scholarly journals A zero-cost attention-based approach to promote cleaner streets

2020 ◽  
Author(s):  
Rita Abdel Sater ◽  
Mathilde Mus ◽  
Valentin Wyart ◽  
Coralie Chevallier

In an effort to inform interventions targeting littering behaviour, we estimate how much a change in trash-bag colour increases trash can visibility in Paris. To that end, we apply standard Signal Detection techniques to test how much changing trash-bag colour from grey to red affects subjects' detection rates. In three pre-registered studies (total N = 922), we find that changing trash bag colour from grey to red translates into a 28% increase in the perceived number of bins. This means that a zero-cost change of trash-bag colour from grey to red is equivalent to installing 8,400 additional bins in the city ofParis, in terms of perceived density. Replication studies investigating additional colour changes show that changing the colour from grey to either green or blue further increases visibility, with blue exhibiting the highest increase in visibility.

Author(s):  
John Paul Plummer ◽  
Anastasia Diamond ◽  
Alex Chaparro ◽  
Rui Ni

Hazard perception (HP) is an important aspect of driving performance and is associated with crash risk. In the current study, we investigate the effect of roadway environment (city vs. highway) and expertise on HP. HP was measured using HP clips that evaluated response lag (defined as the time from the participant’s response to the end of the clip) and fuzzy signal detection theory metrics of response criterion and sensitivity. Forty videos were used: 20 from highway environments and 20 from city environments. Forty-eight participants with a range of driving experience as assessed by the years since obtaining a license (less than 1 year to 24 years) completed the study. There were differences between city and highway environments in response lag and response bias; participants responded earlier to the hazards in the highway environment and exhibited a more liberal response bias. Driving experience was significantly correlated to response lag. When the video clips were categorized by environment, driving experience was only significantly correlated with performance for the city environment.


2005 ◽  
Vol 65 (1) ◽  
pp. 141-157 ◽  
Author(s):  
J. J. Ramírez ◽  
C. E. M. Bicudo

The vertical and diurnal variation of nitrogen and phosphorus forms, as well as that of soluble reactive silica (SRS), were studied in four sampling days at Garças reservoir, a shallow tropical one located in the city of São Paulo, in southeastern Brazil. Except for N-NH4, all other inorganic forms of nitrogen (N-NO2, N-NO3, and total N) demonstrated decreased concentrations toward the bottom of reservoir. Similarly, all showed significant diurnal differences on every sampling day, with increased values during the night due to absence of photosynthetic assimilation during that period. In the sampling days, these forms decreased on the spring sampling day due to the bloom of Microcystis registered during this period of the year. All three forms of phosphorus (SRP, particulate P, and total P) showed significant vertical variation, except on the fall sampling day. On the summer sampling day there was an increase of both total P and particulate P, the latter because it constitutes more than 70% of the total P during all sampling days. Hourly phosphorus variation was significant during all sampling days, except for the summer one. The SRS vertical variation was significant during all sampling days, except for that in the spring. It was also different hourly on sampling days.


Author(s):  
Zoha Asgharian ◽  
Hassan Asgharian ◽  
Ahmad Akbari ◽  
Bijan Raahemi

One of the main goals of employing Next Generation Networks (NGN) is an integrated access to the multimedia services like Voice over IP (VoIP), and IPTV. The primary signaling protocol in these multimedia services is Session Initiation Protocol (SIP). This protocol, however, is vulnerable to attacks, which may impact the Quality of Service (QoS), which is an important feature in NGN. One of the most frequent attacks is Denial of Service (DoS) attack, which is generated easily, but its detection is not trivial. In this chapter, a framework is proposed to detect Denial of Service attacks and a few other forms of intrusions, and then we react accordingly. The proposed detection engine combines the specification- and anomaly-based intrusion detection techniques. The authors set up a test-bed and generate a labeled dataset. The traffic generated for the test-bed is composed of two types of SIP packets: attack and normal. They then record the detection rates and false alarms based on the labeled dataset. The experimental results demonstrate that the proposed approach can successfully detect intruders and limit their accesses. The results also confirm that the framework is scalable and robust.


Author(s):  
Bilal Muhammad Khan ◽  
Rabia Bilal

Modulated signals used in communication systems exhibits cyclic periodicity. This is primarily due to sinusoidal product modulators, repeating preambles, coding and multiplexing in modern communication. This property of signals can be analyzed using cyclostationary analysis. SCF (Spectral correlation function) of cyclic autocorrelation (CAF) has unique features for different modulated signals and noise. Different techniques are applied to SCF for extracting features on the basis of which decision of detecting a signal or noise is made. In this chapter, study and analysis of different modulated signals used in satellite communication is presented using SCF. Also comparison of several signal detection techniques is provided on the basis of utilizing unique feature exhibit by a normalized vector calculated on SCF along frequency axis. Moreover a signal detection technique is also proposed which identifies the presence of a signal or noise in the analyzed data within the defined threshold limits.


2008 ◽  
Vol 117 (2) ◽  
pp. 163-170 ◽  
Author(s):  
Tom Wright ◽  
Josefin Nilsson ◽  
Christina Gerth ◽  
Carol Westall

1987 ◽  
Vol 41 (7) ◽  
pp. 1145-1147 ◽  
Author(s):  
E. Neil Lewis ◽  
Ira W. Levin

Raman spectroscopic data have been obtained with the use of direct current (dc) signal detection, an IBM PC/AT microcomputer, and commercially available software. Since photomultiplier currents of the order of nanoamps to microamps are readily attained for Raman emission under conditions of moderate laser excitation power levels (150–200 mW) and medium resolution spectral slits (1–4 cm−1), signal levels well within the domain measurable by dc signal detection techniques are achieved for a wide range of chemical and biochemical samples. Further, the digitization and signal averaging capabilities of generic data acquisition boards and microcomputers allow dc detection to yield signal-to-noise ratios competitive with those derived from complementary pulse-counting techniques.


2021 ◽  
Vol 2 (4) ◽  
pp. 1-23
Author(s):  
Ahmed Aleroud ◽  
Fan Yang ◽  
Sai Chaithanya Pallaprolu ◽  
Zhiyuan Chen ◽  
George Karabatis

Network traces are considered a primary source of information to researchers, who use them to investigate research problems such as identifying user behavior, analyzing network hierarchy, maintaining network security, classifying packet flows, and much more. However, most organizations are reluctant to share their data with a third party or the public due to privacy concerns. Therefore, data anonymization prior to sharing becomes a convenient solution to both organizations and researchers. Although several anonymization algorithms are available, few of them allow sufficient privacy (organization need), acceptable data utility (researcher need), and efficient data analysis at the same time. This article introduces a condensation-based differential privacy anonymization approach that achieves an improved tradeoff between privacy and utility compared to existing techniques and produces anonymized network trace data that can be shared publicly without lowering its utility value. Our solution also does not incur extra computation overhead for the data analyzer. A prototype system has been implemented, and experiments have shown that the proposed approach preserves privacy and allows data analysis without revealing the original data even when injection attacks are launched against it. When anonymized datasets are given as input to graph-based intrusion detection techniques, they yield almost identical intrusion detection rates as the original datasets with only a negligible impact.


Sign in / Sign up

Export Citation Format

Share Document