Premium Essay

Various Accident Detection Technologies and Recovery Systems with Victim Analysis Ieee

In: Computers and Technology

Submitted By gshanmukh
Words 1530
Pages 7
VARIOUS ACCIDENT DETECTION
TECHNOLOGIES
AND
RECOVERY SYSTEMS WITH
VICTIM ANALYSIS
Presented By
Ch. Ramya Keerthi1, G. Shanmukh 2, Dr. R. Sivaram 3
1. B.Tech Student ,Dept. of ECE, St. Mary’s Women’s Engineering College
2. B.Tech Student, Dept. of ECE, Acharya Nagarjuna University
3. Principal, St. Mary’s Women’s Engineering College

Paper ID: ICCSIE202013
The World Academy of Research in Science and Engineering

International Conference on Computer Science and Information Engineering
(ICCSIE 2013)
May 24, 2013, Venue: Solitaire Hotel, Bangalore, India

CONTENTS
MOTIVATION
CONCLUSION

OUR ADD-ON

OUTLINE OF
APPROACH

INTRODUCTION

LETS SOLVE
THE PROBLEM

APPROACH TO
PROBLEM

MOTIVATION

Increase in
Death Ratio due to
Accidents

Unable to
Know the
Victims
Condition

Unable to provide assistance in unpopulated areas

INTRODUCTION

Cont..

INTRODUCTION

Indian roads alone accounted for approximately 105,000 accidental fatalities in 2010.

Almost 15 % of the global road fatalities when
India has just 1 percent of the total global vehicles.

Increasing trend during the decade of 2000-2010 with an increase of 50 percent in the year
2010 as compared to the year 2000.

INTRODUCTION
This survey shows number of deaths due to accidents according to 2010

15409

15337

15099

14063

TAMIL NADU

ANDHRA PRADESH

UTTAR PRADESH

MAHARASTRA

7479

6490

4008

DELHI

BANGALORE

MUMBAI

Cont..

STATISTICS AT A GLANCE

85% of all road accidents occur in Asia pacific region.

India occupies second place with 10% of total road accidents in world.

Social cost of accidents is estimated at $11,000.

Nearly 1,275,000 persons are injured in road accident.

Most of the accidents are occurring due to lack of professional drivers and positive driving culture.…...

Similar Documents

Free Essay

Intrusion Detection Systems

...Intrusion Detection Systems CMIT368 August 12, 2006 Introduction As technology has advanced, information systems have become an integral part of every day life. In fact, there are not too many public or private actions that can take part in today’s society that do not include some type of information system at some level or another. While information systems make our lives easier in most respects, our dependency upon them has become increasingly capitalized upon by persons with malicious intent. Therefore, security within the information systems realm has introduced a number of new devices and software to help combat the unfortunate results of unauthorized network access, identity theft, and the like – one of which is the intrusion detection system, or IDS. Intrusion detection systems are primarily used to detect unauthorized or unconventional accesses to systems and typically consist of a sensor, monitoring agent (console), and the core engine. The sensor is used to detect and generate the security events, the console is used to control the sensor and monitor the events/alarms it produces, and the engine compares rules against the events database generated by the sensors to determine which events have the potential to be an attack or not (Wikipedia, 2006, para. 1-3). IDS generally consist of two types – signature-based and anomaly-based. Signature-based IDS operate by comparing network traffic against a known database of attack categories. In......

Words: 1749 - Pages: 7

Premium Essay

Comparative Analysis of Various Cloud Technologies

...Computers & Technology Volume 1 No.1 Dec. 2011 Comparative Analysis of Various Cloud Technologies Dr. Gurdev Singh Professor and Head Department of Computer science & Engineering Adesh Institute of Engineering & Technology Faridkot (India) Akanksha Lecturer Department of Computer science & Engineering Adesh Institute of Engineering & Technology Faridkot (India) singh.gndu@gmail.com 1. ABSTRACT With the increasing prevalence and demand of large scale cloud computing environment, a researcher has to draw more attention towards the services provided by the CLOUD. As the access to the server is increasing, centralized and distributed computing architecture will produce bottlenecks data which affect the quality of cloud computing services and bring the huge support to users. In this paper we are going to propose certain vital aspects such as memory utilization, storage capacity to check the efficiency and performance of various clouds in cloud computing environment. This is based upon the static data. The proposed mechanism enables users to access memories in various systems depending on the predefined criteria. Selection method for accessing the memory of a resource is properly introduced in this paper. Our evaluation results show that the aggregation of various clouds is effective in indicating the better efficiency and also to reduce network traffic sent over cloud networks. er.akanksha1988@gmail.com WAN networking. The interlinking and connection between......

Words: 2356 - Pages: 10

Free Essay

Distributed Intrusion Detection Using Mobile Agent in Distributed System

...Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA) Distributed Intrusion Detection using Mobile Agent in Distributed System Kuldeep Jachak University of Pune, P.R.E.C Loni, Pune, India Ashish Barua University of Pune, P.R.E.C Loni, Delhi, India ABSTRACT Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. This paper presents DIDS based on Mobile agents and band width consumed by the Mobile Agent for intrusion detection. information it receives from each of the monitors. Some of the issues with the existing centralized ID models are:  Additions of new hosts cause the load on the......

Words: 2840 - Pages: 12

Free Essay

Credit Disbursement and Loan Recovery System

...Transmittal 8th OCTOBER, 2012 Dean Faculty of Business Administration Southern University Bangladesh Subject: Submission of Internship Report. Dear Sir, It is my great pleasure to submit the internship report on Credit Management of First Security Islami Bank Limited (FSIBL) - A Case Study. I made sincere efforts to study related materials, documents, observe operations performed in First Security Islami Bank Limited. and examine relevant records for preparation of the report. I had to put in a lot of effort & hard work to the preparation of this report with the help of all the bank officials in the Bahadder Hat Branch. Within the time limit, I have to make this report as comprehensive as possible. But there may be some mistakes due to various limitations. For this reason, I ask for your kind consideration in this regard. Yours Faithfully, --------------------------Rahul Palit ID-111-30-14 Students Declaration I hereby announced that the extensive study entitled Credit Management of First Security Islami Bank Limited (FSIBL) - A Case Study.(Conducted on behalf of First Security Islami Bank Limited, Head Office, HR Division)Prepared in partial accomplishment of the requirements for the award of the degree in Bachelor of Business Administration (BBA). From Southern University BBA Department. Is my original work and not put forward For the award of the any other degree/fellowship Or other similar designation or accolade. …………………………………… Rahul Palit......

Words: 12757 - Pages: 52

Free Essay

Accident Avoidance and Victim Locating System

... one cannot get proper help when they need. This can be solved by this technology itself. Due to time laps many lives are in risk. To reduce this risk factor automatic accident detection and victim analysis plays an important role. Reducing the time laps will reduce the death rate. As reducing the time taken to take first aid will reduce the effect of accident on the victim. Probability of victim security will be more. As now a days mobile is common electronic gadget that is present with everyone and this problem can be solved by it only. By the short message service (SMS) on of the fetcher of mobile will help to solve this problem. By this embedded system we can know the place of accident, status of the victim etc. By this information rescue team will be easily help the victim. By using technologies GPS and GPRS one can easily locate the position of the accident. This project say the technologies that how an accident is detected and victim status. As prevention is better than cure, The main motive of this project is to reduce the accident rate and reduce the time for first aid. The proposed system ensures that to reduce the human death ratio by accidents. Chapter 1 Introduction In India, the World Health Organization (WHO) has revealed in its first ever Global Status Report on Road Safety that more people die in road accidents in India than anywhere else in the world, including the more populous......

Words: 4200 - Pages: 17

Free Essay

Synchronous Ethernet and Ieee 1588v2 Technology White Paper

...Synchronous Ethernet and IEEE 1588v2 Technology White Paper Issue Date 01 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://enterprise...

Words: 5689 - Pages: 23

Free Essay

Generic Security System with Thermal Imaging Technology

...Generic Security System with Thermal Imaging Technology American International University-Bangladesh (AIUB), Department of Computer Science and Engineering. Abstract. In this paper, I proposed a model to build thermal imaging based security system which can be used to control the access on private places and computer systems. The security system will maintain a database in which the thermogram of individuals will be kept. To get access on those places and computers, recent thermal image of the person will be matched with database in a systematic way. Here, I derived some equations for considering the dispersion of body temperature to match with the database in different physical and environmental condition. Key words: Thermogram, Thermal imager, Infrared radiator, Biometric system, Image processing, Image patterns recognition. 1 Introduction Thermal imaging system is the one of the most prominent and advanced technology to detect the radiated temperature (as image) from any objects or bodies by capturing it’s emitted infrared waves. Since almost every object radiate several volume of thermal energy, special type of device called thermal imager can be used to build the detailed temperature pattern of any object which is known as thermogram. Thermal image is varied from person to person and it’s unique [1]. So for ensuring true identification and correct authentication on different security system, thermal imaging technology can be kept in our general interest list.......

Words: 2099 - Pages: 9

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3.......

Words: 3868 - Pages: 16

Free Essay

Classification of Botnet Detection Based on Botnet Architechture

...2012 International Conference on Communication Systems and Network Technologies Classification of Botnet Detection Based on Botnet Architechture N.S.Raghava, Dept. of Information Technology Delhi Technological University Delhi, India nsraghava@dce.ac.in Divya Sahgal Dept of Information Technology Delhi Technological University Delhi, India divyasahgal61@gmail.com Seema Chandna Dept of Information Technology Delhi Technological University Delhi, India seemachandna64@gmail.com Abstract—Nowadays, Botnets pose a major threat to the security of online ecosystems and computing assets. A Botnet is a network of computers which are compromised under the influence of Bot (malware) code. This paper clarifies Botnet phenomenon and discusses Botnet mechanism, Botnet architecture and Botnet detection techniques. Botnet detection techniques can be categorized into six classes: honey pot based, signature-based, mining-based, anomaly-based, DNS-based and network-based. It provides a brief comparison of the above mentioned Botnet detection techniques. Finally, we discuss the importance of honeypot research to detect the infection vector and dealing with new Botnet approaches in the near future. Keywords- Botnet; Bot; Malware; Malicious code; P2P; Honeypot functions programmed by the Bot-master in automated way. Bots can receive commands from the Bot-master and work according to those commands to perform many cyber crimes for example phishing [26], malware dissemination,......

Words: 2973 - Pages: 12

Premium Essay

Nea Detection System

...Background of LISA detection rate: LISA is a joint ESA–NASA mission aiming for cosmic gravitational wave detection and analysis. It has been shown that the passage of one asteroid in the neighborhood of one of the LISA spacecrafts can generate a signal detectable with the standard LISA data analysis, and this has led to the issue of quantifying the rate of such events. P Tricarico et.al do a lot of research on LISA detection technique[2006,2009]. In 2009, he proposed a method to evaluate the NEA detection rate numerically and modeled the NEA population by statistic method. The detection rate [pic] is determined by the following equation: [pic] Where [pic] [pic] is the spatial density function of an NEA k, and V is the relative velocity. The symbols in the expression of [pic] are orbital elements of the NEA. Then the authors estimate the detection rate for the modeled NEAs population. In order to do so, we compute to total detection rate due to known NEAs within a short range in H, and then scale it to the number of modeled NEAs within the same range, including a correction coefficient related to selection effects. They get the following distribution of NEA population detected in one year over H: [pic] Where C=13.26, [pic] Evaluate yearly detection rate of NEAs Tricarico’s finding can tell us that if we know nothing about the NEAs, how many NEAs can we detect in one year. Since we also have the relationship between the size of NEA and the...

Words: 726 - Pages: 3

Premium Essay

Various Types and Usages of Technology

...Various types and usage of Technology Chavonne George HCS/483 February 12, 2015 Dr. Robert Miner Various types and usage of Technology There are many types of technology across the healthcare industry that has different effects and usages. One of the technologies used in the health care industry is telemedicine. Telemedicine is the use of medical information that is exchanged from one website to another while using electronic communications in order to improve a patient's clinical health status. The use of telemedicine has started to spread very quickly. It is becoming united into hospitals, home health agencies, specialty departments, private doctor offices, consumer's homes, and workplaces (American Telemedicine Association, 2012). In addition, there are many services that are considered to be part of telemedicine. They are patient consultations through video conferencing, transmission of still images, e-health including patient portals, remote monitoring of vital signs, and plenty more. The second type of technology is Health Care Robots. The robotic technologies are used in the health care industry for several reasons. They help with food service, medication distribution, infection control, surgeries, as well as to helping diagnose patients. The demand for robots is expected to grow enormously due to their many advantages in health care. "According to proponents, robots can curtail labor costs, add operational efficiencies, increase precision and......

Words: 446 - Pages: 2

Free Essay

Botnet Analysis and Detection

...and for proof reading this report. I would like to thank my family for their support and love. ii Abstract This era of explosive usage of networks have seen the rise of several opportunities and possibilities in the IT sector. Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ........................................................................................................................................... i Acknowledgements .......................................................................................................................... ii Abstract......

Words: 13171 - Pages: 53

Free Essay

Acciedent Detection

...................................................................................................... 5 Chapter Three .................................................................................................................................. 7 System block diagram ..................................................................................................................... 7 3.1 System block diagram ........................................................................................................... 7 ..................................................................................................................................................... 9 3.2 Block Diagram Description................................................................................................... 9 Chapter Three ................................................................................................................................ 11 Literature Review .......................................................................................................................... 11 Chapter Four ................................................................................................................................. 13 System Design and Implementation.............................................................................................. 13 4.1 Components used .............................................................................................................

Words: 5593 - Pages: 23

Premium Essay

The Heart of the Criminal Justice System: a Critical Analysis of the Position of the Victim

...publications, newspaper articles and videos, is to critically examine the position of the victim in the criminal justice system. The paper looks at the role of political interests in establishing victimfocus policies and the direction towards their placement at the heart of the justice system. This includes the managerialistic values, modernization of the Government and covering-up of punitive measures taken against the offender that all point to the political rhetoric around the centeredness of the victim. Furthermore, the view of traditional justice is accounted for in order to get a grasp of the many underlying factors that can be attributed to the so called rebirth and the consequent concentration on the victim. The paper firstly discusses characteristics of victims, the impact of crime on victims and also their needs for a better understanding of who they are and what can be done to help them. Particular attention is drawn to stereotypes associated with victims and constructions of the ideal victim. Secondly, the adversarial nature of English justice and implications for victims are discussed, as well as some tensions between the interests of the offender and the victim, and the opposed nature of the two. Procedural and service rights especially play an important role in defining whether victims are given appropriate attention. Many new initiatives favour the victim and pledge for its better treatment, but it will be shown that there are conflicts as to......

Words: 20228 - Pages: 81

Premium Essay

Advertisement Detection

...organizations that form advertisements and examine on the present advertised commercials and only keep the significant ones. For a user or a viewer he might want to record the movie or a particular program and would prefer a break free one i.e. without any advertisements. There have been set top boxes or software that detect and discard the commercials on the broadcast TV signal. Study in the field of the advertisement identification is segmented into various manners. It can be dependent on the audio or video information or an amalgamation of both. There are some works by A. G. Hauptmann and M. J. Witbrock (2006) that use the verbatim data achieved from the text streams, or the optical character recognition or speech identification for segmentation. In work proposed by L.-Y. Duan et al (2007) it has been given that using usual features of advertisement blocks like frames and silence amid commercials to identify cuts and categorize commercials dependent on OCR. In this work there have been two varied use cases for the commercial detection 1. Identify broadcast of recognized commercials with large precision something like the use of fingerprinting 2. Identify earlier not known commercials. Next segmentation is to differentiate amid the methodologies on online instantaneous or offline processing. A few approaches require investigating the entire video to identify the maximums and to calculate attributes with progressive requirements, while the rest depend on the fly......

Words: 3635 - Pages: 15