206 research outputs found

    Nature of the Moyar and Bhavani shear zones, with a note on its implication on the tectonics of the southern Indian Precambrian shield

    Get PDF
    The Moyar, Bhavani and Palghat-Cauvery shear zones have figured prominently in tectonic and metamorphic syntheses in the southern Indian Precambrian shield. Implicit in these studies is the assumption that in the Moyar shear zone in particular, transport has a large strike-slip component, with a dextral displacement of as high as 70 km. Detailed structural investigations in several key sectors and reconnaissance over a large terrane cast doubt on several aspects of the accepted tectonic model. Both the Moyar and the Bhavani shear zones are steeply-dipping thrusts, with the Moyar shear in particular characterized by a predominantly dip-slip transport. Such a movement on a subvertical plane striking EW could in no way rotate the northerly 'trends' to EW ones as believed by many worker. Further, the Moyar and Bhavani shear zones are neither as extensive nor as pervasive as envisaged. Veering of the 'trends' in southern Karnataka, northern Tamil Nadu and northern Kerala is an inherent feature of the superposed fold systems here. Isoclinal folds with axial planes of diverse attitudes, overprinted by upright folds of varying tightness, have resulted in this change in 'trend'

    IoT-based emergency vehicle services in intelligent transportation system

    Get PDF
    Emergency Management System (EMS) is an important component of Intelligent transportation systems, and its primary objective is to send Emergency Vehicles (EVs) to the location of a reported incident. However, the increasing traffic in urban areas, especially during peak hours, results in the delayed arrival of EVs in many cases, which ultimately leads to higher fatality rates, increased property damage, and higher road congestion. Existing literature addressed this issue by giving higher priority to EVs while traveling to an incident place by changing traffic signals (e.g., making the signals green) on their travel path. A few works have also attempted to find the best route for an EV using traffic information (e.g., number of vehicles, flow rate, and clearance time) at the beginning of the journey. However, these works did not consider congestion or disruption faced by other non-emergency vehicles adjacent to the EV travel path. The selected travel paths are also static and do not consider changing traffic parameters while EVs are en route. To address these issues, this article proposes an Unmanned Aerial Vehicle (UAV) guided priority-based incident management system to assist EVs in obtaining a better clearance time in intersections and thus achieve a lower response time. The proposed model also considers disruption faced by other surrounding non-emergency vehicles adjacent to the EVs’ travel path and selects an optimal solution by controlling the traffic signal phase time to ensure that EVs can reach the incident place on time while causing minimal disruption to other on-road vehicles. Simulation results indicate that the proposed model achieves an 8% lower response time for EVs while the clearance time surrounding the incident place is improved by 12%

    Information fusion-based cybersecurity threat detection for intelligent transportation system

    Get PDF
    Intelligent Transportation Systems (ITS) are sophisticated systems that leverage various technologies to increase the safety, efficiency, and sustainability of transportation. By relying on wireless communication and data collected from diverse sensors, ITS is vulnerable to cybersecurity threats. With the increasing number of attacks on ITS worldwide, detecting and addressing cybersecurity threats has become critically important. This need will only intensify with the impending arrival of autonomous vehicles. One of the primary challenges is identifying critical ITS assets that require protection and understanding the vulnerabilities that cyber attackers can exploit. Additionally, creating a standard profile for ITS is challenging due to the dynamic traffic pattern, which exhibits changes in the movement of vehicles over time. To address these challenges, this paper proposes an information fusion-based cybersecurity threat detection method. Specifically, we employ the Kalman filter for noise reduction, Dempster-Shafer decision theory and Shannon’s entropy for assessing the probabilities of traffic conditions being normal, intruded, and uncertain. We utilised Simulation of Urban Mobility (SUMO) to simulate the Melbourne CBD map and historical traffic data from the Victorian transport authority. Our simulation results reveal that information fusion with three sensor data is more effective in detecting normal traffic conditions. On the other hand, for detecting anomalies, information fusion with two sensor data is more efficient

    Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain

    Get PDF
    The development of cryptographic protocols goes through two stages, namely, security verification and performance analysis. The verification of the protocol’s security properties could be analytically achieved using threat modelling, or formally using formal methods and model checkers. The performance analysis could be mathematical or simulation-based. However, mathematical modelling is complicated and does not reflect the actual deployment environment of the protocol in the current state of the art. Simulation software provides scalability and can simulate complicated scenarios, however, there are times when it is not possible to use simulations due to a lack of support for new technologies or simulation scenarios. Therefore, this paper proposes a formal method and analytical model for evaluating the performance of security protocols using applied pi-calculus and Markov Chain processes. It interprets algebraic processes and associates cryptographic operatives with quantitative measures to estimate and evaluate cryptographic costs. With this approach, the protocols are presented as processes using applied pi-calculus, and their security properties are an approximate abstraction of protocol equivalence based on the verification from ProVerif and evaluated using analytical and simulation models for quantitative measures. The interpretation of the quantities is associated with process transitions, rates, and measures as a cost of using cryptographic primitives. This method supports users’ input in analysing the protocol’s activities and performance. As a proof of concept, we deploy this approach to assess the performance of security protocols designed to protect large-scale, 5G-based Device-to-Device communications. We also conducted a performance evaluation of the protocols based on analytical and network simulator results to compare the effectiveness of the proposed approach

    Sedimentational, structural and migmatitic history of the Archaean Dharwar tectonic province, southern India

    Get PDF
    The earliest decipherable record of the Dharwar tectonic province is left in the 3.3 Ga old gneissic pebbles in some conglomerates of the Dharwar Group, in addition to the 3.3–3.4 Ga old gneisses in some areas. A sialic crust as the basement for Dharwar sedimentation is also indicated by the presence of quartz schists and quartzites throughout the Dharwar succession. Clean quartzites and orthoquartzite-carbonate association in the lower part of the Dharwar sequence point to relatively stable platform and shelf conditions. This is succeeded by sedimentation in a rapidly subsiding trough as indicated by the turbidite-volcanic rock association. Although conglomerates in some places point to an erosional surface at the contact between the gneisses and the Dharwar supracrustal rocks, extensive remobilization of the basement during the deformation of the cover rocks has largely blurred this interface. This has also resulted in accordant style and sequence of structures in the basement and cover rocks in a major part of the Dharwar tectonic province. Isoclinal folds with attendant axial planar schistosity, coaxial open folds, followed in turn by non-coaxial upright folds on axial planes striking nearly N-S, are decipherable both in the "basement" gneisses and the schistose cover rocks. The imprint of this sequence of superposed deformation is registered in some of the charnockitic terranes also, particularly in the Biligirirangan Hills, Shivasamudram and Arakalgud areas. The Closepet Granite, with alignment of feldspar megacrysts parallel to the axial planes of the latest folds in the adjacent schistose rocks, together with discrete veins of Closepet Granite affinity emplaced parallel to the axial planes of late folds in the Peninsular Gneiss enclaves, suggest that this granite is late-tectonic with reference to the last deformation in the Dharwar tectonic province. Enclaves of tonalite and migmatized amphibolite a few metres across, with a fabric athwart to and overprinted by the earliest structures traceable in the supracrustal rocks as well as in a major part of the Peninsular Gneiss, point to at least one deformation, an episode of migmatization and one metamorphic event preceding the first folding in the Dharwar sequence. This record of pre-Dharwar deformation and metamorphism is corroborated also by the pebbles of gneisses and schists in the conglomerates of the Dharwar Group. Volcanic rocks within the Dharwar succession as well as some of the components of the Peninsular Gneiss give ages of about 3.0 Ga. A still younger age of about 2.6 Ga is recorded in some volcanic rocks of the Dharwar sequence, a part of the Peninsular Gneiss, Closepet Granite and some charnockites. These, together with the 3.3 Ga old gneisses and 3.4 Ga old ages of zircons in some charnockites, furnish evidence for three major thermal events during the 700 million year history of the Archaean Dharwar tectonic province

    Recurrent Pseudomonal Pneumonia

    Get PDF
    Community-acquired pneumonia due to Pseudomonas aeruginosa typically occurs in patients with pre-existing lung disease and immunocompromised individuals. We report the case of a previously healthy young adult who presented with recurrent episodes of pneumonia due to Pseudomonas aeruginosa complicated by pleural effusion. Careful and extensive evaluation ultimately revealed the unusual reason behind the patient’s illnes

    PENGARUH BEBAN KERJA DAN MOTIVASI KERJA TERHADAP KINERJA KARYAWAN PADA PT. BAJA KARYA UTAMA BEKASI

    Get PDF
    ABSTRAK Pada industri Mesin dan Perlengkapan YTDL banyak persaingan ketat yang membuat perusahaan harus memiliki beban kerja dan motivasi kerja yang mumpuni guna memenuhi target perusahaan yang sudah direncanakan. Tetapi kedua hal tersebut tidak dimiliki oleh PT. Baja Karya Utama yang menunjukkan penurunan dalam aspek kinerja karyawan. Menurunnya kinerja karyawan dikarenakan berbagai faktor, diantaranya beban kerja dan motivasi kerja. Penelitian ini akan menganalisis beban kerja dan motivasi kerja terhadap kinerja karyawan pada karyawan PT. Baja Karya Utama. Pendekatan penelitian akan menggunakan pendekatan kuantitatif dengan metode survei. Pada penelitian ini, populasi terdiri dari karyawan PT. Baja Karya Utama yang berjumlah 60 orang, sehingga teknik sampling yang digunakan adalah sampling jenuh dengan menjadikan keseluruhan populasi sebagai sampel. Hasil penelitian menunjukkan bahwa, secara parsial variabel beban kerja memberi pengaruh secara negatif sebesar 23,6% terhadap kinerja karyawan, variabel motivasi kerja memberi pengaruh secara positif sebesar 32,8% dan secara simultan variabel beban kerja dan variabel motivasi kerja memberi pengaruh terhadap kinerja karyawan sebesar 56,4%, sedangkan sisanya sebesar 43,6% dipengaruhi oleh variabel – variabel lain yang tidak diteliti. Kata Kunci : Beban Kerja, Motivasi Kerja, dan Kinerja Karyawa

    The nature of the basement in the Archaean Dharwar craton of southern India and the age of the Peninsular Gneiss

    Get PDF
    The Archaean Peninsular Gneiss of southern India is considered by a number of workers to be the basement upon which the Dharwar supracrustal rocks were deposited. However, the Peninsular Gneiss in its present state is a composite gneiss formed by synkinematic migmatization during successive episodes of folding (DhF1, DhF1a and DhF2) that affected the Dharwar supracrustal rocks. An even earlier phase of migmatization and deformation (DhF∗ ) is evident from relict fabrics in small enclaves of gneissic tonalites and amphibolites within the Peninsular Gneiss. We consider these enclaves to represent the original basement for the Dharwar supracrustal rocks. Tonalitic pebbles in conglomerates of the Dharwar Supergroup confirm the inference that the supracrustal rocks were deposited on a gneissic basement. Whole rock Rb-Sr ages of gneisses showing only the DhF1 structures fall in the range of 3100-3200 Ma. Where the later deformation (DhF2) has been associated with considerable recrystallization, the Rb-Sr ages are between 2500 Ma and 2700 Ma. Significantly, a new Rb-Sr analysis of tonalitic gneiss pebbles in the Kaldurga conglomerate of the Dharwar sequence is consistent with an age of ~2500 Ma and not that of 3300 Ma reported earlier by Venkatasubramanian and Narayanaswamy (1974). Pb-Pb ages based on direct evaporation of detrital zircon grains from the metasedimentary rocks of the Dharwar sequence fall into two groups, 3300-3100 Ma, and 2800-3000 Ma. Stratigraphic, structural, textural and geochronologic data, therefore, indicate that the Peninsular Gneiss of the Dharwar craton evolved over a protracted period of time ranging from > 3300 Ma to 2500 Ma
    • …
    corecore