10 research outputs found
Identification of Hazardous Road Locations for Pedestrians
AbstractHot zone methodology is promising in the identification of hazardous road locations. The key steps involve geo-validation of road crashes, segmentation of road network into basic spatial units (BSUs), calculation of actual crash intensity, definition of threshold value, and examination of spatial proximity of BSUs. This research applies the hot zone methodology to identify dangerous road locations for pedestrians during the study period of 2005 to 2007 in Kwun Tong District of Hong Kong. In particular, the crash intensity was calculated by a casualty-weighted method, which assigns different weights to different injury severity types. Two negative binomial regression models were employed to determine the threshold values. One could be treated as a base model which includes the length of BSU as the only explanatory variable. The other, regarded as a full model, introduces diverse environmental variables that might have influenced the distribution of pedestrian casualties
NaĂŻve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks
Ad-Hoc networks are becoming more popular due to their unique characteristics. As there is no centralized control, these networks are more vulnerable to various attacks, out of which Distributed Denial of Service (DDoS) attacks are considered as more severe attacks. DDoS attack detection and mitigation is still a challenging issue in Ad-Hoc Networks. The existing solutions consider the fixed or dynamic threshold value to detect the DDoS attacks without any trained data, and very few existing solutions use machine learning algorithms to detect these attacks. However, existing solutions are inefficient to handle when DDoS attackersâ perform this attack through bursty traffic, packet size, and fake packets flooding. We have proposed DDoS attack severity mitigation solution. Out DDoS mitigation solution consists of new network node authentication module and naĂŻve bayes classifier module to detect and isolate the DDoS attack traffic patterns. Our simulation results show that naĂŻve bayes DDoS attack traffic classification out performs in the hostile environment and secure the legitimate traffic from DDoS attack
Walkable City and Military Enclaves: Analysis and Decision-Making Approach to Support the Proximity Connection in Urban Regeneration
Accessibility and urban walkability are the cornerstones of urban policies for the contemporary city, which needs to be oriented towards sustainable development principles and models. Such aims are included in the objectives of the 2030 Agenda, as well as in the ambitious objectives of the âEuropean Green Dealâ. These concepts are closely linked to the paradigm of a sustainable cityâlivable, healthy and inclusiveâbased on a system of high-quality public spaces and on a network of services and infrastructures, both tangible and intangible, capable of strengthening and building new social, economic and environmental relationships. It is necessary to recognize potential opportunities for connection and permeability in consolidated urban environments. These are very often fragmented and are characterized by enclaves of very different kinds. Ghettoes and gated communities, old industrial plants and military installations and facilities, to cite a few, represent examples of cases where closures on urban fabrics are realized, impeding full walkability and accessibility. Within such a framework, the present research is aimed at focusing on a particular set of enclaves, such as those represented by the military sites being reconfigured to civilian use, a phenomenon that characterizes many urban areas in the world; in Europe; and in Italy, in particular, given the recent history and the Cold War infrastructure heritage. In such a sense, the city of Cagliari (Sardinia Island, Italy) represents an interesting case study as it is characterized by the presence of a series of military complexes; real âenclavesâ influencing the proximity connections; and, more generally, walkability. Building on previous research and analysis of policies and projects aimed at reintroducing, even partially, this military asset into civilian life (Green Barracks Project (GBP)-2019), this paper proposes and applies a methodology to evaluate the effects of urban regeneration on walkability in a flexible network logic, oriented to the â15 min cityâ model or, more generally, to the renewed, inclusive, safe âcity of proximityâ, resilient and sustainable
Development of a Remotely Accessible Wireless Testbed for Performance Evaluation of AMI Related Protocols
Although smart meters are deployed in many countries, the data collection process from smart meters in Smart Grid (SG) still has some challenges related to consumer privacy that needs to be addressed. Referred to as Advanced Metering Infrastructure (AMI), the data collected and transmitted through the AMI can leak sensitive information about the consumers if it is sent as a plaintext.
While many solutions have been proposed in the past, the deployment of these solutions in real-life was not possible since the actual AMIs were not accessible to researchers. Therefore, a lot of solutions relied on simulations which may not be able to capture the real performance of these solutions. In this thesis, two 802.11s wireless mesh-based SG AMI network testbeds are developed with Beaglebone Black and Raspberry Pi 3 boards to provide a baseline for the simulations. The Raspberry Pi 3 testbed is also configured to be remotely accessible
THREE TEMPORAL PERSPECTIVES ON DECENTRALIZED LOCATION-AWARE COMPUTING: PAST, PRESENT, FUTURE
Durant les quatre derniĂšres dĂ©cennies, la miniaturisation a permis la diffusion Ă large Ă©chelle des ordinateurs, les rendant omniprĂ©sents. Aujourdâhui, le nombre dâobjets connectĂ©s Ă Internet ne cesse de croitre et cette tendance nâa pas lâair de ralentir. Ces objets, qui peuvent ĂȘtre des tĂ©lĂ©phones mobiles, des vĂ©hicules ou des senseurs, gĂ©nĂšrent de trĂšs grands volumes de donnĂ©es qui sont presque toujours associĂ©s Ă un contexte spatiotemporel. Le volume de ces donnĂ©es est souvent si grand que leur traitement requiert la crĂ©ation de systĂšme distribuĂ©s qui impliquent la coopĂ©ration de plusieurs ordinateurs. La capacitĂ© de traiter ces donnĂ©es revĂȘt une importance sociĂ©tale. Par exemple: les donnĂ©es collectĂ©es lors de trajets en voiture permettent aujourdâhui dâĂ©viter les em-bouteillages ou de partager son vĂ©hicule. Un autre exemple: dans un avenir proche, les donnĂ©es collectĂ©es Ă lâaide de gyroscopes capables de dĂ©tecter les trous dans la chaussĂ©e permettront de mieux planifier les interventions de maintenance Ă effectuer sur le rĂ©seau routier. Les domaines dâapplications sont par consĂ©quent nombreux, de mĂȘme que les problĂšmes qui y sont associĂ©s. Les articles qui composent cette thĂšse traitent de systĂšmes qui partagent deux caractĂ©ristiques clĂ©s: un contexte spatiotemporel et une architecture dĂ©centralisĂ©e. De plus, les systĂšmes dĂ©crits dans ces articles sâarticulent autours de trois axes temporels: le prĂ©sent, le passĂ©, et le futur. Les systĂšmes axĂ©s sur le prĂ©sent permettent Ă un trĂšs grand nombre dâobjets connectĂ©s de communiquer en fonction dâun contexte spatial avec des temps de rĂ©ponses proche du temps rĂ©el. Nos contributions dans ce domaine permettent Ă ce type de systĂšme dĂ©centralisĂ© de sâadapter au volume de donnĂ©e Ă traiter en sâĂ©tendant sur du matĂ©riel bon marchĂ©. Les systĂšmes axĂ©s sur le passĂ© ont pour but de faciliter lâaccĂšs a de trĂšs grands volumes donnĂ©es spatiotemporelles collectĂ©es par des objets connectĂ©s. En dâautres termes, il sâagit dâindexer des trajectoires et dâexploiter ces indexes. Nos contributions dans ce domaine permettent de traiter des jeux de trajectoires particuliĂšrement denses, ce qui nâavait pas Ă©tĂ© fait auparavant. Enfin, les systĂšmes axĂ©s sur le futur utilisent les trajectoires passĂ©es pour prĂ©dire les trajectoires que des objets connectĂ©s suivront dans lâavenir. Nos contributions permettent de prĂ©dire les trajectoires suivies par des objets connectĂ©s avec une granularitĂ© jusque lĂ inĂ©galĂ©e. Bien quâimpliquant des domaines diffĂ©rents, ces contributions sâarticulent autour de dĂ©nominateurs communs des systĂšmes sous-jacents, ouvrant la possibilitĂ© de pouvoir traiter ces problĂšmes avec plus de gĂ©nĂ©ricitĂ© dans un avenir proche.
--
During the past four decades, due to miniaturization computing devices have become ubiquitous and pervasive. Today, the number of objects connected to the Internet is in- creasing at a rapid pace and this trend does not seem to be slowing down. These objects, which can be smartphones, vehicles, or any kind of sensors, generate large amounts of data that are almost always associated with a spatio-temporal context. The amount of this data is often so large that their processing requires the creation of a distributed system, which involves the cooperation of several computers. The ability to process these data is important for society. For example: the data collected during car journeys already makes it possible to avoid traffic jams or to know about the need to organize a carpool. Another example: in the near future, the maintenance interventions to be carried out on the road network will be planned with data collected using gyroscopes that detect potholes. The application domains are therefore numerous, as are the prob- lems associated with them. The articles that make up this thesis deal with systems that share two key characteristics: a spatio-temporal context and a decentralized architec- ture. In addition, the systems described in these articles revolve around three temporal perspectives: the present, the past, and the future. Systems associated with the present perspective enable a very large number of connected objects to communicate in near real-time, according to a spatial context. Our contributions in this area enable this type of decentralized system to be scaled-out on commodity hardware, i.e., to adapt as the volume of data that arrives in the system increases. Systems associated with the past perspective, often referred to as trajectory indexes, are intended for the access to the large volume of spatio-temporal data collected by connected objects. Our contributions in this area makes it possible to handle particularly dense trajectory datasets, a problem that has not been addressed previously. Finally, systems associated with the future per- spective rely on past trajectories to predict the trajectories that the connected objects will follow. Our contributions predict the trajectories followed by connected objects with a previously unmet granularity. Although involving different domains, these con- tributions are structured around the common denominators of the underlying systems, which opens the possibility of being able to deal with these problems more generically in the near future
IDENTIFICATION OF HIGH COLLISION LOCATIONS FOR THE CITY OF REGINA USING GIS AND POST-NETWORK SCREENING ANALYSIS
In 2010, the American Association of State Highway and Transportation Officials (AASHTO) released the first edition of the Highway Safety Manual (HSM). The HSM introduces a six-step safety management process which provides engineers with a systematic and scientific approach to managing road safety. The first step of this process, network screening, aims to identify the locations that will most benefit from a safety improvement program. The output obtained from network screening is simply a list of locations that have a high concentration of collisions, based on their potential for safety improvement. The ranking naturally tends to lead to the assumption that the most highly ranked locations are the obvious target locations where road authorities should allocate their often-limited road safety resources. Though these locations contain the highest frequency of collisions, they are often spatially unrelated, and scattered throughout the roadway network. Allocating safety resources to these locations may not be the most effective method of increasing road safety.
The purpose of this research is to investigate and validate a two-step method of post-network screening analysis, which identifies collision hotzones (i.e., groups of neighboring hotspots) on a road network. The first step is the network screening process described in the HSM. The second step is new and involves network-constrained kernel density estimation (KDE), a type of spatial analysis. KDE uses expected collision counts to estimate collision density, and outputs a graphical display that shows areas (referred to here as hotzones) with high collision densities. A particularly interesting area of application is the identification of high-collision corridors that may benefit from a program of systemic safety improvements. The proposed method was tested using five years of collision data (2005-2009) for the City of Regina, Saskatchewan. Three different network screening measures were compared: 1) observed collision counts, 2) observed severity-weighted collision counts, and 3) expected severity-weighted collision counts. The study found that observed severity-weighted collision counts produced a dramatic picture of the City's hotzones, but this picture could be misleading as it could be heavily influenced by a small number of severe collisions. The results obtained from the expected severity-weighted collision counts smoothed the effects of the severity-weighting and successfully reduced regression-to-the-mean bias. A comparison was made between the proposed approach and the results of the HSMâs existing network screening method. As the proposed approach takes the spatial association of roadway segments into account, and is not limited to single roadway segments, the identified hotzones capture a higher number of expected EPDO collisions than the existing HSM methodology. The study concludes that the proposed two-step method can help transportation safety professionals to prioritize hotzones within high-collision corridors more efficiently and scientifically.
Jurisdiction-specific safety performance functions (SPFs) were also developed over the course of this research, for both intersections (three-leg unsignalized, four-leg unsignalized, three and four-leg signalized), and roadway segments (major arterials, minor arterials, and collectors). These SPFs were compared to the base SPFs provided in the HSM, as well as calibrated HSM SPFs. To compare the different SPFs and find the best-fitting SPFs for the study region, the study used statistical goodness-of-fit (GOF) tests and cumulative residual (CURE) plots. Based on the results of this research, the jurisdiction-specific SPFs were found to provide the best fit to the data, and would be the best SPFs for predicting collisions at intersections and roadway segments in the City of Regina
Spatial Analysis for Crashes Involving 25- to 44- Year-Old Drivers in Kansas
In this study, a descriptive and spatial analysis was conducted using crash data, 2013-2017, for 25- to 44- year-old drivers involved in fatal and serious injury crashes that occurred in the state of Kansas. The database integrates crash characteristics, concerning factors like environment, human, roadway, socio-demographic, and vehicle data for all the counties in the state to explore and understand the relationships between fatal and serious injury crashes and potential contributing factors. To understand the trend of fatal and serious injury crashes over the study period, a series of descriptive analyses were performed, which showed crash characteristics analyzed in this study that followed similar trends to most of the past crash studies. This study included 891 fatal and 2491 serious injury crashes along with 19 potential explanatory variables that were analyzed using Ordinary Least Squares (OLS) Regression to identify statistically significant factors, along with hotspots and outliers, in various geographical locations. A spatial model was created using two statistically significant variables to predict the total number of fatal and serious injury crashes, which was validated with the actual 2018 crash data. This spatial analysis and modeling were performed using ArcGIS Pro Software. Most of the statistically significant fatal and serious injury crash hotspots were located in and around Sedgwick county and northeastern Kansas counties like Douglas, Johnson, Leavenworth, and Wyandotte. The model validation for the crashes that occurred in 2018 was underestimated by eight percent, which is considered an acceptable variance. This study is the extension of the previous work that analyzed teenage drivers and also adopted a similar research methodology
Secure and efficient routing in highly dynamic WLAN mesh networks
Recent advances in embedded systems, energy storage, and communication interfaces,
accompanied by the falling prices of WLAN routers and a considerable
increase in the throughput of a WLAN (IEEE 802.11), have facilitated the proliferation
of WLAN Mesh Network (WMN) applications. In addition to their
current deployments in less dynamic community networks, WMNs have become
a key solution in various highly dynamic scenarios. For instance, WMNs are intended
to interconnect self-organized, cooperative, and small Unmanned Aerial
Vehicles (UAVs) in a wide range of applications, such as emergency response, environmental
monitoring, and ad-hoc network provisioning. Nevertheless, WMNs
still face major security challenges as they are prone to routing attacks. Consequently,
the network can be sabotaged and, in the case of UAV-WMN-supported
missions, the attacker might manipulate payload data or even hijack UAVs.
Contemporary security standards, such as the IEEE 802.11i and the security
mechanisms of the IEEE 802.11s mesh standard, are vulnerable to routing attacks,
as experimentally shown in this research. Therefore, a secure routing
protocol is indispensable for making feasible the deployment of WMNs in critical
scenarios, such as UAV-WMN-assisted applications. As far as the author of
this thesis knows, none of the existing research approaches for secure routing in
WMNs have gained acceptance in practice due to their high overhead or strong
assumptions.
In this research, a new approach, which is called Position-Aware, Secure, and
Efficient mesh Routing (PASER), is proposed. This new proposal defeats more
attacks than the IEEE 802.11s/i security mechanisms and the well-known, secure
routing protocol Authenticated Routing for Ad-hoc Networks (ARAN), without
making restrictive assumptions. It is shown that PASER achieves âin realistic
UAV-WMN scenariosâ similar performance results as the well-established, nonsecure
routing protocols Hybrid Wireless Mesh Protocol (HWMP) combined with
the IEEE 802.11s security mechanisms. Two representative scenarios are considered:
(1) on-demand ubiquitous network access and (2) efficient exploration of
sizable areas in disaster relief. The performance evaluation results are produced
using an experimentally validated simulation model of WMNs, realistic mobility
patterns of UAVs, and an experimentally derived channel model for the air-to-air
WMN link between UAVs. The findings of this evaluation are justified by the
route discovery delay and the message overhead of the considered solutions