This document summarizes two literature sources related to disaster management and awareness. The first source presents a theoretical framework for a knowledge-based approach to enhance effective disaster management. It proposes developing a knowledge base to empower emergency response teams by providing relevant past experience and information to assist with decision making. The second source evaluates the disaster awareness levels of university students. It assesses students' training, preparedness, behaviors during/after disasters, and personal knowledge through surveys. The results indicate some students lack awareness and preparedness.
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...ijcseit
Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node
carries on as host or router and every node can participate in the transmission of packets. Because of its
dynamic behaviour such system is more susceptible against various sorts of security threats, for example,
Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block the transmission of
the system. Black hole attack and Jamming attack is one of them which promote itself has shortest or new
fresh route to the destination while jamming attack which make activity over the system. This paper
introduces the thorough literature study for the Black hole attack and jamming attack of both the attack by
various researchers.
Information security risk assessment under uncertainty using dynamic bayesian...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A major role is played in the layout and evaluation of any empirical wireless structure to manifest is the goal of this paper that counterfeit mode architectures affect counterfeit conduct, regarding structure accomplishment metrics, essentially and therefore, the excellent architecture should be explored in order to accomplish the most accurate and reliable results. It is found that the most analytical factors it is found that that actuate counterfeit mode accomplishment are counterfeit time, structure event organizing and
grade of adequate. It is, also, found that counterfeit time in relation to event existence in the real structure
along with the usage of modern architectural concepts such as multi-interweave technology complement
analytical issues too in the advancement of an adequate counterfeit organization for wireless communications. In order to evaluate the above findings an extensive empirical review has been
demeanored analysising several distinct events counterfeitorganizations towards presenting the relation
between channel designing collections, counterfeit time and structure accomplishment.
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...ijcseit
Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node
carries on as host or router and every node can participate in the transmission of packets. Because of its
dynamic behaviour such system is more susceptible against various sorts of security threats, for example,
Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block the transmission of
the system. Black hole attack and Jamming attack is one of them which promote itself has shortest or new
fresh route to the destination while jamming attack which make activity over the system. This paper
introduces the thorough literature study for the Black hole attack and jamming attack of both the attack by
various researchers.
Information security risk assessment under uncertainty using dynamic bayesian...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A major role is played in the layout and evaluation of any empirical wireless structure to manifest is the goal of this paper that counterfeit mode architectures affect counterfeit conduct, regarding structure accomplishment metrics, essentially and therefore, the excellent architecture should be explored in order to accomplish the most accurate and reliable results. It is found that the most analytical factors it is found that that actuate counterfeit mode accomplishment are counterfeit time, structure event organizing and
grade of adequate. It is, also, found that counterfeit time in relation to event existence in the real structure
along with the usage of modern architectural concepts such as multi-interweave technology complement
analytical issues too in the advancement of an adequate counterfeit organization for wireless communications. In order to evaluate the above findings an extensive empirical review has been
demeanored analysising several distinct events counterfeitorganizations towards presenting the relation
between channel designing collections, counterfeit time and structure accomplishment.
It is an empirical study of strategic management practices in the construction industry. It examines the dynamic capabilities paradigm within the context of the Indonesian construction industry. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organizational performance. In doing so, this study fills an important gap in the empirical literature and reinforces the dynamic capabilities framework’s recognition as a rigorous theory of strategic management. As the dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries
Knowledge or Rule based Expert systems systems are widely used in engineering applications and in problem-solving. Rapid development today has brought with it environmental problems that cause loss or destruction of natural resources. Environmental impact assessment (EIA) has been acknowledged as a powerful planning and decisionmaking tool to assess new development projects. It requires qualified personnel with special expertise and responsibility in their domain. Rule-based EIA systems incorporate expert’s knowledge and act as a device-giving system. The system has an advantage over human experts and can significantly reduce the complexity of a planning task like EIA.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
“CLASCA”: Learning System for Classification and Capitalization of Accident S...IJERA Editor
In the process of analysis and assessment of the safety of a rail transportation system, one of the difficulties is to
ensure the completeness of the accident scenarios taken into account by all the actors involved in the
development of the system. The present work is to formalize, classify and archive the historical scenarios
experienced on transportation systems in French already certified and/or approved such that the VAL,
MAGGALY, TVM 430 of the TGV Nord. The goal is to develop a database of historical scenarios from the
know-how of the manufacturers, masters of book and experts and researchers from the French Institute
IFSTTAR to help examine the completeness of safety analyzes. The development and the operation of this basis
of scenarios have need resort to the techniques of knowledge acquisition and automatic learning. The application
of methods for the acquisition of knowledge has resulted essentially on the constitution of a database of
historical knowledge which comprises 70 scenarios relative to the risk of "collision". The exploitation by
machine learning of this basis of scenarios in order to extract the relevant knowledge in a purpose explanatory or
made decision-making the object from the system "CLASCA" presented in this paper.
It is an empirical study of strategic management practices in the construction industry. It examines the dynamic capabilities paradigm within the context of the Indonesian construction industry. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organizational performance. In doing so, this study fills an important gap in the empirical literature and reinforces the dynamic capabilities framework’s recognition as a rigorous theory of strategic management. As the dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries
Knowledge or Rule based Expert systems systems are widely used in engineering applications and in problem-solving. Rapid development today has brought with it environmental problems that cause loss or destruction of natural resources. Environmental impact assessment (EIA) has been acknowledged as a powerful planning and decisionmaking tool to assess new development projects. It requires qualified personnel with special expertise and responsibility in their domain. Rule-based EIA systems incorporate expert’s knowledge and act as a device-giving system. The system has an advantage over human experts and can significantly reduce the complexity of a planning task like EIA.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
“CLASCA”: Learning System for Classification and Capitalization of Accident S...IJERA Editor
In the process of analysis and assessment of the safety of a rail transportation system, one of the difficulties is to
ensure the completeness of the accident scenarios taken into account by all the actors involved in the
development of the system. The present work is to formalize, classify and archive the historical scenarios
experienced on transportation systems in French already certified and/or approved such that the VAL,
MAGGALY, TVM 430 of the TGV Nord. The goal is to develop a database of historical scenarios from the
know-how of the manufacturers, masters of book and experts and researchers from the French Institute
IFSTTAR to help examine the completeness of safety analyzes. The development and the operation of this basis
of scenarios have need resort to the techniques of knowledge acquisition and automatic learning. The application
of methods for the acquisition of knowledge has resulted essentially on the constitution of a database of
historical knowledge which comprises 70 scenarios relative to the risk of "collision". The exploitation by
machine learning of this basis of scenarios in order to extract the relevant knowledge in a purpose explanatory or
made decision-making the object from the system "CLASCA" presented in this paper.
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
Multi-Agent System (MAS) monitoring solutions are designed for a plethora of usage topics. Existing approach mostly used cloned back-end architectures while front-end monitoring interface tends to constitute the real specificity of the solution. These interfaces are recurrently structured around three dimensions: access to informed knowledge, agent’s behavioural rules, and restitution of real-time states of specific system sector. In this paper, we propose prototyping a sector-agnostic MAS platform (Smart-X) which gathers in an integrated and independent platform all the functionalities required to monitor and to govern a wide range of sector specific environments. For illustration and validation purposes, the use of Smart-X is introduced and explained with a smart-mobility case study.
Implementing sharing platform based on ontology using a sequential recommende...IJECEIAES
While recommender systems have shown success in many fields, accurate recommendations in industrial settings remain challenging. In maintenance, existing techniques often struggle with the “cold start” problem and fail to consider differences in the target population's characteristics. To address this, additional user information can be incorporated into the recommendation process. This paper proposes a recommender system for recommending repair actions to technicians based on an ontology (knowledge base) and a sequential model. The approach utilizes two ontologies, one representing failure knowledge and the other representing asset attributes. The proposed method involves two steps: i) calculating score similarity based on ontology domain knowledge to make predictions for targeted failures and ii) generating Top-N repair actions through collaborative filtering recommendations for targeted failures. An additional module was implemented to evaluate the recommender system, and results showed improved performance.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
3. INTRODUCTION
(Terminologies)
3
Multi-Hop: The mobile nodes are cooperating to forward data on behalf of one another to reach distant
stations that would otherwise have been out of range of sending node.[3]
Protocol: Set of rules that governs data communication. Protocol defines what is communicated, how it
is communicated, when it is communicated. Key elements of protocol: syntax, semantics & timing.[5]
Router: Device that forwards data packets along networks; Connected to at least two networks,
commonly LANs or WANs or a LAN and its ISP's network.; Located at gateways, the places where two
or more networks connect.[4]
Hub: It is a multiport repeater to enhance signals within the same LAN.[6]
Switch: It is mostly like hub but it is more intelligent. It gives better performance.[6]
Router: It forwards packets from one LAN to another LAN.[6]
Unicasting: One to one communication.[6]
Multicasting: One to many communication.[6]
Broadcasting: One to all communication occurs.[6]
Network Topology: Refers to the way computers and its peripheral environment is configured:-[6]
Bus topology: All computers are synchronize by a single line of cable.
Star topology: Multiple computers are linked to a main computer, which is called a host
Ring topology: Each computer is connected to two computers with entire network; It Forms a circle.
5. LITERATURE-REVIEW(1/2)
5
• Title: “Knowledge-based Approach for Sustainable
Disaster Management: Empowering emergency response
management team”[1]
Author: Faisal Arain
Year of Publication: 2015
• Aim: This paper presents a theoretical framework of a knowledge-
based approach for enhancing prompt and effective sustainable disaster
management.
• Keywords: Disaster Management; Knowledge-base; Emergency response;
Post-disaster.
6. LITERATURE-REVIEW(1/2 Cont..)
6
• Introduction:
– Information technology (IT) has become strongly established as a supporting tool
for many professional tasks in recent years.
– In view of the transfer and acquisition of knowledge and experience, a Decision
Support System (DSS) can help to disperse the knowledge and experience and
make these more widely, easily, and quickly available for assisting in the decision
making processes.
– A knowledge-base (KB) is a system that can undertake intelligent tasks in a
specific domain that is normally performed by highly skilled people. Typically,
the success of such a system relies on the ability to represent the knowledge for a
particular subject.
– Concerning the post-disaster reconstruction scenario, the most significant factor is
the prompt delivery of materials and pertinent team building based on best
possible information available.
– By having the KB and a systematic way to make well-informed decisions,
combined with the efficiency of a project team and strong coordination, project
success should increase.
7. • Knowledge-based approach for Sustainable Disaster Management:
‾ The sophisticated analyses that a KB can provide becomes an important factor
in making good and valuable decisions.
‾ If professionals have a KB established, based on past similar projects, it would
assist the Emergency Response Management (ERM) team to plan effectively
before starting a reconstruction project.
1. Empowering Emergency Response Management Team:
‾ Emergency response team is the backbone of any effective response
management system in a post-disaster scenario.
‾ In case of a disaster, the response team requires accurate and timely information
to assess their line of action.
‾ If the ERM team has relevant knowledge regarding similar disaster scenarios
that would help them learn and strategize even a better response next time.
‾ The true empowerment of an EMR team would be the freedom and ability to
make informed decisions, considering available resources and expertise, in
responding to emergency situations.
LITERATURE-REVIEW(1/2 Cont..)
8. LITERATURE-REVIEW(1/2 Cont..)
Fig.1 Basis for developing IT based system for enhancing emergency response management
Here it is important to understand that the KB is not designed to make decisions for
users, but rather it provides pertinent information in an efficient and easy-to-access
format that allows users to make more informed decisions.
9. LITERATURE-REVIEW(1/2 Cont..)
‾ The system would assist ERM teams in recognizing the resources along with their
limitations and constraints, which would help in assigning right resources to the
right domains for an effective response to post-disaster scenarios.
‾ It is utmost important to Monitor and Control the relief and rescue and rehabilitation
activities so that the people in need receive appropriate help.
‾ Learning and sharing the lesson learned would keep the proposed system effective,
efficient and more beneficial for all stakeholders.
‾ The KB can assist ERM team in making strategic decisions by presenting useful
information and interpretations for various alternatives.
‾ The KB would be capable of providing interpretation of knowledge, based on the
rule based reasoning (RBR) approach.
‾ This would assist ERM team in improving chances of timely response and
successful completion of reconstruction projects because the potential lack of
coordination issues can be identified at the early stage of team development when
the impact of change is not severe.
‾ A KB is proposed for empowering ERM team by developing effective project teams
and suggesting strategies managing reconstruction projects in an efficient way.
(An important role of a knowledge-base is to provide useful information for users to analyze scenarios and to
make informed decisions.)
10. LITERATURE-REVIEW(1/2 Cont..)
Fig. 2. The main components of a knowledge management system
Data collected from various sources, i.e., ERM organizations, reconstruction project
documents, site data, academia source documents, and peers evaluation documents. This
data was stored in a database. From the database, the data was sieved through an inference
engine for developing the knowledge-base. Eventually, the knowledge-base provided
decision support to the project teams for making more informed decisions for effective
selection of project teams and successful management of reconstruction projects [8].
11. LITERATURE-REVIEW(1/2 Cont..)
– The system would be able to present detailed information about the resources
utilized: management decisions made, changes made during project
implementation, and project teams who worked on similar ERM projects, and
reconstruction projects in the past.
– Furthermore, the system would present the available pool of experts in the
academia and industry.
– The filtered knowledge and analyses provided by the knowledge-base would
assist in selecting appropriate expert teams, resources, approval processes, and
prioritizing activities based on past experiences in similar projects.
– The knowledge-base would also be capable of storing the feedback on the
ongoing projects, carry out analyses on the available information, and present
results for decision making process by the concerned professionals .
12. LITERATURE-REVIEW(1/2 Cont..)
‾ The KB can be developed in the MS Excel environment using numerous macros for
developing the UI that carry out stipulated functions.
‾ These are incorporated within a controls selection shell.
‾ The GUI assists users in interacting with the system at every level of the KMS.
‾ In addition, the GUI and inference engine will maintain the compatibility between
layers and the decision shell.
‾ The KMS provides an extremely fast response to the queries based on RBR.
‾ The KB is able to assist project managers by providing a user-friendly system for
analyzing the present pool of human resource and selecting the best possible team,
resources, materials, and designs for carrying out post-disaster reconstruction projects.
‾ Moreover, the system is also intelligently capable of organizing, computing, and
updating valuable information in all the layers automatically with every new project
added.
‾ The UI assists in updating the system with new information on every level of the KB.
‾ The information and various filters that can be applied to the KB developed may assist
the professionals in enhancing the chances of successful implementation of response
measures and reconstruction projects.
13. LITERATURE-REVIEW(2/2)
13
• Title: “Evaluation of disaster awareness and sensitivity
level of higher education students”[2]
Authors: Seher Ozkazanc, Ulku Duman Yuksel
Year of Publication: 2015
• Aim: The main aim is to determine the level of disaster awareness of
students in higher education institutions. By doing this, the study also aims
to point to the need for disaster mitigation education that includes various
topics and is accessible to whole society.
• Keywords: Disaster; disaster awareness; disaster sensitivity; higher education
14. 14
• Objectives of the Study:
‾ This research determines disaster awareness and sensitivity level of the
students of the Urban and Regional Planning Department in the Faculty of
Architecture at Gazi University.
‾ Disaster awareness of students for this purpose are discussed, including
"Disaster Training Level," " Pre-Disaster Preparedness Level", "Behavior
During Disaster", "Behavior After Disaster" and "Personal Disaster
Awareness Assessment" under five headings in this research.
• Method:
‾ Descriptive analyses method which allows qualitative analysis was used to
reveal the presence or absence of the awareness and sensitivity of disaster.
‾ In the meantime, the survey method was utilized as data collection tools.
‾ The research population constitutes 249 students; 187 of these students
(sampling rate 75.1%) agreed to complete the questionnaire given to them.
‾ Survey data were evaluated using the program of PASW Statistics R18.
LITERATURE-REVIEW(2/2 Cont..)
15. LITERATURE-REVIEW(2/2 Cont..)
In this case, It can be said that City and
Regional Planning education affects the
information of related competent institutions
and organizations on disaster and emergency
situations in a positiv e way.
Table2. Disaster and emergency training
situation
16. LITERATURE-REVIEW(2/2 Cont..)
Table 4. Pre-disaster preparedness
what should be in a disaster and emergency bag has been indicated by AFAD in a
sequence are enough water and food supplies, hygiene and first aid equipment, protective
clothing, blankets, sleeping bag, whistle, flashlight and so on, and also stated that this bag
should be considered to be easily accessible and portable.
17. LITERATURE-REVIEW(2/2 Cont..)
Table 7. Behaviors during disaster
Natural disasters are defined in two titles as slow-growing (severe cold, drought, famine
etc.), and sudden onset ones (earthquakes, floods, flooding, landslides, rock falls,
avalanches, storms, tornado, volcanic events, fires, etc.) accidents of nuclear, biological,
chemical, industrial etc. constitute the human-induced disasters. Therefore, students were
asked whether they have a shelter that can be protected from human-induced disasters.
19. LITERATURE-REVIEW(2/2 Cont..)
In order to analyze the students’ relationship
between their behavior at the time of disaster
and education they received about disaster,
cross-tables (crosstabs) located on table 9 was
created.
Table 9. Disaster education and awareness of the relationship during disaster
20. LITERATURE-REVIEW(2/2 Cont..)
After major and devastating disaster incidents occurred, access of health, search and rescue
staff or fire fighters to the scene immediately to help the people who suffer damage is not
possible most of the time. Both time consuming coordination providing and difficulties in
transportation (destroyed bridges, damaged roads, etc.) cause victims to remain on their own
for a certain period of time after the disaster. AFAD proposes a family / individual disaster
plan to be made "for the first 72 hours after the disaster" to be overcome this time easy.
Table 10. Behaviors after disaster
21. LITERATURE-REVIEW(2/2 Cont..)
In this section of the study, students were
asked to evaluate their personal knowledge
and education levels related to four most
common type of disaster (earthquake, fire,
flood and landslide) in Turkey.
Table 11. Personal evaluation related to knowledge and
personal education level for disaster
23. PROBLEM STATEMENT
23
– A single routing protocol is hard to satisfy all requirements. i.e., one
routing protocol cannot be a solution for all energy efficient protocol.
– AODV performs predictably. Delivered virtually all packets at low node
mobility, and failing to converge as node mobility increases.
24. CONCLUSION
24
‾ The proposed scheme may reduce the energy consumption to some extent
and decreases the mean delay, while achieving a good packet delivery ratio.
‾ Reactive routing protocol AODV performance is the best considering its
ability to maintain connection by periodic exchange of information, which
is required for TCP, based traffic.
‾ DSR was very good at all mobility rates and movement speeds and DSDV
performs almost as well as DSR, but still requires the transmission of many
routing overhead packets. At higher rates of node mobility it’s actually
more expensive than DSR.