Results for 'traffic'

147 found
Order:
  1. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  2.  34
    Smart Traffic Analysis, Monitoring, and Density Estimation System Using YOLOv8.N. Surya Prakash E. Benitha Sowmiya, Y. Sai Phani Chandra, S. Hemarjun Kishore, G. Nithish Goud - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9369-9379.
    Smart Traffic Analysis, Monitoring, and Density Estimation System Using YOLOv8 and DeepSORT, aims to provide an efficient and real-time solution for vehicle detection, tracking, and speed estimation in traffic surveillance. The system leverages YOLOv8 (You Only Look Once version 8) for high-precision object detection and integrates DeepSORT (Simple Online and Realtime Tracker with a Deep Association Metric) for multi-object tracking, ensuring accurate identification and movement tracking of vehicles across video frames. The YOLOv8 model is trained on large-scale datasets (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  65
    Traffic Optimization Utilizing AI to Dynamically Adjust Network Routes based on Real-Time Traffic Patterns to Minimize Latency and Maximize Throughput.Odubade Kehinde Santhosh Katragadda - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (1):1-12.
    Internet network optimization techniques require immediate expansion because users require fast latency performance alongside improved data transmission speed. Dynamic traffic systems operate with Machine learning algorithms that belong to the Artificial Intelligence category to power their fundamental operational tools. Through real-time data processing, AI systems can modify network pathways in operation thus generating enhanced performance together with outstanding user interface quality. Using reinforcement learning and neural networks developed by artificial intelligence enables better traffic prediction along with response abilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  21
    Traffic Sign Detection and Recognition using G-CNNs for Autonomous Vehicles.S. Rithik Reddy - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-14.
    Traffic sign detection is a crucial task for autonomous vehicles, enabling safe navigation through complex environments. Traditional Convolutional Neural Networks (CNNs) are highly effective in detecting traffic signs, but their computational complexity and large memory requirements make them challenging to deploy in real-time systems, especially on resource-limited devices. Binary Neural Networks (BNNs) provide a more efficient alternative by simplifying computations and reducing memory usage, enabling faster processing, but they often sacrifice the detailed features that CNNs capture. Group Convolutional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  26
    Real-Time Traffic Monitoring and Signal Timing Optimization.PrabhakarRaju G. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    Traffic congestion in urban areas is a growing challenge, leading to increased travel time, fuel consumption, and environmental pollution. Traditional traffic signal systems operate on fixed timing schedules, failing to adapt to real-time traffic conditions. This research proposes an AI-based smart traffic management system that dynamically adjusts traffic signal timings using CCTV cameras and deep learning models. The system continuously monitors stopped vehicles at intersections using YOLO-based object detection and assigns adaptive green light durations based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Traffic in Women: Notes on the "Political Economy" of Sex.Gayle Rubin - 1975 - In Rayna R. Reiter, Toward an Anthropology of Women. New York: Monthly Review Press. pp. 157--210.
    Download  
     
    Export citation  
     
    Bookmark   96 citations  
  7.  45
    Deep Learning-based Traffic Sign Detection and Recognition (TSDR).Vattem Srinath Shaik Nagul Meera - 2023 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 10 (11):13073-13076.
    Traffic sign detection and recognition (TSDR) is a critical aspect of autonomous driving and intelligent transportation systems. Traditional methods of traffic sign detection rely on handcrafted features and classical machine learning algorithms, which often struggle to achieve high accuracy in complex real-world environments. In contrast, deep learning techniques, particularly Convolutional Neural Networks (CNNs), have shown remarkable performance in both detecting and recognizing traffic signs in diverse conditions. This paper reviews the application of deep learning methods for TSDR, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  57
    AI-DRIVEN TRAFFIC MANAGEMENT SYSTEM FORZERO VIOLATION AND ENHANCED ROAD SAFETY.C. E. Rajaprabha - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-14.
    This project addresses the critical issue of traffic safety and law enforcement, specifically focusing on noncompliance with helmet laws by motorcyclists, a leading cause of fatalities in road accidents. Traditional methods of enforcing helmet laws are often ineffective due to the challenge of ensuring immediate detection and action. To solve this, we propose an automated traffic management system that integrates artificial intelligence (AI) with real-time surveillance and data monitoring to improve road safety. The core of the proposed system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  46
    Deep Learning-Based Traffic Sign Detection and Recognition (TSDR).Vattem Srinath Shaik Nagul Meera - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (6):2692-2694.
    Traffic sign detection and recognition (TSDR) is a critical aspect of autonomous driving and intelligent transportation systems. Traditional methods of traffic sign detection rely on handcrafted features and classical machine learning algorithms, which often struggle to achieve high accuracy in complex real-world environments. In contrast, deep learning techniques, particularly Convolutional Neural Networks (CNNs), have shown remarkable performance in both detecting and recognizing traffic signs in diverse conditions. This paper reviews the application of deep learning methods for TSDR, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  23
    The Hidden Toll of Traffic: Air Pollution’s Role in Ovarian Cancer Risk.Nhàn Bụng Đen - 2025 - Xomchim.Com.
    Beyond traffic congestion and urban noise lies a less visible but profound threat—air pollution linked to serious health risks [2]. A recent study published in Environmental Health Perspectives has identified a significant association between traffic-related air pollutants and an increased risk of ovarian cancer, one of the most lethal cancers affecting women [3].
    Download  
     
    Export citation  
     
    Bookmark  
  12. Density Based Traffic Control Signaling Using IR sensors.Tenepalli Kalyan Sai Manikanta Chari & SaiTeja Tutika - 2019 - IJEAIS 3 (3):51-60.
    Abstract—Traffic clog is a serious issue in the majority of the urban areas over the world and it has turned into a bad dream for the residents. It is brought about by postponement in flag, improper planning of traffic flagging and so on. The postponement of traffic light is hard coded and it doesn't depend on traffic. In this manner for streamlining traffic control, there is an expanding request in precise snappy programmed framework. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  41
    AUTOMATED SPEED CONTROL AND EMERGENCY ROUTE CREATION IN TRAFFIC CONGESTION.J. Prakash - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-25.
    Urban traffic congestion presents significant challenges, including prolonged travel times, increased fuel consumption, and critical delays in emergency response. Traditional traffic management systems lack the adaptability to regulate traffic flow dynamically based on real-time conditions. This system introduces an innovative approach, Automated Speed Control and Emergency Route Creation in Traffic Congestion, to improve vehicle movement and prioritize emergency transport. The system incorporates IR sensors positioned at strategic intervals to monitor traffic density up to 1 km (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Representing the Zoo World and the Traffic World in the language of the causal calculator.Varol Akman, Selim T. Erdoğan, Joohyung Lee, Vladimir Lifschitz & Hudson Turner - 2004 - Artificial Intelligence 153 (1-2):105-140.
    The work described in this report is motivated by the desire to test the expressive possibilities of action language C+. The Causal Calculator (CCalc) is a system that answers queries about action domains described in a fragment of that language. The Zoo World and the Traffic World have been proposed by Erik Sandewall in his Logic Modelling Workshop—an environment for communicating axiomatizations of action domains of nontrivial size. -/- The Zoo World consists of several cages and the exterior, gates (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  15.  75
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).Sugumar R. - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Modern Automated System for Traffic Signals.Senbaga Ganesh - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):111-119.
    This work has been designed to develop an a dynamic road signal based on an emergency with density. The sync signal automatically switches to detecting traffic density at the intersection. Traffic congestion is a serious problem in many large cities around the world and has become a nightmare for travelers in these cities. The conventional traffic light system is based on the concept of fixed time assigned to each side of the join that cannot be varied by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Ethical Principles for the Design of Next-Generation Traffic Control Technology.Milos N. Mladenovic & Tristram McPherson - manuscript
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  90
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.DrV. R. Vimal and DrR. Sugumar DrR. Udayakumar, Dr Suvarna Yogesh Pansambal, Dr Yogesh Manohar Gajmal - 2023 - INDIA: ESS- ESS PUBLICATION.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Adaptive information and animal behaviour: Why motorists stop at red traffic lights.Ronald W. Templeton & James Franklin - 1992 - Evolutionary Theory 10:145-155.
    Argues that information, in the animal behaviour or evolutionary context, is correlation/covariation. The alternation of red and green traffic lights is information because it is (quite strictly) correlated with the times when it is safe to drive through the intersection; thus driving in accordance with the lights is adaptive (causative of survival). Daylength is usefully, though less strictly, correlated with the optimal time to breed. Information in the sense of covariance implies what is adaptive; if an animal can infer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Analysis of acoustic pollution in buildings near high traffic streets. Case study Zogu Zi crossroad, Tirane, Albania.Romina Osmani, Krisa Llakaj, Enrigent Zenelaj & Klodjan Xhexhi - 2023 - International Journal of Engineering Inventions 12 (2):80-87.
    Acoustic pollution is one of the main pollutants nowadays but it is not considered of great importance in the construction field, despite some studies showing that most of acoustic pollution is produced by buildings under construction and roads with high traffic. The aim of the paper is to compare the noise levels at different time of the day in two different buildings which have different characteristics and different construction materials. The goal is to understand how well sound isolated civil (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Noise Pollution Analysis in External Masonries of Heavy Traffic Roads, Case Study Tirana, Albania.Sindi Shehi, Megi Bufi, Iljaz Karaboja & Klodjan Xhexhi - 2022 - International Journal of Modern Research in Engineering and Technology (Ijmret) 7 (2):13-19.
    This paper determines the acoustic properties of external wall building materials composition. Noise pollution is one of the main pollutants nowadays but it is not considered of great importance in the construction field, despite some studies showing that greater acoustic pollution is produced by buildings under construction. The study consists of analysing two different types of buildings equipped with a different type of external masonry composition in terms of building materials. The buildings are located at “21 Dhjetori” street, Tirana, Albania. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Bullrich Lineal Park, Buenos Aires-Narrow strip surrounded by traffic as urban green space.Natalia Penacini - 2009 - Topos: European Landscape Magazine 67:66.
    Prior to this intervention the site used to be a degraded fiscal property, that functioned as a bus yard, a police legal deposit, and a restaurant parking lot. Underneath it runs the Maldonado stream culvert, covered by a concrete slab at a depth of only -20cm. Next to the site is a 5m high railroad embankment. The plot is strategically located at the end of Juan B. Justo avenue and works as a gateway to the Tres de Febrero park (also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. (1 other version)External Human–Machine Interfaces for Autonomous Vehicle-to-Pedestrian Communication: A Review of Empirical Work. [REVIEW]Alexandros Rouchitsas & Håkan Alm - 2019 - Frontiers in Psychology 10.
    Interaction between drivers and pedestrians is often facilitated by informal communicative cues, like hand gestures, facial expressions, and eye contact. In the near future, however, when semi- and fully autonomous vehicles are introduced into the traffic system, drivers will gradually assume the role of mere passengers, who are casually engaged in non-driving-related activities and, therefore, unavailable to participate in traffic interaction. In this novel traffic environment, advanced communication interfaces will need to be developed that inform pedestrians of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.R. Indoria - 2024 - Technosaga 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  79
    Invisible Presence: Understanding The Consequences Of The Unrecognized Efforts On The Job Satisfaction Of TMG Employees.Michael Angelo T. Dulce, Frederick L. Pablo, Marian Gail R. Atienza, Adrialene C. Caringal & Jowenie A. Mangarin - 2025 - Guild of Educators in Tesol International Research Journal 3 (1):123-153.
    Recognition plays an important role in the employee’s job satisfaction and performance, yet many employees remain unnoticed for their hard work, effort and contributions. This study investigates the consequences of unrecognized efforts on the job satisfaction of Traffic Management Group (TMG) employees in the Municipality of Lemery, Batangas. Through qualitative method and case study approach, a semi-structured interviews were conducted with selected TMG employees to explore their experiences and perceptions about their experiences of lack of recognition at work. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  31
    Smart Road Surveillance: Helmet Detection and Triple Ride Detection Using CNN and YOLO.Yerroju Dikshith J. Ranganayaki, Vunnam Poojitha - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):8962-8967.
    Developing countries have always relied on motorcycles as their primary mode of transportation, but unfortunately, the number of motorcycle accidents has been on the rise in recent years. One of the leading causes of fatalities in these accidents is the lack of helmet usage by motorcyclists. To ensure that motorcyclists wear helmets, traditional methods include manual monitoring by traffic police at intersections or the use of CCTV footage to identify those not wearing a helmet. However, these methods require significant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.Vishal Parmar - 2024 - Technosaga 2024 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  34
    Software-Defined Networking for Data Centre Network Management: A Survey.O'Connor Liam - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (11):3580-3586.
    The rapid expansion of cloud computing and big data has placed significant demands on data center networks (DCNs). Traditional network architectures, with their rigid infrastructure and complex management, struggle to cope with the scalability, flexibility, and automation required in modern data centers. Software-Defined Networking (SDN) has emerged as a transformative paradigm that decouples the control and data planes, enabling centralized, programmable, and more efficient network management. This survey explores the application of SDN in data center network management, covering architectural models, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  21
    A Thorough Review of SDN Applications in Managing Data Center Networks.Banerjee Kiara Sunita - 2014 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 1 (1):100-107.
    : Software-Defined Networking (SDN) has emerged as a transformative paradigm in modern data center network (DCN) management, offering unprecedented levels of flexibility, scalability, and automation. This survey presents a thorough review of SDN-based applications specifically tailored for data center environments. We explore how SDN enables dynamic resource allocation, efficient traffic engineering, enhanced security frameworks, and automated fault management, addressing critical challenges faced by traditional DCNs. Various architectural models, controller platforms, and implementation strategies are examined to highlight their impact on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  21
    Artificial Intelligence Based Load Balancing in SDN: A Comprehensive Survey.Kazmi Zayan Irfan - 2015 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 2 (1).
    Software-Defined Networking (SDN) is transforming traditional networking paradigms by decoupling the control plane from the data plane, enabling more flexible and programmable network management. Load balancing, a crucial task in SDN environments, ensures efficient resource utilization and avoids congestion by distributing network traffic effectively across resources. This paper explores the role of Artificial Intelligence (AI) in enhancing load balancing techniques within SDN frameworks. We review various AIdriven strategies, including machine learning, reinforcement learning, and deep learning, assessing their benefits and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  48
    Advanced IoT-Based Automotive Accident Detection and Intimation System for Enhanced Emergency Response and Safety.P. Jeevitha - 2025 - Journal of Artificial Intelligence and Cyber Security (Jaics) 9 (1):1-7.
    Road traffic accidents are one of the leading causes of death and severe injury globally, primarily due to delayed emergency responses. The time immediately following a traumatic injury, known as the "golden hour," is critical for administering medical aid, significantly enhancing survival rates. To address the urgent need for rapid response mechanisms, this paper presents an advanced Internet of Things (IoT)-based Automotive Accident Detection and Intimation (ADI) system. The proposed system leverages a combination of embedded and connected smartphone sensors (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  62
    Data Compression for Backbone Networking.K. Sadanandam - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-15.
    . The surge in data traffic strains backbone networks, causing congestion, latency, and higher costs. This project proposes a data compression system tailored for backbone networks, utilizing Lempel-Ziv (LZ) and Huffman encoding to enhance processing time and network efficiency. Adaptive features allow the system to respond to network conditions, ensuring scalability and cost-effectiveness. The primary objective is to optimize network performance by reducing data packet size, increasing throughput, lowering latency, and reducing energy use.
    Download  
     
    Export citation  
     
    Bookmark  
  34. The Ant Trap: Rebuilding the Foundations of the Social Sciences.Brian Epstein - 2015 - New York, NY: Oxford University Press.
    We live in a world of crowds and corporations, artworks and artifacts, legislatures and languages, money and markets. These are all social objects — they are made, at least in part, by people and by communities. But what exactly are these things? How are they made, and what is the role of people in making them? In The Ant Trap, Brian Epstein rewrites our understanding of the nature of the social world and the foundations of the social sciences. Epstein explains (...)
    Download  
     
    Export citation  
     
    Bookmark   161 citations  
  35. A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of (...)
    Download  
     
    Export citation  
     
    Bookmark   93 citations  
  36. Compositionality in visual perception.Alon Hafri, E. J. Green & Chaz Firestone - 2023 - Behavioral and Brain Sciences 46:e277.
    Quilty-Dunn et al.'s wide-ranging defense of the Language of Thought Hypothesis (LoTH) argues that vision traffics in abstract, structured representational formats. We agree: Vision, like language, is compositional – just as words compose into phrases, many visual representations contain discrete constituents that combine in systematic ways. Here, we amass evidence extending this proposal, and explore its implications for how vision interfaces with the rest of the mind.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Evaluating and rating the safety benefits of advanced vehicle technologies: developing a transparent approach and consumer messaging to maximize benefit.Bruce Mehler, Pnina Gershon & Bryan Reimer - 2023 - Proceedings of the 27Th International Technical Conference on the Enhanced Safety of Vehicles (Esv).
    In 2012, a major traffic safety organization tasked the MIT AgeLab with developing a data-driven system for rating the effectiveness of new technologies intended to improve safety. Such a system was envisioned as having the potential to educate and guide consumers towards more confident and strategic purchasing decisions, ideally encouraging adoption of technologies with demonstrated safety benefit. In addition, an evaluation of the status and extent of existing data was seen as a way of identifying research gaps in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Bayesian Epistemology.Alan Hájek & Stephan Hartmann - 1992 - In Jonathan Dancy & Ernest Sosa, A Companion to Epistemology. Malden, MA: Wiley-Blackwell.
    Bayesianism is our leading theory of uncertainty. Epistemology is defined as the theory of knowledge. So “Bayesian Epistemology” may sound like an oxymoron. Bayesianism, after all, studies the properties and dynamics of degrees of belief, understood to be probabilities. Traditional epistemology, on the other hand, places the singularly non-probabilistic notion of knowledge at centre stage, and to the extent that it traffics in belief, that notion does not come in degrees. So how can there be a Bayesian epistemology?
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  39. Epistemic Elitism and Other Minds.Elijah Chudnoff - 2018 - Philosophy and Phenomenological Research (2):276-298.
    Experiences justify beliefs about our environment. Sometimes the justification is immediate: seeing a red light immediately justifies believing there is a red light. Other times the justification is mediate: seeing a red light justifies believing one should brake in a way that is mediated by background knowledge of traffic signals. How does this distinction map onto the distinction between what is and what isn't part of the content of experience? Epistemic egalitarians think that experiences immediately justify whatever is part (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  40. A Beginner’s Guide to Crossing the Road: Towards an Epistemology of Successful Action in Complex Systems.Ragnar van Der Merwe & Alex Broadbent - 2024 - Interdisciplinary Science Reviews 49 (5):460-475.
    Crossing the road within the traffic system is an example of an action human agents perform successfully day-to-day in complex systems. How do they perform such successful actions given that the behaviour of complex systems is often difficult to predict? The contemporary literature contains two contrasting approaches to the epistemology of complex systems: an analytic and a post-modern approach. We argue that neither approach adequately accounts for how successful action is possible in complex systems. Agents regularly perform successful actions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Regulative Rules: A Distinctive Normative Kind.Reiland Indrek - 2024 - Philosophy and Phenomenological Research 108 (3):772-791.
    What are rules? In this paper I develop a view of regulative rules which takes them to be a distinctive normative kind occupying a middle ground between orders and normative truths. The paradigmatic cases of regulative rules that I’m interested in are social rules like rules of etiquette and legal rules like traffic rules. On the view I’ll propose, a rule is a general normative content that is in force due to human activity: enactment by an authority or acceptance (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  43. AI-Driven Smart Parking Systems: Optimizing Urban Parking Efficiency and Reducing Congestion.Eric Garcia - manuscript
    Urban parking systems are a significant contributor to traffic congestion and driver frustration, with studies showing that up to 30% of urban traffic is caused by drivers searching for parking. Traditional parking systems often lack real-time data and adaptability, leading to inefficiencies such as overfilled lots and underutilized spaces. This paper explores how Artificial Intelligence (AI) and IoT technologies can optimize urban parking by enabling real-time parking space detection, demand forecasting, and dynamic pricing. By integrating data from IoT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...), detect anomalies, and identify advanced cyber threats with high accuracy. Unlike rule-based IDS, which rely on static signatures, our model continuously learns from real-time data, improving detection rates while reducing false alarms. The proposed AI-IDS is optimized for cloud infrastructure, ensuring low-latency threat detection, minimal computational burden, and real-time adaptability to emerging attack patterns. Experimental validation on benchmark datasets demonstrates significant improvements in accuracy, precision, and scalability, making AI-powered IDS a crucial innovation in cloud security. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  45. Causation and Determinable Properties : On the Efficacy of Colour, Shape, and Size.Tim Crane - 2008 - In Jakob Hohwy & Jesper Kallestrup, Being Reduced: New Essays on Reduction, Explanation, and Causation. New York: Oxford University Press. pp. 176-195.
    This paper presents a puzzle or antinomy about the role of properties in causation. In theories of properties, a distinction is often made between determinable properties, like red, and their determinates, like scarlet (see Armstrong 1978, volume II). Sometimes determinable properties are cited in causal explanations, as when we say that someone stopped at the traffic light because it was red. If we accept that properties can be among the relata of causation, then it can be argued that there (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  46. Does Pornography Presuppose Rape Myths?Richard Kimberly Heck - 2024 - Pacific Philosophical Quarterly 105 (1):50-74.
    Rae Langton and Caroline West argue that pornography silences women by presupposing misogynistic attitudes, such as that women enjoy being raped. More precisely, they claim that a somewhat infamous pictorial, ‘Dirty Pool’, makes such presuppositions, and that it is typical in this respect. I argue for four claims. (1) There are empirical reasons to doubt that women are silenced in the way that Langton and West claim they are. (2) There is no evidence that very much pornography makes the sorts (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. ITS for Data Manipulation Language (DML) Commands Using SQLite.Mahmoud Jamal Abu Ghali & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):57-92.
    In many areas, technology has facilitated many things, diagnosing diseases, regulating traffic and teaching students in schools rely on Intelligent systems to name a few. At present, traditional classroom-based education is no longer the most appropriate in schools. From here, the idea of intelligent e-learning for students to increase their culture and keep them updated in life began. E-learning has become an ideal solution, relying on artificial intelligence, which has a footprint in this through the development of systems based (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  48. Conceptual Schemes and Conventionalism.Jonathan Y. Tsou - forthcoming - In Stephanie Collins, Brian Epstein, Sally Haslanger & Hans B. Schmid, Oxford Handbook of Social Ontology. Oxford University Press.
    In this chapter, I critically examine issues relevant to the construction and reality of social categories, focusing on issues concerning conceptual schemes and conventionalism. Conceptual schemes (‘paradigms,’ ‘linguistic frameworks,’ ‘forms of life’) are systems of concepts that organize and give (intersubjective) meaning to empirical experience. In discussions about the construction of social categories, a common assumption is that social categories and kinds (e.g., ‘money,’ ‘marriage,’ ‘liberal’) require the presupposition of a conceptual scheme that gives meaning to those terms. One prominent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Crash Algorithms for Autonomous Cars: How the Trolley Problem Can Move Us Beyond Harm Minimisation.Dietmar Hübner & Lucie White - 2018 - Ethical Theory and Moral Practice 21 (3):685-698.
    The prospective introduction of autonomous cars into public traffic raises the question of how such systems should behave when an accident is inevitable. Due to concerns with self-interest and liberal legitimacy that have become paramount in the emerging debate, a contractarian framework seems to provide a particularly attractive means of approaching this problem. We examine one such attempt, which derives a harm minimisation rule from the assumptions of rational self-interest and ignorance of one’s position in a future accident. We (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Distributive justice as an ethical principle for autonomous vehicle behavior beyond hazard scenarios.Manuel Dietrich & Thomas H. Weisswange - 2019 - Ethics and Information Technology 21 (3):227-239.
    Through modern driver assistant systems, algorithmic decisions already have a significant impact on the behavior of vehicles in everyday traffic. This will become even more prominent in the near future considering the development of autonomous driving functionality. The need to consider ethical principles in the design of such systems is generally acknowledged. However, scope, principles and strategies for their implementations are not yet clear. Most of the current discussions concentrate on situations of unavoidable crashes in which the life of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
1 — 50 / 147