38 resultados para crowd

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we investigate whether government investment crowds out or crowds in private investment for Fiji over the period 1950–2001. We begin by searching endogenously for break points in the data series using the Zivot and Andrews [J. Business Economic Stat. 10 (1992) 251–270] test. Upon finding that 1975 is the statistically significant break date, we divide the sample into two. Using the error correction mechanism test, we find that government and private investments are cointegrated over the period 1950–1975, but not for the period 1976–2001. We also find that in the former period government investment has crowded in private investment, while in the latter period the relationship between government and private investments has been statistically weak.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when suchattacks mimic or occur during the flash crowd event of a popular Website. In this paper, we present the design and implementation of CALD, an architectural extension to protect Web servers against various DDoS attacks that masquerade as flash crowds. CALD provides real-time detection using mess tests but is different from other systems that use resembling methods. First, CALD uses a front-end sensor to monitor thetraffic that may contain various DDoS attacks or flash crowds. Intense pulse in the traffic means possible existence of anomalies because this is the basic property of DDoS attacks and flash crowds. Once abnormal traffic is identified, the sensor sends ATTENTION signal to activate the attack detection module. Second, CALD dynamically records the average frequency of each source IP and check the total mess extent. Theoretically, the mess extent of DDoS attacks is larger than the one of flash crowds. Thus, with some parameters from the attack detection module, the filter is capable of letting the legitimate requests through but the attack traffic stopped. Third, CALD may divide the security modules away from the Web servers. As a result, it keeps maximum performance on the kernel web services, regardless of the harassment from DDoS. In the experiments, the records from www.sina.com and www.taobao.com have proved the value of CALD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crowd simulation is an important feature in the computer graphics field. Typical implementations simulate battle scenes, emergency situations, safety issues or add content to virtual environments. The problem stated in this paper falls in the last category. We present a crowd simulation behavioural model which allows us to simulate identified phenomena in popular local African markets such as narrow street flows and crowd formation around street performances. We propose a three-tier architecture model enable to produce intentions, perform path planning and control movement. We demonstrate that this approach produces the desired behaviour associated with crowds in an African market, which includes navigation, flow formation and circle creation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission strategies and various forms of attack packets to beat defense systems. These problems lead to defense systems requiring various detection methods in order to identify attacks. Moreover, DDoS attacks can mix their traffics during flash crowds. By doing this, the complex defense system cannot detect the attack traffic in time. In this paper, we propose a behavior based detection that can discriminate DDoS attack traffic from traffic generated by real users. By using Pearson's correlation coefficient, our comparable detection methods can extract the repeatable features of the packet arrivals. The extensive simulations were tested for the accuracy of detection. We then performed experiments with several datasets and our results affirm that the proposed method can differentiate traffic of an attack source from legitimate traffic with a quick response. We also discuss approaches to improve our proposed methods at the conclusion of this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most of the state-of-the-art commercial simulation software mainly focuses on providing realistic animations and convincing artificial intelligence to avatars in the scenario. However, works on how to trigger the events and avatar reactions in the scenario in a natural and intuitive way are less noticed and developed. Typical events are usually triggered by predefined timestamps. Once the events are set, there is no easy way to interactively generate new events while the scene is running and therefore difficult to dynamically affect the avatar reactions. Based on this situation, we propose a framework to use human gesture as input to trigger events within a DI-Guy simulation scenario in real-time, which could greatly help users to control events and avatar reactions in the scenario. By implementing such a framework, we will be able to identify user’s intentions interactively and ensure that the avatars make corresponding reactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The analysis of human crowds has widespread uses from law enforcement to urban engineering and traffic management. All of these require a crowd to first be detected, which is the problem addressed in this paper. Given an image, the algorithm we propose segments it into crowd and non-crowd regions. The main idea is to capture two key properties of crowds: (i) on a narrow scale, its basic element should look like a human (only weakly so, due to low resolution, occlusion, clothing variation etc.), while (ii) on a larger scale, a crowd inherently contains repetitive appearance elements. Our method exploits this by building a pyramid of sliding windows and quantifying how “crowd-like” each level of the pyramid is using an underlying statistical model based on quantized SIFT features. The two aforementioned crowd properties are captured by the resulting feature vector of window responses, describing the degree of crowd-like appearance around an image location as the surrounding spatial extent is increased.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analysis of crowd behaviour in public places is an indispensable tool for video surveillance. Automated detection of anomalous crowd behaviour is a critical problem with the increase in human population. Anomalous events may include a person loitering about a place for unusual amounts of time; people running and causing panic; the size of a group of people growing over time etc. In this work, to detect anomalous events and objects, two types of feature coding has been proposed: spatial features and spatio-temporal features. Spatial features comprises of contrast, correlation, energy and homogeneity, which are derived from Gray Level Co-occurrence Matrix (GLCM). Spatio-temporal feature includes the time spent by an object at different locations in the scene. Hyperspherical clustering has been employed to detect the anomalies. Spatial features revealed the anomalous frames by using contrast and homogeneity measures. Loitering behaviour of the people were detected as anomalous objects using the spatio-temporal coding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Summarization is an essential requirement for achieving a more compact and interesting representation of sports video contents. We propose a framework that integrates highlights into play segments and reveal why we should still retain breaks. Experimental results show that fast detections of whistle sounds, crowd excitement, and text boxes can complement existing techniques for play-breaks and highlights localization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the critical success factors of special events, in this case the Anzac Day commemorations at Gallipoli, Turkey. This event has become increasingly popular in recent years with crowd numbers growing to around 20,000 people traveling to attend the 2005 Dawn Service at historic Anzac Cove on Anzac day. The aim of this research is to investigate the success factors associated with Anzac Day commemorations at Gallipoli and to assess how these influence visitor satisfaction. Data was collected from 331 attendees of Anzac Day commemorations at Gallipoli while they were in transit from Gallipoli to Istanbul on 25 April 2007. The analysis of this data was undertaken using exploratory and confirmatory factor analysis as a basis to the development of a model of satisfaction using structural equation modeling. In this case constructs relating to amenities, transport, ceremonies and recommending behavior were found to be significant predictors of event satisfaction. These issues during the event were found to be of equal importance for both genders and all age groups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The establishment of an elite national Australian soccer league has been accompanied by an unprecedented growth in popularity for the world game in several Australian cities. Such growth presents numerous challenges for public order maintenance, particularly in light of the widespread concern over the relationship between soccer, disasters in major closed venues and violence. After outlining the emerging issues, and the extant Australian research into the phenomena of policing and sports crowd disorder, this study offers a knowledge based approach to foster informed, reflective and collaborative policing in elite and sub-elite soccer venues. Rather than advocating a fundamental shift in the current public order policing paradigm, we suggest drawing on elements of best practice that are currently adopted in other Australian sporting and public order settings and appropriate overseas experience to facilitate a better understanding of the dynamics of Australian soccer fandom. The result should be the promotion of safer yet exciting events at which interactive crowd management based on harm minimization principles are key features.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Disasters, emergencies, incidents, and major incidents - they all come back to the same thing regardless of what they are called. The common denominator is that there is loss of life, injury to people and animals and damage and destruction of property. The management of such events relies on four phases: 1. Prevention 2. Preparation 3. Response 4. Recovery Each of these phases is managed in a different way and often by different teams. Here, concentration has been given to phases 2 and 3, with particular emphasis on phase 3, Response. The words used to describe such events are often related to legislation. The terminology is detailed later. However, whatever the description, whenever prevention is not possible, or fails, then the need is to respond. Response is always better when the responders are prepared. Training is a major part of response preparation and this book is designed to assist those in the health industry who need to be ready when something happens. One of the training packages for responders is the Major Incident Medical Management and Support (MIMMS) Course and this work was designed to supplement the manual prepared by Hodgetts and Macway-Jones(87) in the UK. Included is what the health services responder, who may be sent to an event in which the main concern is trauma, should know. Concentration is on the initial response and does not deal in any detail with hospital reaction, the public health aspects, or the mental health support that provides psychological help to victims and responders, and which are also essential parts of disaster management. People, in times of disaster, have always been quick to offer assistance. It is now well recognised however, that the 'enthusiastic amateur', whilst being a well meaning volunteer, isn't always what is needed. All too often such people have made things worse and have sometimes ended up as victims themselves. There is a place now for volunteers and there probably always will be. The big difference is that these people must be well informed, well trained and well practiced if they are to be effective. Fortunately such people and organisations do exist. Without the work of the St John Ambulance, the State Emergency Service, the Rural Fire Service the Red Cross and the Volunteer Rescue Association, to mention only a few, our response to disasters would be far less effective. There is a strong history of individuals being available to help the community in times of crisis. Mostly these people were volunteers but there has also always been the need for a core of professional support. In the recent past, professional support mechanisms have been developed from lessons learned, particularly to situations that need a rapid and well organised response. As lessons are learned from an analysis of events, philosophy and methods have changed. Our present system is not perfect and perhaps never will be. The need for an 'all-hazards approach' makes detailed planning very difficult and so there will probably always be criticisms about the way an event was handled. Hindsight is a wonderful thing, provided we learn from it. That means that this text is certainly not the 'last word' and revisions as we learn from experience will be inevitable. Because the author works primarily in New South Wales, many of the explanations and examples are specific to that state. In Australia disaster response is a State, rather than a Commonwealth, responsibility and consequently, and inevitably, there are differences in management between the states and territories within Australia. With the influence of Emergency Management Australia, these differences are being reduced. This means that across state and territory boundaries, assistance is common and interstate teams can be deployed and assimilated into the response rapidly, safely, effectively and with minimum explanation. This text sets out to increase the understanding of what is required, what is in place and how the processes of response are managed. By way of introduction and background, examples are given of those situations that have occurred, or could happen. Man Made Disasters has been divided into two distinct sections. Those which are related to structures or transport and those related directly to people. The first section, Chapter 3, includes: • Transport accidents involving land, rail, sea or air vehicles. • Collapse of buildings for reasons other than earthquakes or storms. • Industrial accidents, including the release of hazardous substances and nuclear events. A second section dealing with the consequences of the direct actions of people is separated as Chapter 4, entitled 'People Disasters'. Included are: • Crowd incidents involving sports and entertainment venues. • Terrorism From Chapter 4 on, the emphasis is on the Response phase and deals with organisation and response techniques in detail. Finally there is a section on terminology and abbreviations. An appendix details a typical disaster pack content. War, the greatest of all man made disasters is not considered in this text.