11 research outputs found

    Insight into the impact of COVID-19 on Australian transportation sector : an economic and community-based perspective

    Get PDF
    The Coronavirus Disease 2019 (COVID-19) is a major virus outbreak of the 21st century. The Australian government and local authorities introduced some drastic strategies and policies to control the outspread of this virus. The policies related to lockdown, quarantine, social distancing, shut down of educational institute, work from home, and international and interstate travel bans significantly affect the lifestyle of citizens and, thus, influence their activity patterns. The transport system is, thus, severely affected due to the COVID-19 related restrictions. This paper analyses how the transport system is impacted because of the policies adopted by the Australian government for the containment of the COVID-19. Three main components of the transport sector are studied. These are air travel, public transport, and freight transport. Various official sources of data such as the official website of the Australian government, Google mobility trends, Apple Mobility trends, and Moovit were consulted along with recently published research articles on COVID-19 and its impacts. The secondary sources of data include databases, web articles, and interviews that were conducted with the stakeholders of transport sectors in Australia to analyse the relationship between COVID-19 prevention measures and the transport system. The results of this study showed reduced demand for transport with the adoption of COVID-19 prevention measures. Declines in revenues in the air, freight, and public transport sectors of the transport industry are also reported. The survey shows that transport sector in Australia is facing a serious financial downfall as the use of public transport has dropped by 80%, a 31.5% drop in revenues earned by International airlines in Australia has been predicted, and a 9.5% reduction in the freight transport by water is expected. The recovery of the transport sector to the pre-pandemic state is only possible with the relaxation of COVID-19 containment policies and financial support by the government

    Environmental footprint assessment of a cleanup at hypothetical contaminated site

    Get PDF
    Contaminated site management is currently a critical problem area all over the world, which opens a wide discussion in the areas of policy, research and practice at national and international levels. Conventional site management and remediation techniques are often aimed at reducing the contaminant levels to an acceptable level in a short period of time at low cost. Owing to the fact that the conventional approach may not be sustainable as it overlooks many ancillary environmental effects, there is an immense need of “sustainable” or “green” approaches. Green approaches address environmental, social and economic impacts throughout the remediation process and are capable of conserving the natural resources and protecting air, water and soil quality through reduced emissions and other waste burdens. This paper presents a methodology to quantify the environmental footprint of a cleanup for a hypothetical contaminated site by using the US Environmental Protection Agency’s (EPA) Spreadsheet for Environmental Footprint Assessment (SEFA). The hypothetical contaminated site is selected from a metropolitan city of Pakistan and the environmental footprint of the cleanup is analyzed under three different scenarios: cleanup without any renewable energy sources at all, cleanup with a small share of renewable energy sources, and cleanup with a large share of renewable energy sources. It is concluded that integration of renewable energy sources into the remedial system design is a promising idea which can reduce CO2, NOx, SOx, PM and HAP emissions up to 68%

    Localization of sound sources : a systematic review

    Get PDF
    Sound localization is a vast field of research and advancement which is used in many useful applications to facilitate communication, radars, medical aid, and speech enhancement to but name a few. Many different methods are presented in recent times in this field to gain benefits. Various types of microphone arrays serve the purpose of sensing the incoming sound. This paper presents an overview of the importance of using sound localization in different applications along with the use and limitations of ad-hoc microphones over other microphones. In order to overcome these limitations certain approaches are also presented. Detailed explanation of some of the existing methods that are used for sound localization using microphone arrays in the recent literature is given. Existing methods are studied in a comparative fashion along with the factors that influence the choice of one method over the others. This review is done in order to form a basis for choosing the best fit method for our use

    A strong construction of S-box using Mandelbrot set an image encryption scheme

    Get PDF
    The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes

    A gabor filter-based protocol for automated image-based building detection

    Get PDF
    Detecting buildings from high-resolution satellite imagery is beneficial in mapping, environmental preparation, disaster management, military planning, urban planning and research purposes. Differentiating buildings from the images is possible however, it may be a time-consuming or complicated process. Therefore, the high-resolution imagery from satellites needs to be automated to detect the buildings. Additionally, buildings exhibit several different characteristics, and their appearance in these images is unplanned. Moreover, buildings in the metropolitan environment are typically crowded and complicated. Therefore, it is challenging to identify the building and hard tolocate them. To resolve this situation, a novel probabilistic method has been suggested using local features and probabilistic approaches. A local feature extraction technique was implemented, which was used to calculate the probability density function. The locations in the image were represented as joint probability distributions and were used to estimate their probability distribution function (pdf). The density of building locations in the image was extracted. Kernel density distribution was also used to find the density flow for different metropolitan cities such as Sydney (Australia), Tokyo (Japan), and Mumbai (India), which is useful for distribution intensity and pattern of facility point f interest (POI). The purpose system can detect buildings/rooftops and to test our system, we choose some crops with panchromatic high-resolution satellite images from Australia and our results looks promising with high efficiency and minimal computational time for feature extraction. We were able to detect buildings with shadows and building without shadows in 0.4468 (seconds) and 0.5126 (seconds) respectively

    A prototype of an energy-efficient MAGLEV train : a step towards cleaner train transport

    Get PDF
    The magnetic levitation (MAGLEV) train uses magnetic field to suspend, guide, and propel vehicle onto the track. The MAGLEV train provides a sustainable and cleaner solution for train transportation by significantly reducing the energy usage and greenhouse gas emissions as compared to traditional train transportation systems. In this paper, we propose an advanced control mechanism using an Arduino microcontroller that selectively energizes the electromagnets in a MAGLEV train system to provide dynamic stability and energy efficiency. We also design the prototype of an energy-efficient MAGLEV train that leverages our proposed control mechanism. In our MAGLEV train prototype, the levitation is achieved by creating a repulsive magnetic field between the train and the track using magnets mounted on the top-side of the track and bottom-side of the vehicle. The propulsion is performed by creating a repulsive magnetic field between the permanent magnets attached on the sides of the vehicle and electromagnets mounted at the center of the track using electrodynamic suspension (EDS). The electromagnets are energized via a control mechanism that is applied through an Arduino microcontroller. The Arduino microcontroller is programmed in such a way to propel and guide the vehicle onto the track by appropriate switching of the electromagnets. We use an infrared-based remote-control device for controlling the power, speed, and direction of the vehicle in both the forward and the backward direction. The proposed MAGLEV train control mechanism is novel, and according to the best of our knowledge is the first study of its kind that uses an Arduino-based microcontroller system for control mechanism. Experimental results illustrate that the designed prototype consumes only 144 W-hour (Wh) of energy as compared to a conventionally designed MAGLEV train prototype that consumes 1200 Wh. Results reveal that our proposed control mechanism and prototype model can reduce the total power consumption by 8.3 x as compared to the traditional MAGLEV train prototype, and can be applied to practical MAGLEV trains with necessary modifications. Thus, our proposed prototype and control mechanism serves as a first step towards cleaner engineering of train transportation systems

    Autonomous UAV path-planning optimization using metaheuristic approach for predisaster assessment

    No full text
    In this article, different state-of-the-art metaheuristic algorithms are analyzed to incorporate the collision-free path-planning approach for UAVs in a disaster situation. The efficient path planning is used to identify the main cause of disaster like bushfires that are badly affecting the forest ecosystem throughout the globe. This novel approach is a first step toward a predisaster assessment and possibilities to save the survivors in minimal time. Different metaheuristic algorithms, such as PSO, GWO, WOA, BMO, and DGBCO, are compared for UAV path optimization capability. In order to test the robustness of our proposed model, four different scenarios are presented which include general environment, condense environment, maze environment, and dynamic environment. In each scenario, the obstacles are placed in such a way to increase the overall path complexity for a UAV to reach the destination. The exploration and exploitation groups working simultaneously in a dynamic environment make it effective for UAV path planning using the DGBCO algorithm. Based on the parameters selected, the DGBCO algorithm outperforms other algorithms and achieves 24.5% less transportation cost and 13.3% less computational time. Hence, DGBCO can be efficiently applied for UAV path-planning optimization in any of the aforementioned environments

    A hybrid deep learning approach for bottleneck detection in IoT

    No full text
    Cloud computing is perhaps the most enticing innovation in the present figuring situation. It gives an expense-effective arrangement by diminishing the enormous forthright expense of purchasing equipment foundations and processing power. Fog computing is an additional help to cloud infrastructure by utilizing a portion of the less-registered undertaking at the edge devices, reducing the end client's reaction time, such as IoT. However, most of the IoT devices are resource-constrained, and there are many devices that cyber attacks could target. Cyber-attacks such as bottleneck, Dos, DDoS, and botnets are still significant threats in the IoT environment. Botnets are currently the most significant threat on the internet. A set of infected systems connected online and directed by an adversary to carry out malicious actions without authorization or authentication is known as a botnet. A botnet can compromise the system and steal the data. It can also perform attacks, like Phishing, spamming, and more. To overcome the critical issue, we exhibit a novel botnet attack detection approach that could be utilized in fog computing situations to dispense with the attack using the programmable nature of the software-defined network (SDN) environment. We carefully tested the most recent dataset for our proposed technique, standard and extended performance evaluation measures, and current DL models. To further illustrate overall performance, our findings are cross-validated. The proposed method performs better than previous ones in correctly identifying 99.98% of multi-variant sophisticated bot attacks. Additionally, the time of our suggested method is 0.022(ms), indicating good speed efficiency results

    Energy harvesting and stability analysis of centralized TEG system under non-uniform temperature distribution

    No full text
    Thermoelectric generator (TEG) systems are gaining much attraction due to utility in heat recovery, surface cooling, concentrated solar thermal, and sensor applications. In series–parallel configurations, TEG modules due to Heterogeneous temperature difference (HeTD) show the non-linear behavior. Due to non-uniform temperature distribution (NUTD), multiple maximum power points (MPP) appears on the P-V curve. It is crucial to drive the system at true global maximum power point (GMPP) among multiple MPP's. Existing classical techniques exhibit slow tracking, low efficiency, and undesired fluctuation in output voltage transients. To address these shortcomings our control technique based on improved Moth Flame Optimization (IMFO) is employed for the maximum power point tracking (MPPT) control under dynamic operating conditions. Comparison of the proposed technique is made with other well-known meta-heuristic techniques including particle swarm optimization (PSO), cuckoo search (CS), Artificial Bee Colony (ABC), and recently developed Dragon Fly Optimization (DFO). The comprehensive case studies with statistical and quantitative analysis are performed to confirm the superior performance of IMFO for NUTD condition, fast varying temperature condition, and stochastic operations. To experimentally validate the performance of the IMFO algorithm a low-cost TEG emulator setup is designed. The IMFO based control is implemented on a low-cost microcontroller achieving effective real-time control application in hardware. The proposed IMFO algorithm attains up to 6 W more power and takes 59% less time to track and settle at GMPP with minimum fluctuation. Results also validate that IMFO extracts 5.2% more electrical energy in comparison to competing techniques. In light of comprehensive analysis, it is safe to conclude that the proposed IMFO performs excellently for TEG MPPT control

    Optimizing UAV path for disaster management in smart cities using metaheuristic algorithms

    No full text
    In this research, different state-of-the-art metaheuristic algorithms are examined in order to incorporate a collision-free path planning technique for Unmanned Air Vehicles (UAV) in crisis situations. The effective path planning is utilized to identify the major cause of disasters such as bushfires, which are wreaking havoc on the global forest environment. This new approach is a first step toward a predisaster evaluation and options for saving survivors in a shorter amount of time. For UAV path optimization, a novel meta-heuristic algorithm i.e. Smart Flower Optimization Algorithm (SFOA) is presented. Comparison is made between different metaheuristic algorithms such as Particle Swarm Optimization (PSO), Flower Pollination Algorithm (FPA) and Grasshopper Optimization (GHO). Four different scenarios are offered to demonstrate the resilience of our proposed model that are dynamic environment (DE), general environment (GE), condensed environment (CE) and maze environment (ME). The barriers in each scenario are put in such a way that the overall path complexity for a UAV to reach the destination is increased. In SFOA, two growth methods are controlled on the movement of immature flower and mathematical modelling is used to update particles position. The SFOA method beats other algorithms based on the parameters chosen, saving up to 24.5% in transportation costs and 13.3% in computational time. As a result, SFOA can be used to optimize UAV path planning in any of the foregoing environment
    corecore