7 research outputs found

    Risk Factors for Construction Workforce Safety towards Sustainability

    Get PDF
    This research article is based on the identification of safety risk factors associated with construction projects in Pakistan related with the China-Pakistan economic corridor (CPEC). In this paper, four construction sites have been targeted from Sindh, Punjab, Khyber Pakhtunkhwa, and Baluchistan province of Pakistan. The research was based on quantitative mode where the questionnaire survey was adopted for data collection and analysed statistically. The targeted respondents were 400 CPEC construction workforces from four different targeted sites in Pakistan. The collected data was analysed using descriptive statistical methods of Statistical Package of Social Sciences (SPSS) 23.0 software. According to the findings, it has been specified that the respondents from all four targeted construction sites in Pakistan has considered three major safety risk factors such as administrative, personal protective equipment (PPE) and workforce safety. Risk factors for administrative is between 1.06 and 2.65 (low level to moderate level), for PPE is between 1.06 and 2.65 (low level to moderate level) and for workforce safety is between 2.4 and 3.60 (moderate level to high Level). Meanwhile, the safety experts have been indicated the lack of proper training & PPE equipment’s, falling from height and falling object hazards are as the major cause of injuries at Pakistani construction sites related with CPEC projects. The findings of this study will be the catalyst for the CPEC projects in Pakistan to minimize the safety and health concern among construction industry workforce

    The effects of using variable lengths for degraded signal acquisition in GPS receivers

    Get PDF
    The signal acquisition in GPS receivers is the first and very crucial process that may affect the overall performance of a navigation receiver. Acquisition program initiates a searching operation on received navigation signals to detect and identify the visible satellites. However, signal acquisition becomes a very challenging task in a degraded environment (i.e, dense urban) and the receiver may not be able to detect the satellites present in radio-vicinity, thus cannot estimate an accurate position solution. In such environments, satellite signals are attenuated and fluctuated due to fading introduced by Multipath and NLOS reception. To perform signal acquisition in such degraded environments, larger data accumulation can be effective in enhancing SNR, which tradeoff huge computational load, prolonged acquisition time and high cost of receiver. This paper highlights the effects of fading on satellite signal acquisition in GPS receiver through variable data lengths and SNR comparison, and then develops a statistical relationship between satellite visibility and SNR. Furthermore it also analyzes/investigates the tradeoff between computation load and signal data length

    Data Augmentation Based Malware Detection using Convolutional Neural Networks

    Get PDF
    Recently, cyber-attacks have been extensively seen due to the everlasting increase of malware in the cyber world. These attacks cause irreversible damage not only to end-users but also to corporate computer systems. Ransomware attacks such as WannaCry and Petya specifically targets to make critical infrastructures such as airports and rendered operational processes inoperable. Hence, it has attracted increasing attention in terms of volume, versatility, and intricacy. The most important feature of this type of malware is that they change shape as they propagate from one computer to another. Since standard signature-based detection software fails to identify this type of malware because they have different characteristics on each contaminated computer. This paper aims at providing an image augmentation enhanced deep convolutional neural network (CNN) models for the detection of malware families in a metamorphic malware environment. The main contributions of the paper's model structure consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a convolutional neural network model. In the first component, the collected malware samples are converted binary representation to 3-channel images using windowing technique. The second component of the system create the augmented version of the images, and the last component builds a classification model. In this study, five different deep convolutional neural network model for malware family detection is used.Comment: 18 page

    Precision Agriculture using Internet of thing with Artificial intelligence: A Systematic Literature Review

    Get PDF
    Machine learning with its high precision algorithms, Precision agriculture (PA) is a new emerging concept nowadays. Many researchers have worked on the quality and quantity of PA by using sensors, networking, machine learning (ML) techniques, and big data. However, there has been no attempt to work on trends of artificial intelligence (AI) techniques, dataset and crop type on precision agriculture using internet of things (IoT). This research aims to systematically analyze the domains of AI techniques and datasets that have been used in IoT based prediction in the area of PA. A systematic literature review is performed on AI based techniques and datasets for crop management, weather, irrigation, plant, soil and pest prediction. We took the papers on precision agriculture published in the last six years (2013-2019). We considered 42 primary studies related to the research objectives. After critical analysis of the studies, we found that crop management; soil and temperature areas of PA have been commonly used with the help of IoT devices and AI techniques. Moreover, different artificial intelligence techniques like ANN, CNN, SVM, Decision Tree, RF, etc. have been utilized in different fields of Precision agriculture. Image processing with supervised and unsupervised learning practice for prediction and monitoring the PA are also used. In addition, most of the studies are forfaiting sensory dataset to measure different properties of soil, weather, irrigation and crop. To this end, at the end, we provide future directions for researchers and guidelines for practitioners based on the findings of this revie

    Data augmentation based malware detection using convolutional neural networks

    Get PDF
    Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentationmethods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNNmodel formalware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory

    A Digital Camera-Based Rotation-Invariant Fingerprint Verification Method

    No full text
    Fingerprint registration and verification is an active area of research in the field of image processing. Usually, fingerprints are obtained from sensors; however, there is recent interest in using images of fingers obtained from digital cameras instead of scanners. An unaddressed issue in the processing of fingerprints extracted from digital images is the angle of the finger during image capture. To match a fingerprint with 100% accuracy, the angles of the matching features should be similar. This paper proposes a rotation and scale-invariant decision-making method for the intelligent registration and recognition of fingerprints. A digital image of a finger is taken as the input and compared with a reference image for derotation. Derotation is performed by applying binary segmentation on both images, followed by the application of speeded up robust feature (SURF) extraction and then feature matching. Potential inliers are extracted from matched features by applying the M-estimator. Matched inlier points are used to form a homography matrix, the difference in the rotation angles of the finger in both the input and reference images is calculated, and finally, derotation is performed. Input fingerprint features are extracted and compared or stored based on the decision support system required for the situation

    Novel Protection Coordination Scheme for Active Distribution Networks

    No full text
    Distribution networks are inherently radial and passive owing to the ease of operation and unidirectional power flow. Proper installation of Distributed Generators, on the one hand, makes the utility network active and mitigates certain power quality issues e.g., voltage dips, frequency deviations, losses, etc., but on the other hand, it disturbs the optimal coordination among existing protection devices e.g., over-current relays. In order to maintain the desired selectivity level, such that the primary and backup relays are synchronized against different contingencies, it necessitates design of intelligent and promising protection schemes to distinguish between the upstream and downstream power flows. This research proposes exploiting phase angle jump, an overlooked voltage sag parameter, to add directional element to digital over-current relays with inverse time characteristics. The decision on the direction of current is made on the basis of polarity of phase angle jump together with the impedance angle of the system. The proposed scheme at first is evaluated on a test system in a simulated environment under symmetrical and unsymmetrical faults and, secondly, as a proof of the concept, it is verified in real-time on a laboratory setup using a Power Hardware-in-loop (PHIL) system. Moreover, a comparative analysis is made with other state-of-the-art techniques to evaluate the performance and robustness of the proposed approach
    corecore