4 research outputs found

    Design of Multi Agent Based Crowd Injury Model

    Get PDF
    A major concern of many government agencies is to predict and control the behavior of crowds in different situations. Many times such gatherings are legal, legitimate, and peaceful. But there are times when they can turn violent, run out of control, result in material damages and even casualties. It then becomes the duty of governments to bring them under control using a variety of techniques, including non-lethal and lethal weapons, if necessary. In order to aid decision makers on the course of action in crowd control, there are modeling and simulation tools that can provide guidelines by giving programmed rules to computer animated characters and to observe behaviors over time in appropriate scenarios. A crowd is a group of people attending a public gathering, with some joint purpose, such as protesting government or celebrating an event. In some countries these kinds of activities are the only way to express public\u27s displeasure with their governments. The governments\u27 reactions to such activities may or may not be tolerant. For these reasons, such situations must be eliminated by recognizing when and how they occur and then providing guidelines to mitigate them. Police or military forces use non-lethal weapons (NLWs), such as plastic bullets or clubs, to accomplish their job. In order to simulate the results of such actions in a computer, there is a need to determine the physical effects of NLWs over the individuals in the crowd. In this dissertation, a fuzzy logic based crowd injury model for determining the physical effects of NLWs is proposed. Fuzzy logic concepts can be applied to a problem by using linguistic rules, which are determined by problem domain experts. In this case, a group of police and military officers were consulted for a set of injury model rules and those rules were then included in the simulation platform. As a proof of concept, a prototype system was implemented using the Repast Simphony agent based simulation toolkit. Simulation results illustrated the effectiveness of the simulation framework

    Parameter Optimization for Image Denoising Based on Block Matching and 3D Collaborative Filtering

    Get PDF
    Clinical MRI images are generally corrupted by random noise during acquisition with blurred subtle structure features. Many denoising methods have been proposed to remove noise from corrupted images at the expense of distorted structure features. Therefore, there is always compromise between removing noise and preserving structure information for denoising methods. For a specific denoising method, it is crucial to tune it so that the best tradeoff can be obtained. In this paper, we define several cost functions to assess the quality of noise removal and that of structure information preserved in the denoised image. Strength Pareto Evolutionary Algorithm 2 (SPEA2) is utilized to simultaneously optimize the cost functions by modifying parameters associated with the denoising methods. The effectiveness of the algorithm is demonstrated by applying the proposed optimization procedure to enhance the image denoising results using block matching and 3D collaborative filtering. Experimental results show that the proposed optimization algorithm can significantly improve the performance of image denoising methods in terms of noise removal and structure information preservation

    Finding Smoothness Area on the Topographic Maps for the Unmanned Aerial Vehicle's Landing Site Estimation

    No full text
    In this study, determining of the suitable landing areas on the topographical maps were determined for emergency landing of the Unmanned Air Vehicles (UAVs) during flight. In order to reach desired goals of this work, Shuttle radar topography mission maps (SRTM) was used. Nowodays, UA V have been intensively used in civillian and military applications. There are urgent needs on increasing of autonomy of the UAVs, decreasing human expertise and making smarter of UA V systems has become an inevitable necessity. Unexpectable stiuations (i.e. motor or comminatication failure, etc ... ) can arise while missions of the UAV. Emergency landing system must be activated by autonomously and then landed on the ground in safely while occuring some failure mentioned above. Two different techniques were chosed for determining probable landing areas by using digital elevation maps (SRTM). Firstly, surface fitting approximation was applied by using Least Squares Error (LSE). The slope of the points were calculated to specify of the smoothness rate of the landing areas. Smooth areas were signed by using SRTM datas. Image processing techniques were utilized for marking of the smooth areas and determinig boundries of the landing areas. The smooth landing areas were groupped with Blob analysis. The noise of the ground specified as landing areas were reduced with morphological image processing (performs morphological openning). UAVs system can be made smarter with specifying of the landing areas and planning of the path according to emergency cases. With designed systems, the UA V could be guided to the suitable landing zones vice versa undesirable areas by limiting of the landing path in the emergency cases of the UAV

    DEPHIDES: Deep Learning Based Phishing Detection System

    No full text
    In today’s digital landscape, the increasing prevalence of internet-connected devices, including smartphones, personal computers, and IoT devices, has enabled users to perform a wide range of daily activities such as shopping, banking, and communication in the online world. However, cybercriminals are capitalizing on the Internet’s anonymity and the ease of conducting cyberattacks. Phishing attacks have become a popular method for acquiring sensitive user information, including passwords, bank account details, social security numbers and more, often through social engineering and messaging tools. To protect users from such threats, it is essential to establish sophisticated phishing detection systems on computing devices. Many of these systems leverage machine learning techniques for accurate classification. In recent years, deep learning algorithms have gained prominence, especially when dealing with large datasets. This study presents the development of a phishing detection system based on deep learning, employing five different algorithms: artificial neural networks, convolutional neural networks, recurrent neural networks, bidirectional recurrent neural networks, and attention networks. The system primarily focuses on the fast classification of web pages using URLs. To assess the system’s performance, a relatively extensive dataset of labeled URLs, comprising approximately five million records, was collected and shared. The experimental results indicate that convolutional neural networks achieved the highest performance, boasting a detection accuracy of 98.74% for phishing attacks. This research underscores the effectiveness of deep learning algorithms, particularly in enhancing cybersecurity in the face of evolving cyber threats
    corecore