786 research outputs found

    Redundancy Effect of Vehicular Cloud’s Environment using Location Estimate (ReViSE)

    Get PDF
    The rapid growth of modern wireless technology increases the invention of new applications using the concept of Internet of Things (IoT). Vehicular Cloud, which is a concept introduced recently to use the vehicles sitting idle for hours as a processing devices, has been a hot topic. This subject became more popular after the Department of Transportation’s (DOT) announcement of mandatory wireless capabilities of each vehicle since 2015. We investigate the idea of benefiting from the unused processing power of vehicles sitting in parking lots for a long period of time (e.g. an airport, or train station). Moreover, researchers propose the concept of running the same job on several vehicles, to prevent the loss of jobs when a vehicle departures suddenly (quitting the assigned job). In this research, we study to reduce the redundancy effect by estimating how long a vehicle will stay in a specific parking lot, using information provided from the driver’s smartphone (e.g. flight ticket schedule, or train schedule). This allows the vehicle to save the assigned job and prepare for job switching. A smartphone app would be installed on the driver’s phone, without breaching the driver’s privacy, to inform the system of the estimated amount of time each car can be used. This information would be encrypted to prevent security attacks. Our results shows an enhancement in the performance compared to redundancy mechanism

    Security attacks on RECKLESS-APPs: Remote car keyless applications for new semi autonomous vehicles

    Get PDF
    Rapid technological advancements of vehicle manufacturing and the modern wireless technology opens the door for several new Intelligent Transportation applications. Remote Keyless system in vehicles is considered one of the famous applications that has been developed recently, which is susceptible to many cyberattacks. Remote Keyless applications on smartphones were developed in the past few years to perform the functionality of keyless fob and are expected to replace the physical keyless fobs in the next few years, which can open the door to many cyberattacks. In this research, we implemented a simulation that represents the REmote Car KeyLESS Applications (RECKLESS-apps) on the smartphones. In this thesis we demonstrate the types of cyber-attacks these applications could face. Our research serves as a proof that remote car keyless applications that would replace the physical keys could be vulnerable to various malicious cyber-attacks. We study these attacks and provide remedies, cyber-hygiene and best practices to remedy some of these attacks

    A christological foundation for a contextual liberation theology in Egypt : a comparative study between the christology of Dietrich Bonhoeffer and the christology of Justavo Gutierrez

    Get PDF
    Master's thesis in theology, VID Specialized University, Stavanger, May 2018submittedVersionMV 17 S

    Exploring higher education policy reforms in different contexts: A comparative study of Australia, Canada and Egypt.

    Get PDF
    This study is concerned with exploring higher education policy and reforms enacted by three diverse countries, Australia, Canada, and Egypt, to improve the quality of education and its relevancy to job market needs. The purpose of this study is to develop a better understanding of similarities and differences in context and motivations for reform and the subsequent results across the three countries and thus identify the lessons learned. This, in turn, will provide an answer to the prominent question of how can Egypt benefit from the higher education reform journeys undertaken by Australia and Canada. The study employs a “simultaneous comparative analysis,” following Bereday’s four–step method: description, interpretation, juxtaposition, and simultaneous comparison. It takes into account the socio-economic context, historical background, and cultural context of each of the three countries. Next, it explores the main higher education reform initiatives, challenges and results in each country. The main findings explored in this study reveal the urgent need for quality audit procedure to assess each institution’s effectiveness in achieving its goals. It also advocates for assuring and improving the quality of higher education through building self-regulating system. The findings also learn from the Australian experience in providing vocational and technical education, which focused on providing skills for the job market. The study concludes that a quality assurance system is more powerful than accreditation system, as it focuses on student learning outcomes. There is much to learn from policy and practice in Australia to maintain and assure quality. The study recommends conducting consultation with representatives of all stakeholders prior to the development of a new program in reference to the Canadian experiences. Moreover, the role of policy and decision makers must strengthen quality assurance system in the institution internally and from an authoritative agency externally. The study recommends that Egypt prioritizes the completion of accreditation of its all higher education institutions and revisit its admission policy to HE

    FRIEND: A Cyber-Physical System for Traffic Flow Related Information Aggregation and Dissemination

    Get PDF
    The major contribution of this thesis is to lay the theoretical foundations of FRIEND — A cyber-physical system for traffic Flow-Related Information aggrEgatioN and Dissemination. By integrating resources and capabilities at the nexus between the cyber and physical worlds, FRIEND will contribute to aggregating traffic flow data collected by the huge fleet of vehicles on our roads into a comprehensive, near real-time synopsis of traffic flow conditions. We anticipate providing drivers with a meaningful, color-coded, at-a-glance view of flow conditions ahead, alerting them to congested traffic. FRIEND can be used to provide accurate information about traffic flow and can be used to propagate this information. The workhorse of FRIEND is the ubiquitous lane delimiters (a.k.a. cat\u27s eyes) on our roadways that, at the moment, are used simply as dumb reflectors. Our main vision is that by endowing cat\u27s eyes with a modest power source, detection and communication capabilities they will play an important role in collecting, aggregating and disseminating traffic flow conditions to the driving public. We envision the cat\u27s eyes system to be supplemented by road-side units (RSU) deployed at regular intervals (e.g. every kilometer or so). The RSUs placed on opposite sides of the roadway constitute a logical unit and are connected by optical fiber under the median. Unlike inductive loop detectors, adjacent RSUs along the roadway are not connected with each other, thus avoiding the huge cost of optical fiber. Each RSU contains a GPS device (for time synchronization), an active Radio Frequency Identification (RFID) tag for communication with passing cars, a radio transceiver for RSU to RSU communication and a laptop-class computing device. The physical components of FRIEND collect traffic flow-related data from passing vehicles. The collected data is used by FRIEND\u27s inference engine to build beliefs about the state of the traffic, to detect traffic trends, and to disseminate relevant traffic flow-related information along the roadway. The second contribution of this thesis is the development of an incident classification and detection algorithm that can be used to classify different types of traffic incident Then, it can notify the necessary target of the incident. We also compare our incident detection technique with other VANET techniques. Our third contribution is a novel strategy for information dissemination on highways. First, we aim to prevent secondary accidents. Second, we notify drivers far away from the accident of an expected delay that gives them the option to continue or exit before reaching the incident location. A new mechanism tracks the source of the incident while notifying drivers away from the accident. The more time the incident stays, the further the information needs to be propagated. Furthermore, the denser the traffic, the faster it will backup. In high density highways, an incident may form a backup of vehicles faster than low density highways. In order to satisfy this point, we need to propagate information as a function of density and time

    Synthesis and X-ray Diffraction Study of Se79 Te20 Pb1 Chalcogen Glass

    Get PDF
    Chalcogenide glasses have received much attention from researchers during the last few years because of their interesting optical, electrical, dielectric, thermal, and physical properties by changing the composition such as wide transmission range, high refractive index, good chemical durability, optical switching, and from amorphous to crystalline phase transition. In this paper,  are taken in appropriate atomic weight percentages. Ternary Se₇₉Te₂ Pb₁ chalcogenide glass is prepared by conventional melt quenching technique. XRD method is used for the identification of crystalline materials. Thus, the absence of any sharp and prominent peak in the XRD pattern confirmed the amorphous nature of chalcogenide glass

    Do public health services in Egypt help young married women exercise their reproductive rights?

    Get PDF
    AbstractObjectiveTo assess supply and demand of family planning services from a reproductive rights perspective among young married women (YMW) in Egypt.MethodsData sources related to family planning included structured interviews with service providers (n=216); an inventory of equipment and supplies (n=40); exit interviews with YMW (n=147); and focus group discussions (n=12) with YMW, husbands, and mothers and/or mothers in law. YMW, husbands and mothers in law were not necessarily related.ResultsAlthough family planning services were readily available and affordable, YMW had limited access to information and services. Shortfalls were noted regarding respect for privacy, choice of family planning method, access to fertility services, and premarital counseling. Few YMW had sufficient autonomy to make informed reproductive decisions. Effective accountability mechanisms and processes for redress were also lacking.ConclusionImplementation of a rights-based approach and structural changes to family planning service delivery are recommended to empower YMW in Egypt to demand and exercise their reproductive rights

    Understanding married women\u27s vulnerability to HIV infection in Egypt: An exploratory study

    Get PDF
    This study examines the behavioral, sociocultural, economic, programmatic, and legal factors that aggravate Egyptian women’s vulnerabilities to HIV/AIDS. The study concludes that in low-prevalence settings like Egypt, targeted interventions are the most strategic and cost-effective: for example, HIV awareness-raising with a special focus on the preventive role of consistent, correct condom use, and creating a cadre of peers that could provide psychosocial support and HIV counseling to migrant workers. Furthermore, premarital and antenatal care programs should include HIV awareness-raising and provider-initiated counseling and testing after screening of women to identify those at risk for HIV infection. Concurrently, efforts should be made to empower women (e.g., through microloans or vocational training) as well as addressing inequitable gender norms and revisiting legislation and policies that discriminate against women and exacerbate their vulnerability to HIV

    Factors Affecting Employee Turnover at Architecture Engineering Construction Operations and Management (AECOM) Afghanistan

    Get PDF
    The objective of this study is to find out those factors that affect employee turnover and to also to find out the effect of those factors on employee turnover at AECOM, throughout our literature review we were able to find out four important factors pay, promotion, supervision and career growth that affects employee turnover the most. We used regression analysis, descriptive statistics, and quantitative approach through which we distributed a questionnaire among 73 employees of AECOM randomly which is our sample size to identify the effect of our independent variable on the dependent variable, using statistical analysis we find out that promotion and career growth both have a negative relationship with turnover and 2 other factors pay and supervision based on beta value are considered significant but has a positive relationship with employee turnover
    corecore