5,128 research outputs found

    Stand Clear of the Closing Doors, Please: Transit Equity, Social Exclusion, and the New York City Subway

    Get PDF
    The history of transportation planning in New York City has created disparities between those who have sufficient access to the public transportation network, and those who face structural barriers to traveling from their home to education, employment, and healthcare opportunities. This thesis analyzes the legacy of discriminatory policy surrounding the Metropolitan Transportation Authority (MTA) and city and state governments that have failed to support vital infrastructure improvement projects and service changes to provide multi-modal welfare to New York’s working poor. By exploring issues of transit equity as they pertain to the New York City subway system, this thesis raises the question: which communities lack adequate access to public transit opportunity and what are the policies and historical developments that have created these inequities? Through examination of grassroots community-based movements towards social justice and transportation equity, this thesis will review the proposals, campaigns, and demands that citizen-driven organizations have fought for in New York City. These movements, I argue, are the most effective method to achieve greater transportation justice and intergenerational equity

    UAV tracking module proposal based on a regulative comparison between manned and unmanned aviation

    Get PDF
    Purpose: The aim of this study is twofold. First is to compare manned and unmanned aviation regulations in the context of ICAO Annexes to identify potential deficiencies in the international UAV legislations. Second is to propose a UAV monitoring module work flow as a solution to identified deficiencies in the international UAV regulations. Design/methodology: In the present study, firstly the regulations used in manned aviation were summarized in the context of ICAO Annexes. Then along with an overview of the use of UAVs, international UAV regulations have been reviewed with a general perspective. In addition, a comparison was made on whether contents of ICAO Annexes find a place in common international UAV regulations in order to understand areas to be developed in the international UAV regulations, and to better understand the different principles between manned and unmanned air transport. In the last section, we present a UAV tracking module (UAVTram) in line with the above-mentioned comparison between manned and unmanned aviation and the identified deficiencies in the international UAV regulations. Findings: The international UAV regulations should be developed on the basis of airport airspace use, detection, liabilities, sanctions of violations, and updating of regulation. Proposed UAVTram has potential to offer real-time tracking and detection of UAVs as a solution to malicious use of UAVs. Research limitations/implications: Our study is not exempt from limitations. Firstly, we didn’t review all UAV regulations because it needs a considerable amount of efforts to check out all the UAV regulations pertinent to different areas of the world. It is the same case for manned aviation as we used only ICAO Annexes to contextually compare with UAV regulations. Practical implications: From the practical perspective, studies introducing new technologies such as systems that help detection of remote pilots causing trouble and agile defense systems will give valuable insights to remove individual UAV threats. Originality/value: We didn’t find any study aiming to compare manned and unmanned aviation rules in search of finding potential deficiencies in the UAV regulations. Our study adopts such an approach. Moreover, our solution proposal here uses Bluetooth 5.0 technology mounted on stationary transmitters which provides more effective range with higher data transfer. Another advantage is that this work is projected to be supported by Turkish civil aviation authority, DGCA. This may accelerate efforts to make required real-time tests.Peer Reviewe

    The Journal of Conventional Weapons Destruction, Issue 24.2 (2020)

    Get PDF
    Editorial: HMA and COVID-19: A Donor\u27s Perspective Editorial: Time To Focus on Real Minefield Data Mine Action Information Management in Iraq and Northeast Syria IMAS 10.60 Update: Investigation and Reporting of Accidents and Incidents The Mine Free Sarajevo Project SALW in Bosnia and Herzegovina and the DRC Gender and Diversity in Mine Action Victim Assistance in Ukraine Landmines in the American Civil War Risk Education in Colombia R&D: The Odyssey2025 Projec

    Penetration Testing and Vulnerability Assessments: A Professional Approach

    Get PDF
    Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called “zero-day” exploits can be purchased on black markets and Advanced Persistent Threats (APTs) can lead to exfiltration of data over extended periods. Organisations wishing to ensure security of their systems may look towards adopting appropriate measures to protect themselves against potential security breaches. One such measure is to hire the services of penetration testers (or “pen-tester”) to find vulnerabilities present in the organisation’s network, and provide recommendations as to how best to mitigate such risks. This paper discusses the definition and role of the modern pen-tester and summarises current standards and professional qualifications in the UK. The paper further identifies issues arising from pen-testers, highlighting differences from what is generally expected of their role in industry to what is demanded by professional qualifications

    Quality not quantity: Conserving species of low mobility and dispersal capacity in south-western Australian urban remnants

    Get PDF
    Urban remnant vegetation is subject to varying degrees of disturbance that may or may not be proportional to the size of the patch. The impact of disturbance within patches on species with low mobility and dispersal capabilities was investigated in a survey targeting nemesiid species of the mygalomorph spider clade in the Perth metropolitan area, south-western Australia. Nemesiid presence was not influenced by patch size, but presence did negatively correlate with higher degrees of invasive grass and rabbit disturbance. Further, patch size was significantly positively correlated with degree of disturbance caused by rabbits. Compared with quadrats, patches were not as effective as sample units in determining the impact of disturbance on nemesiid presence

    Memory, History and the Representation of Urban Space in Post-war American Literature

    Get PDF
    This thesis investigates urban development and locational memory in New York and Los Angeles during the mid to late twentieth century, as represented both materially in the landscape of the city and textually in fiction and memoir. I begin my study in Raymond Chandler’s Los Angeles, where paved gardens and concretised river beds lie beneath the gridded urban landscape which hides the past and dislocates memory from what is visible in urban space. Next, through my analysis of Marshall Berman’s reflections on his childhood in the Bronx, I paint a picture of New York during the 1950s, during which the proposals of urban planner and master builder Robert Moses were put to work, dismantling many of the city’s pre-existing urban structures and its institutional memory. Subsequently I move to Los Angeles in the late 1960s, analysing two works of fiction by Joan Didion and Alison Lurie. In this chapter I explore California’s spatial and temporal indeterminacy. From imagined to remembered space, I next examine Didion’s family memoirs and personal essays in addition to D. J. Waldie’s reminiscences. I find that despite attempts to cultivate one’s personal history in textual form, a sense of loss is what is long remembered and hard to control. My thesis comes to a close with L. J. Davis and Paula Fox in the early 1970s when there was a new form of change afoot in the built environment in the form of gentrification. In the fragmented, automobile-dominated Los Angeles; in the dislocated Bronx; in California where the past seems to melt into air; and in brownstone Brooklyn, I show that the experience of what Sigmund Freud deems “the uncanny” is rife, appearing in the cracks between the absent and the present, the invisible and the visible, memory and history. The fissures and gaps in the narratives of each author reflect the various processes and consequences of the imposition of twentieth-century modernism in particular urban spaces during this period

    Host-based detection and analysis of Android malware: implication for privilege exploitation

    Get PDF
    The Rapid expansion of mobile Operating Systems has created a proportional development in Android malware infection targeting Android which is the most widely used mobile OS. factors such Android open source platform, low-cost influence the interest of malware writers targeting this mobile OS. Though there are a lot of anti-virus programs for malware detection designed with varying degrees of signatures for this purpose, many don’t give analysis of what the malware does. Some anti-virus engines give clearance during installations of repackaged malicious applications without detection. This paper collected 28 Android malware family samples with a total of 163 sample dataset. A general analysis of the entire sample dataset was created given credence to their individual family samples and year discovered. A general detection and classification of the Android malware corpus was performed using K-means clustering algorithm. Detection rules were written with five major functions for automatic scanning, signature enablement, quarantine and reporting the scan results. The LMD was able to scan a file size of 2048mb and report accurately whether the file is benign or malicious. The K-means clustering algorithm used was set to 5 iteration training phases and was able to classify accurately the malware corpus into benign and malicious files. The obtained result shows that some Android families exploit potential privileges on mobile devices. Information leakage from the victim’s device without consent and payload deposits are some of the results obtained. The result calls proactive measures rather than proactive in tackling malware infection on Android based mobile devices

    Application of the Fourth Industrial Revolution for High Volume Production in the Rail Car Industry

    Get PDF
    Some recent technological advances in line with the fourth industrial revolution (4IR) are rapidly transforming the industrial sector. This work explores the prospect of robotic and additive manufacturing solutions for mass production in the rail industry. It proposes a dual arm, 12-axis welding robot with advance sensors, camera, and algorithm as well as intelligent control system. The computer-aided design (CAD) of the robotic system was done in the Solidworks 2017 environment and simulated using the adaptive neuro-fuzzy interference system (ANFIS) in order to determine the kinematic motion of the robotic arm and the angles of joint. The simulation results showed the smooth motion of the robot and its suitability to carry out the welding operations for mass production of components during rail car manufacturing. In addition, the ability to fabricate several physical models directly from digital data through additive manufacturing (AM) is a key factor to ensuring rapid product development cycle. Given that AM is embedded in a digitally connected environment, flow of information as well as data processing and transmission in real time will be useful for massive turnout during mass production
    • …
    corecore