants in the persona group showed higher ideation fluency and generated a greater number of original ideas compared to the other groups. The results show that participants in the user need statement group to generate a greater number of feasible and relevant ideas. The study also aims to understand how formatting and visualization of empathy tools impact divergent brainstorming tasks. Participants were interviewed to understand how different visualizations of users’ needs (personas, empathy maps and user needs statements) facilitated idea generation during brainstorming tasks. Implications for design education are discussed.

Keywords: empathy, persona, priming, Design research

Procedia PDF Downloads 50
4012 Using Satellite Images Datasets for Road Intersection Detection in Route Planning

Authors: Fatma El-Zahraa El-Taher, Ayman Taha, Jane Courtney, Susan Mckeever

Abstract:

Understanding road networks plays an important role in navigation applications such as self-driving vehicles and route planning for individual journeys. Intersections of roads are essential components of road networks. Understanding the features of an intersection, from a simple T-junction to larger multi-road junctions, is critical to decisions such as crossing roads or selecting the safest routes. The identification and profiling of intersections from satellite images is a challenging task. While deep learning approaches offer the state-of-the-art in image classification and detection, the availability of training datasets is a bottleneck in this approach. In this paper, a labelled satellite image dataset for the intersection recognition problem is presented. It consists of 14,692 satellite images of Washington DC, USA. To support other users of the dataset, an automated download and labelling script is provided for dataset replication. The challenges of construction and fine-grained feature labelling of a satellite image dataset is examined, including the issue of how to address features that are spread across multiple images. Finally, the accuracy of the detection of intersections in satellite images is evaluated.

Keywords: satellite images, remote sensing images, data acquisition, autonomous vehicles

Procedia PDF Downloads 111
4011 Multi-Stream Graph Attention Network for Recommendation with Knowledge Graph

Authors: Zhifei Hu, Feng Xia

Abstract:

In recent years, Graph neural network has been widely used in knowledge graph recommendation. The existing recommendation methods based on graph neural network extract information from knowledge graph through entity and relation, which may not be efficient in the way of information extraction. In order to better propose useful entity information for the current recommendation task in the knowledge graph, we propose an end-to-end Neural network Model based on multi-stream graph attentional Mechanism (MSGAT), which can effectively integrate the knowledge graph into the recommendation system by evaluating the importance of entities from both users and items. Specifically, we use the attention mechanism from the user's perspective to distil the domain nodes information of the predicted item in the knowledge graph, to enhance the user's information on items, and generate the feature representation of the predicted item. Due to user history, click items can reflect the user's interest distribution, we propose a multi-stream attention mechanism, based on the user's preference for entities and relationships, and the similarity between items to be predicted and entities, aggregate user history click item's neighborhood entity information in the knowledge graph and generate the user's feature representation. We evaluate our model on three real recommendation datasets: Movielens-1M (ML-1M), LFM-1B 2015 (LFM-1B), and Amazon-Book (AZ-book). Experimental results show that compared with the most advanced models, our proposed model can better capture the entity information in the knowledge graph, which proves the validity and accuracy of the model.

Keywords: graph attention network, knowledge graph, recommendation, information propagation

Procedia PDF Downloads 87
4010 A Study of Ocular Morbidity in Road Traffic Accidents

Authors: Nikhat Iqbal Tamboli

Abstract:

INTRODUCTION: road traffic accidents (RTAs) are one of the leading and common causes of ocular injuries especially in developing countries like India which are preventable with certain measures and so it is of public health importance. AIM: To study incidence and clinical presentation of ocular morbidity in road traffic accidents. METHOD: Prospective cross-sectional study was conducted on 360 patients reported in department of ophthalmology. Detailed ocular examination and relevant investigations done. RESULTS: Incidence of ocular injuries is 23%. male:female ratio is 4.5:1.Cases having Sub conjunctival haemorrhage [74].eccymosis[217]. lid lcerations [164]orbital fracture[12] corneal tear [7]corneal abrasion[2] sclera tear[6] hyphaema[4] traumatic mydriasis [7]traumatic cataract [2]vitreous haemorrhage [1]traumatic optic neuropathy[1].Maximum cases in age group 20-40 years, with two wheeler vehicles 94.7% .Under influence of alcohol 13.3%. CONCLUSION: Younger age group with male preponderance is involved in ocular trauma due to road traffic accidents .maximum cases reported are with anterior segment injuries. Alcohol and two wheeler vehicles are common risk factors. Injuries involving cornea had bad prognosis and involving retina had worst prognosis.

Keywords: ocular morbidity, eye trauma, RTA, eye injury

Procedia PDF Downloads 41
4009 Impact of Unbalanced Urban Structure on the Traffic Congestion in Biskra, Algeria

Authors: Khaled Selatnia

Abstract:

Nowadays, the traffic congestion becomes increasingly a chronic problem. Sometimes, the cause is attributed to the recurrent road works that create barriers to the efficient movement. But congestion, which usually occurs in cities, can take diverse forms and magnitudes. The case study of Biskra city in Algeria and the diagnosis of its road network show that throughout all the micro regional system, the road network seems at first quite dense. However, this density although it is important, does not cover all areas. A major flow is concentrated in the axis Sidi Okba – Biskra – Tolga. The largest movement of people in the Wilaya (prefecture) revolves around these three centers and their areas of influence. Centers farthest from the trio are very poorly served. This fact leads us to ask questions about the extent of congestion in Biskra city and its relationship to the imbalance of the urban framework. The objective of this paper is to highlight the impact of the urban fact on the traffic congestion.

Keywords: congestion, urban framework, regional, urban and regional studies

Procedia PDF Downloads 596
4008 The Moderating Effect of Pathological Narcissism in the Relationship between Victim Justice Sensitivity and Anger Rumination

Authors: Isil Coklar-Okutkan, Miray Akyunus

Abstract:

Victim sensitivity is a form of justice sensitivity that reflects the tendency to perceive injustice to one’s disadvantage. Victim sensitivity is considered as a dysfunctional trait that predicts anger, aggression, uncooperative behavior, depression and anxiety. Indeed, exploring the mechanism of association between victim sensitivity and anger is clinically important since it can lead to externalizing and internalizing problems. This study aims to investigate the moderating role of pathological narcissism in the relationship between victim sensitivity and anger rumination. Through testing different models where subtypes of narcissism and anger rumination components are included independently, the specific mechanism of different ruminative processes in anger is investigated. The sample consisted of 311 undergraduate students from Turkey, 107 of whom were males, and 204 were females. Participants completed Justice Sensitivity Inventory-Victim Subscale, Pathological Narcissism Inventory and Anger Rumination Scale. In the proposed double moderation model, vulnerable and grandiose narcissism was the moderators in the relationship between victim justice sensitivity and anger rumination. Four separate models were tested where one of the four components of anger rumination (angry afterthoughts, thoughts of revenge, angry memories, understanding of causes) were the dependent variable in each model. Results revealed that two of the moderation models are significant. Firstly, grandiose narcissism is the only moderator in the relationship between victim sensitivity and thoughts of revenge. Secondly, vulnerable narcissism is the only moderator in the relationship between victim sensitivity and understanding causes. Accordingly, grandiose narcissism is positively associated with the thoughts of revenge, and vulnerable narcissism is positively associated with understanding causes, only when the level of victim sensitivity is high. To summarize, increased victim sensitivity leads to ruminative thoughts of revenge in individuals with grandiose narcissism, whereas it leads to rumination on causes of the incident in individuals with vulnerable narcissism. The clinical implications of the findings are discussed.

Keywords: anger rumination, victim sensitivity, grandiose narcissism, vulnerable narcissism

Procedia PDF Downloads 160
4007 Socio-Economic Setting and Implications to Climate Change Impacts in Eastern Cape Province, South Africa

Authors: Kenneth Nhundu, Leocadia Zhou, Farhad Aghdasi, Voster Muchenje

Abstract:

Climate change poses increased risks to rural communities that rely on natural resources, such as forests, cropland and rangeland, waterways, and open spaces Because of their connection to the land and the potential for climate change to impact natural resources and disrupt ecosystems and seasons, rural livelihoods and well-being are disproportionately vulnerable to climate change. Climate change has the potential to affect the environment in a number of ways that place increased stress on everyone, but disproportionately on the most vulnerable populations, including the young, the old, those with chronic illness, and the poor. The communities in the study area are predominantly rural, resource-based and are generally surrounded by public or private lands that are dominated by natural resources, including forests, rangelands, and agriculture. The livelihoods of these communities are tied to natural resources. Therefore, targeted strategies to cope will be required. This paper assessed the household socio-economic characteristics and their implications to household vulnerability to climate change impacts in the rural Eastern Cape Province, South Africa. The results indicate that the rural communities are climate-vulnerable populations as they have a large proportion of people who are less economically or physically capable of adapting to climate change. The study therefore recommends that at each level, the needs, knowledge, and voices of vulnerable populations, including indigenous peoples and resource-based communities, deserve consideration and incorporation so that climate change policy (1) ensures that all people are supported and able to act, (2) provides as robust a strategy as possible to address a rapidly changing environment, and (3) enhances equity and justice.

Keywords: climate change, vulnerable, socio-economic, livelihoods

Procedia PDF Downloads 316
4006 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection

Authors: Jinming Ma, Tianbing Xia, Janusz Getta

Abstract:

This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.

Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory

Procedia PDF Downloads 147
4005 Identification of Vulnerable Zone Due to Cyclone-Induced Storm Surge in the Exposed Coast of Bangladesh

Authors: Mohiuddin Sakib, Fatin Nihal, Rabeya Akter, Anisul Haque, Munsur Rahman, Wasif-E-Elahi

Abstract:

Surge generating cyclones are one of the deadliest natural disasters that threaten the life of coastal environment and communities worldwide. Due to the geographic location, ‘low lying alluvial plain, geomorphologic characteristics and 710 kilometers exposed coastline, Bangladesh is considered as one of the greatest vulnerable country for storm surge flooding. Bay of Bengal is possessing the highest potential of creating storm surge inundation to the coastal areas. Bangladesh is the most exposed country to tropical cyclone with an average of four cyclone striking every years. Frequent cyclone landfall made the country one of the worst sufferer within the world for cyclone induced storm surge flooding and casualties. During the years from 1797 to 2009 Bangladesh has been hit by 63 severe cyclones with strengths of different magnitudes. Though detailed studies were done focusing on the specific cyclone like Sidr or Aila, no study was conducted where vulnerable areas of exposed coast were identified based on the strength of cyclones. This study classifies the vulnerable areas of the exposed coast based on storm surge inundation depth and area due to cyclones of varying strengths. Classification of the exposed coast based on hazard induced cyclonic vulnerability will help the decision makers to take appropriate policies for reducing damage and loss.

Keywords: cyclone, landfall, storm surge, exposed coastline, vulnerability

Procedia PDF Downloads 351
4004 Computer Vision Based Road Accident Classification from Traffic Surveillance

Authors: Shourav Chowdhury, Subrata Barua, K. M. Naimuddin, Imam Hassan Sajib, Md. Hasan, Shudipta Banik, Muna Das

Abstract:

Traffic accidents stand as a leading cause of fatalities worldwide, significantly impacting global mortality rates. Accurate classification of road accidents through advanced technological solutions presents a crucial opportunity to revolutionize accident prevention and emergency response strategies. This paper presents an advanced deep-learning methodology customized for the classification of road accidents using CCTV surveillance footage. This real-time dataset, comprising approximately 18,000 frames, has been amassed, which is pivotal for enabling comprehensive research in this field. This substantial dataset is the foundation for these investigative efforts, providing a rich and diverse source for conducting an in-depth analysis of the features. It has achieved a remarkable accuracy of 97% on this dataset through the strategic utilization of transfer learning in conjunction with LSTM (Long short-term memory) techniques. This accomplishment underscores the efficacy of our approach, combining the strengths of transfer learning and LSTM models, resulting in a highly accurate classification system for road accident events.

Keywords: accident, CCTV, footage, long short-term memory, surveillance

Procedia PDF Downloads 24
4003 A Rare Neck Trauma by Bicycle Handlebar in Road Traffic Accident

Authors: Parthasarathi Pramanik

Abstract:

Paediatric blunt abdominal trauma associated with superficial bruise, hematoma, or laceration and internal organ damage secondary to bicycle handlebar is widely documented in the literature. In this article, we have presented a case of bicycle handlebar inflicted fatal neck laceration in a road accident. The deceased sustained a horizontally placed laceration injury over the front and both sides of the middle third of neck (13 cm x 5-8 cm x 2-3.5 cm).The margins of the wound were irregular and focally abraded. The right corner of the injury was pointed whereas the left one was ended with a skin flap. Multiple graze abrasions, contusions and lacerations were found on different parts of body. Autopsy findings and other circumstantial evidences revealed that the victim died due to exsanguination because of severance of carotid artery and jugular vein of both sides. Analysis of the wound suggests the decease sustained the wound by the revolving bicycle handle bar while he had lost the balance.

Keywords: bicycle handle bar, neck injury, lacerated injury, road acident

Procedia PDF Downloads 286
4002 Immersive and Interactive Storytelling: Exploring Narratives and Online Multisensory Experience for Cultural Memory and Collective Awareness through Graphic Novel

Authors: Cristina Greco

Abstract:

The spread of the digital and we-based technologies has led to a transformation process, which has coincided with an increase in the number of cases who are beyond the mainstream storytelling and its codes on the interaction with the user. On the base of a previous research on i-docs and virtual museums, this study analyses interactive and immersive online Graphic Novel – one-page, animated, illustrated, and hybrid – to reflect on the transformational implications of this expressive form on the user perception, remembrance, and awareness. The way in which the user experiences a certain level of interaction with the story and immersion in the semantic and figurative universe would bring user’s attention, activating introspection and self-reflection processes, perception, imagination, and creativity. This would have to do with the involvement of different senses – visual, proprioceptive, tactile, auditory, and vestibular – and the activation of a phenomenon of synaesthesia (involuntary cross-modal sensory association) – where, for example, the aural reconnect the user to another sense, providing a multisensory experience. The case studies show specific forms of interactive and immersive graphic novel and reflect on application that has sought to engage innovative ways to communicate different messages and stimulate cultural memory and collective awareness. The visual semiotic and narrative analysis of the distinctive traits of such a complex textuality, along with a study of the user’s experience through observation in naturalistic settings and interviews, allows us to question the functioning of these configurations, with regard to the relationships between the figurative dimension, the perceptive activity, and their impact on the user’s engagement.

Keywords: collective awareness, cultural memory, graphic novel, interactive and immersive storytelling

Procedia PDF Downloads 119
4001 Smart Product-Service System Innovation with User Experience: A Case Study of Chunmi

Authors: Ying Yu, Wen-Chi Kuo, Tung-Jung Sung

Abstract:

The Product-Service System (PSS) has received widespread attention due to the increasing global competition in manufacturing and service markets. Today’s smart products and services are driven by Internet of things (IoT) technologies which will promote the transformation from traditional PSS to smart PSS. Although the smart PSS has some of technological achievements in businesses, it often ignores the real demands of target users when using products and services. Therefore, designers should know and learn the User Experience (UX) of smart products, services and systems. However, both of academia and industry still lack relevant development experience of smart PSS since it is an emerging field. In doing so, this is a case study of Xiaomi’s Chunmi, the largest IoT platform in the world, and addresses the two major issues: (1) why Chunmi should develop smart PSS strategies with UX; and (2) how Chunmi could successfully implement the strategic objectives of smart PSS through the design. The case study results indicated that: (1) the smart PSS can distinguish competitors by their unique UX which is difficult to duplicate; (2) early user engagement is crucial for the success of smart PSS; and (3) interaction, expectation, and enjoyment can be treated as a three-dimensional evaluation of UX design for smart PSS innovation. In conclusion, the smart PSS can gain competitive advantages through good UX design in the market.

Keywords: design, smart PSS, user experience, user engagement

Procedia PDF Downloads 106
4000 Diagnostic and Analysis of the Performance of Freight Transportation on Urban Logistics System in the City of Sfax

Authors: Tarak Barhoumi, Younes Boujelbene

Abstract:

Nowadays, the problems of freight transport pose logistical constraints on the urban system in the city. The aim of this article is to gain a better understanding of the interactions between local traffic and interurban traffic on the one hand and between the location system and the transport system on the other hand. Thus, in a simulation and analysis approach cannot be restricted to the only transport system. The proposed approach is based on an assessment of the impact of freight transport, which is closely linked to the diagnostic method, based on two surveys carried out on the territory of the urban community of Sfax. These surveys are based on two main components 'establishment component' first and 'driver component' second. The results propose a reorganization of freight transport in the city of Sfax. First, an orientation of the heavy goods vehicles traffic towards the major axes of transport namely the ring roads (ring road N° 2, ring road N° 4 and ring road N° 11) and the penetrating news of the city. Then, the implementation of a retail goods delivery policy and the strengthening of logistics in the city. The creation of a logistics zone at the ring road N° 11 where various modes of freight transport meet, in order to decongest the roads of heavy goods traffic, reduce the cost of transport and thus improve the competitiveness of the economy regional.

Keywords: urban logistics systems, transport freight, diagnostics, evaluation

Procedia PDF Downloads 132
3999 Formulation and Test of a Model to explain the Complexity of Road Accident Events in South Africa

Authors: Dimakatso Machetele, Kowiyou Yessoufou

Abstract:

Whilst several studies indicated that road accident events might be more complex than thought, we have a limited scientific understanding of this complexity in South Africa. The present project proposes and tests a more comprehensive metamodel that integrates multiple causality relationships among variables previously linked to road accidents. This was done by fitting a structural equation model (SEM) to the data collected from various sources. The study also fitted the GARCH Model (Generalized Auto-Regressive Conditional Heteroskedasticity) to predict the future of road accidents in the country. The analysis shows that the number of road accidents has been increasing since 1935. The road fatality rate follows a polynomial shape following the equation: y = -0.0114x²+1.2378x-2.2627 (R²=0.76) with y = death rate and x = year. This trend results in an average death rate of 23.14 deaths per 100,000 people. Furthermore, the analysis shows that the number of crashes could be significantly explained by the total number of vehicles (P < 0.001), number of registered vehicles (P < 0.001), number of unregistered vehicles (P = 0.003) and the population of the country (P < 0.001). As opposed to expectation, the number of driver licenses issued and total distance traveled by vehicles do not correlate significantly with the number of crashes (P > 0.05). Furthermore, the analysis reveals that the number of casualties could be linked significantly to the number of registered vehicles (P < 0.001) and total distance traveled by vehicles (P = 0.03). As for the number of fatal crashes, the analysis reveals that the total number of vehicles (P < 0.001), number of registered (P < 0.001) and unregistered vehicles (P < 0.001), the population of the country (P < 0.001) and the total distance traveled by vehicles (P < 0.001) correlate significantly with the number of fatal crashes. However, the number of casualties and again the number of driver licenses do not seem to determine the number of fatal crashes (P > 0.05). Finally, the number of crashes is predicted to be roughly constant overtime at 617,253 accidents for the next 10 years, with the worse scenario suggesting that this number may reach 1 896 667. The number of casualties was also predicted to be roughly constant at 93 531 overtime, although this number may reach 661 531 in the worst-case scenario. However, although the number of fatal crashes may decrease over time, it is forecasted to reach 11 241 fatal crashes within the next 10 years, with the worse scenario estimated at 19 034 within the same period. Finally, the number of fatalities is also predicted to be roughly constant at 14 739 but may also reach 172 784 in the worse scenario. Overall, the present study reveals the complexity of road accidents and allows us to propose several recommendations aimed to reduce the trend of road accidents, casualties, fatal crashes, and death in South Africa.

Keywords: road accidents, South Africa, statistical modelling, trends

Procedia PDF Downloads 130
3998 Sliding Mode Controller for Active Suspension System on a Passenger Car Model

Authors: Nouby M. Ghazaly, Ahmed O. Moaaz, Mostafa Makrahy

Abstract:

The main purpose of a car suspension system is to reduce the vibrations resulting from road roughness. The main objective of this research paper is to decrease vibration and improve passenger comfort through controlling car suspension system using sliding mode control techniques. The mathematical model for passive and active suspensions systems for quarter car model which subject to excitation from different road profiles is obtained. The active suspension system is synthesized based on sliding mode control for a quarter car model. The performance of the sliding mode control is determined through computer simulations using MATLAB and SIMULINK toolbox. The simulated results plotted in time domain, and root mean square values. It is found that active suspension system using sliding mode control improves the ride comfort and decrease vibration.

Keywords: quarter car model, active suspension system, sliding mode control, road profile

Procedia PDF Downloads 277
3997 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 252
3996 A Hybrid Recommendation System Based on Association Rules

Authors: Ahmed Mohammed Alsalama

Abstract:

Recommendation systems are widely used in e-commerce applications. The engine of a current recommendation system recommends items to a particular user based on user preferences and previous high ratings. Various recommendation schemes such as collaborative filtering and content-based approaches are used to build a recommendation system. Most of the current recommendation systems were developed to fit a certain domain such as books, articles, and movies. We propose a hybrid framework recommendation system to be applied on two-dimensional spaces (User x Item) with a large number of Users and a small number of Items. Moreover, our proposed framework makes use of both favorite and non-favorite items of a particular user. The proposed framework is built upon the integration of association rules mining and the content-based approach. The results of experiments show that our proposed framework can provide accurate recommendations to users.

Keywords: data mining, association rules, recommendation systems, hybrid systems

Procedia PDF Downloads 429
3995 Single Fly Over as a Solution to Congestion of Intersection Junction: Case Study of Jalan Jatingaleh Semarang

Authors: Rachmat Mudiyono, Siti Sumiati

Abstract:

In the next few years, traffic will happen most of the time. This was triggered by the growing rate of vehicles againts the road capacity which is not balance. All the time the congestion in the city of Semarang has been occured at peak hours. Congestion also occured in between Teuku Umar and Setia Budi road Jatingaleh because of a plot intersection (Kesatrian intersection, PLN intersection and Jatingaleh intersection) with the Toll Road. Jatingaleh is located in the southern city of Semarang which is a central meeting point between the upper and lower Semarang where the vehicle flows in through a combination of local current and regional traffic, and the flow of vehicles coming in and out from highway. The main cause of the problems that occurred in the area of Jatingaleh is due to the numbers of vehicles movement that occurs at the intersections. With the above issues, it is necessary to analyse the existing conditions and look into some solutions. Before carrying out an analysis of field surveys at peak hours for example morning (06:00 to 08:00 am) and for the afternoon (04:00 to 06:00 pm)should be conducted, then the number of vehicles is counted manually with “short-breakcounting” according to types of vehicles. From the analysis we found that the degree of saturation (DS) is 1.61 between Teuku Umar and Setia Budi road during the morning peak hours and 1.56 during the afternoon peak hours. This means that the capacity of the existing road is no longer able to accommodate the traffic flow. One of the solutions for the congestion that occurs at the intersection of Jatingaleh is to apply the efficiency of the intersection that is not in a plot with a Fly over, Underpass and the combination of Fly Over-Underpass. Base on the flow reduction calculation with 3 comparative modeling it shows that the Fly Over is the most technically efficient to be applied in this research.

Keywords: single fly over, congestion, intersection, interchange

Procedia PDF Downloads 364
3994 Emotion Classification Using Recurrent Neural Network and Scalable Pattern Mining

Authors: Jaishree Ranganathan, MuthuPriya Shanmugakani Velsamy, Shamika Kulkarni, Angelina Tzacheva

Abstract:

Emotions play an important role in everyday life. An-alyzing these emotions or feelings from social media platforms like Twitter, Facebook, blogs, and forums based on user comments and reviews plays an important role in various factors. Some of them include brand monitoring, marketing strategies, reputation, and competitor analysis. The opinions or sentiments mined from such data helps understand the current state of the user. It does not directly provide intuitive insights on what actions to be taken to benefit the end user or business. Actionable Pattern Mining method provides suggestions or actionable recommendations on what changes or actions need to be taken in order to benefit the end user. In this paper, we propose automatic classification of emotions in Twitter data using Recurrent Neural Network - Gated Recurrent Unit. We achieve training accuracy of 87.58% and validation accuracy of 86.16%. Also, we extract action rules with respect to the user emotion that helps to provide actionable suggestion.

Keywords: emotion mining, twitter, recurrent neural network, gated recurrent unit, actionable pattern mining

Procedia PDF Downloads 133
3993 Scheduling Method for Electric Heater in HEMS considering User’s Comfort

Authors: Yong-Sung Kim, Je-Seok Shin, Ho-Jun Jo, Jin-O Kim

Abstract:

Home Energy Management System (HEMS) which makes the residential consumers contribute to the demand response is attracting attention in recent years. An aim of HEMS is to minimize their electricity cost by controlling the use of their appliances according to electricity price. The use of appliances in HEMS may be affected by some conditions such as external temperature and electricity price. Therefore, the user’s usage pattern of appliances should be modeled according to the external conditions, and the resultant usage pattern is related to the user’s comfortability on use of each appliances. This paper proposes a methodology to model the usage pattern based on the historical data with the copula function. Through copula function, the usage range of each appliance can be obtained and is able to satisfy the appropriate user’s comfort according to the external conditions for next day. Within the usage range, an optimal scheduling for appliances would be conducted so as to minimize an electricity cost with considering user’s comfort. Among the home appliance, electric heater (EH) is a representative appliance which is affected by the external temperature. In this paper, an optimal scheduling algorithm for an electric heater (EH) is addressed based on the method of branch and bound. As a result, scenarios for the EH usage are obtained according to user’s comfort levels and then the residential consumer would select the best scenario. The case study shows the effects of the proposed algorithm compared with the traditional operation of the EH, and it also represents impacts of the comfort level on the scheduling result.

Keywords: load scheduling, usage pattern, user’s comfort, copula function, branch and bound, electric heater

Procedia PDF Downloads 555
3992 A Survey of Recognizing of Daily Living Activities in Multi-User Smart Home Environments

Authors: Kulsoom S. Bughio, Naeem K. Janjua, Gordana Dermody, Leslie F. Sikos, Shamsul Islam

Abstract:

The advancement in information and communication technologies (ICT) and wireless sensor networks have played a pivotal role in the design and development of real-time healthcare solutions, mainly targeting the elderly living in health-assistive smart homes. Such smart homes are equipped with sensor technologies to detect and record activities of daily living (ADL). This survey reviews and evaluates existing approaches and techniques based on real-time sensor-based modeling and reasoning in single-user and multi-user environments. It classifies the approaches into three main categories: learning-based, knowledge-based, and hybrid, and evaluates how they handle temporal relations, granularity, and uncertainty. The survey also highlights open challenges across various disciplines (including computer and information sciences and health sciences) to encourage interdisciplinary research for the detection and recognition of ADLs and discusses future directions.

Keywords: daily living activities, smart homes, single-user environment, multi-user environment

Procedia PDF Downloads 109
3991 Life Cycle Carbon Dioxide Emissions from the Construction Phase of Highway Sector in China

Authors: Yuanyuan Liu, Yuanqing Wang, Di Li

Abstract:

Carbon dioxide (CO2) emissions mitigation from road construction activities is one of the potential pathways to deal with climate change due to its higher use of materials, machinery energy consumption, and high quantity of vehicle and equipment fuels for transportation and on-site construction activities. Aiming to assess the environmental impact of the road infrastructure construction activities and to identify hotspots of emissions sources, this study developed a life-cycle CO2 emissions assessment framework covering three stages of material production, to-site and on-site transportation under the guidance of the principle of LCA ISO14040. Then streamlined inventory analysis on sub-processes of each stage was conducted based on the budget files from cases of highway projects in China. The calculation results were normalized into functional unit represented as ton per km per lane. Then a comparison between the amount of emissions from each stage, and sub-process was made to identify the major contributor in the whole highway lifecycle. In addition, the calculating results were used to be compared with results in other countries for understanding the level of CO2 emissions associated with Chinese road infrastructure in the world. The results showed that materials production stage produces the most of the CO2 emissions (for more than 80%), and the production of cement and steel accounts for large quantities of carbon emissions. Life cycle CO2 emissions of fuel and electric energy associated with to-site and on-site transportation vehicle and equipment are a minor component of total life cycle CO2 emissions from highway project construction activities. Bridges and tunnels are dominant large carbon contributor compared to the road segments. The life cycle CO2 emissions of road segment in highway project in China are slightly higher than the estimation results of highways in European countries and USA, about 1500 ton per km per lane. In particularly, the life cycle CO2 emissions of road pavement in majority cities all over the world are about 500 ton per km per lane. However, there is obvious difference between the cities when the estimation on life cycle CO2 emissions of highway projects included bridge and tunnel. The findings of the study could offer decision makers a more comprehensive reference to understand the contribution of road infrastructure to climate change, especially understand the contribution from road infrastructure construction activities in China. In addition, the identified hotspots of emissions sources provide the insights of how to reduce road carbon emissions for development of sustainable transportation.

Keywords: carbon dioxide emissions, construction activities, highway, life cycle assessment

Procedia PDF Downloads 235
3990 Numerical Analysis of Rainfall-Induced Roadside Slope Failures and Their Stabilizing Solution

Authors: Muhammad Suradi, Sugiarto, Abdullah Latip

Abstract:

Many roadside slope failures occur during the rainy season, particularly in the period of extreme rainfall along Connecting National Road of Salubatu-Mambi, West Sulawesi, Indonesia. These occurrences cause traffic obstacles and endanger people along and around the road. Research collaboration between P2JN (National Road Construction Board) West Sulawesi Province, who authorize to supervise the road condition, and Ujung Pandang State Polytechnic (Applied University) was established to cope with the landslide problem. This research aims to determine factors triggering roadside slope failures and their optimum stabilizing solution. To achieve this objective, site observation and soil investigation were carried out to obtain parameters for analyses of rainfall-induced slope instability and reinforcement design using the SV Flux and SV Slope software. The result of this analysis will be taken into account for the next analysis to get an optimum design of the slope reinforcement. The result indicates some factors such as steep slopes, sandy soils, and unvegetated slope surface mainly contribute to the slope failures during intense rainfall. With respect to the contributing factors as well as construction material and technology, cantilever/butressing retaining wall becomes the optimum solution for the roadside slope reinforcement.

Keywords: roadside slope, failure, rainfall, slope reinforcement, optimum solution

Procedia PDF Downloads 66
3989 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 134