Wednesday November 22, 2017
Home India To avoid coll...

To avoid colliding with Cows on road, Indian Engineers develop real-time Automatic Obstacle Detection and Alert system

0
45
Cows in India, Wikimedia

Ahmedabad, April 8, 2017: Indian engineers have developed a real-time automatic obstacle detection and alert system to help cars avoid colliding with cows on the road, a common sight in this part of the world.

The system uses a dashboard camera and an algorithm that can determine whether an object near the vehicle is an on-road cow and whether or not its movements represent a risk to the vehicle.

A timely audio or visual indicator can then be triggered to nudge the driver to apply the brakes whether or not they have seen the animal.

“The proposed system has achieved an overall efficiency of 80 per cent in terms of cow detection,” the researchers said in a study published in the Indonesian Journal of Electrical Engineering and Computer Science.

According to researchers Sachin Sharma and Dharmesh Shah of the Department of Electronics & Communication, at Gujarat Technological University in Ahmedabad, the proposed system is a low-cost, highly reliable system which can easily be implemented in automobiles for detection of cow or any other animal after proper training and testing on the highway.

The algorithm requires optimisation and the issue of night-time driving is yet to be addressed, the team said in an article in International Journal of Vehicle Autonomous Systems. (IANS)

Next Story

Rebecca Portnoff: A Doctoral Candidate from US Fights Human Trafficking Using Algorithms

Rebecca Portnoff has developed two algorithms aimed to fight human trafficking

0
54
Ethnic Uighur Muslim boy stands inside a police van in Khlong Hoi Khong of southern Songkhla province, Thailand. He was in a group of 200 people rescued from a human trafficking camp
Ethnic Uighur Muslim boy stands inside a police van in Khlong Hoi Khong of southern Songkhla province, Thailand. He was in a group of 200 people rescued from a human trafficking camp. VOA
  • The new research uses an algorithm that analyzes writing styles to identify authors and could be applied to online trafficking ads
  • A second algorithm can use time stamps to trace ad payments to accounts known as wallets at Bitcoin

A U.S. researcher Rebecca Portnoff says that she has developed automated ways to identify links between online sex trafficking ads and the digital currency Bitcoin, techniques that may help locate children being sold for sex.

Law enforcement and anti-trafficking groups could use the methods to investigate Backpage.com, an online classified advertising site where sex ads can be found, according to a statement by the University of California Berkeley, where the research was based.

About 1.5 million people in the United States are victims of human trafficking, mostly for sexual exploitation, according to anti-trafficking groups.

Most sex trafficking victims are children, and most are advertised or sold online, according to a U.S. Senate subcommittee report released this year.

Algorithms do the digging

The new research uses an algorithm that analyzes writing styles to identify authors and could be applied to online trafficking ads, Rebecca Portnoff, its lead author, said Thursday.

A second algorithm can use time stamps to trace ad payments to accounts, known as wallets, at Bitcoin, a web-based digital currency that allows money to move quickly and anonymously.

Comparing time stamps of ad purchases on Bitcoin and time stamps and information on Backpage ads could help identify who is paying for them, said Rebecca Portnoff, a UC Berkeley doctoral candidate in computer science who developed the techniques as part of her dissertation.

“Where previously you might have five different phone numbers that you had no idea were connected when you can see that they all came from the same wallets, that the same person paid for them, that’s a concrete sign that these five phone numbers are all related to each other,” Rebecca Portnoff said.

Rebecca Portnoff added, “I knew this was an issue that law enforcement was especially interested in.”

ALSO READ: Human Trafficking is one of the most derogatory Criminal Activities, should be Nipped in the Bud

Boost for law enforcement

Having automated style and time stamp analyses to identify sex ads by authors and Bitcoin owners is significant, said Damon McCoy, a New York University Tandon School of Engineering assistant professor of computer science and engineering and a co-author of the research.

“Any technique that can surface commonalities between ads and potentially shed light on the owners is a big boost for those working to curb exploitation,” McCoy said in a statement.

The National Center for Missing and Exploited Children has said more than 70 percent of the reports it gets of trafficked children involve Backpage, based in Dallas, Texas.

Backpage did not respond to a request for comment.

The findings will be published by the Association for Computing Machinery’s Conference on Knowledge Discovery and Data Mining, UC Berkeley said.

It said the work was funded by the Amazon Web Services Cloud Credits for Research Program, the technology, and security firm Giant Oak, Google, the National Science Foundation and the U.S. Department of Education. (VOA)

Next Story

Can Flourishing Islamic State (ISIS) be Stopped in Afghanistan?

The truth about IS and Afghanistan is definitely no picnic

0
86
Taliban fighters react to a speech by their senior leader in the Shindand district of Herat province, Afghanistan, May 27, 2016.
Taliban fighters react to a speech by their senior leader in the Shindand district of Herat province, Afghanistan, May 27, 2016. The rise of IS in Afghanistan has become such a priority that U.S. and Afghan forces sometimes support the Taliban while battling IS, VOA
  • Depending on the location, the proliferation of IS has drawn varied resistance from the Afghan military, U.S. air support and ground troops, local militias, Taliban forces and other militant groups
  • Afghan army planes on Wednesday night accidentally air dropped vital supplies of food and water to IS militants in the Darzab district of northern Jouzjan province instead of to their own besieged troops
  • In the Tora Bora area, where IS has made a strong stand in recent days, local villagers and militias joined with Taliban to rout IS

June 25, 2017: The Islamic State group is rapidly expanding in parts of Afghanistan, advancing militarily into areas where it once had a weak presence and strengthening its forces in core regions, according to Afghan and U.S. officials.

Depending on the location, the proliferation of IS has drawn varied resistance from the Afghan military, U.S. air support and ground troops, local militias, Taliban forces and other militant groups.

Attacking IS has become such a priority in the country, that disparate forces sometimes join together in the ad-hoc fight, with Afghan and U.S. forces finding themselves inadvertently supporting the enemy Taliban in battling IS.

Confusion leads to mistakes

All too often, officials say, mistakes are made due to confusion on the ground.

Afghan army planes on Wednesday night accidentally air dropped vital supplies of food and water to IS militants in the Darzab district of northern Jouzjan province instead of to their own besieged troops, provincial police chief, Rahmatullah Turkistani told VOA. The supplies were meant to help Afghan forces that are countering twin attacks by IS and Taliban militants but were used instead by IS.

“It’s not getting better in Afghanistan in terms of IS,” U.S. Chief Pentagon Spokeswoman Dana White told VOA this week. “We have a problem, and we have to defeat them and we have to be focused on that problem.”

Reinforcements for the IS cause reportedly are streaming into isolated areas of the country from far and wide. There are reports of fighters from varied nationalities joining the ranks, including militants from Pakistan, India, Iran, Iraq, Syria, Russia and Central Asian neighbors.

Confusing scenarios

Still, the Islamic State-Khorasan (ISK) as IS is known in Afghanistan remains a fragmented group composed of differing regional forces with different agendas in different parts of the country.

“IS-K is still conducting low-level recruiting and distribution of propaganda in various provinces across Afghanistan, but it does not have the ability or authority to conduct multiple operations across the country,” a recent Pentagon report said. But where it operates, IS is inflicting chaos and casualties and causing confusing scenarios for disparate opponents.

In the Tora Bora area, where IS has made a strong stand in recent days, local villagers and militias joined with Taliban to rout IS. IS regained ground after a few days, leading to U.S. military air attacks on IS positions in conjunction with Afghan intelligence instructions and army operations.

IS fighters reportedly have fled from mountain caves of Tora Bora, where al-Qaida’s leader Osama bin Laden hid from U.S. attack in 2001.

Families displaced

IS fighters were also reportedly advancing in neighboring Khogyani district, displacing hundreds of families, according to district officials. It is one of several areas in Nangarhar province, near the Pakistani border, where IS has been active for over two years.

Fierce clashes in the Chaparhar district of Nangarhar last month left 21 Taliban fighters and seven IS militants dead, according to a provincial spokesman. At least three civilians who were caught in the crossfire were killed and five others wounded.

“IS has overpowered Taliban in some parts of Nangarhar because the Taliban dispatched its elite commando force called Sara Qeta (Red Brigade) to other parts of the country, including some northern provinces to contain the growing influence of IS there,” Wahid Muzhda, a Taliban expert in Kabul, told VOA.

ALSO READ: Flashback to Terror: 1993 Mumbai Blasts Judgement to Hail on June 27 After 24 Years

Recruiting unemployed youths

IS has also expanded in neighboring Kunar province, where, according to provincial police chief, it has a presence in at least eight districts and runs a training base, where foreign members of IS, train new recruits.

Hundreds of miles from Nangarhar, IS is attempting to establish a persistent presence in several northern provinces where it has found a fertile ground for attracting militants and recruiting unemployed youths, mostly between the age of 13 and 20.

IS has been able to draw its members from the Pakistani Taliban fighters, former Afghan Taliban, and other militants who “believe that associating with or pledging allegiance” to IS will further their interests, according to the Pentagon report.

Hundreds of militants have joined IS ranks in northern Jouzjan and Sar-e-Pul province where local militant commanders lead IS-affiliate groups in several districts.

Darzab district

Qari Hekmat, an ethnic Uzbek and former Taliban militant who joined IS a year ago, claims to have up to 500 members, including around 50 Uzbek nationals who are affiliated with the Islamic Movement of Uzbekistan (IMU) — previously associated with al-Qaida and Taliban in Afghanistan.

IS and Taliban are reportedly fighting over the control of Darzab district in Jouzjan which they stormed this week from two different directions and besieged scores of government forces. The Taliban has reportedly captured the center of the district while IS militants control the city outskirts.

Afghanistan faces a continuing threat from as many as 20 insurgent and terrorist networks present or operating in the Afghanistan-Pakistan region, including IS, the Pentagon said.

“In areas where the government has limited influence and control, IS attempts to emerge and expand there,” Ateequllah Amarkhail, an analysts and former Army general in Kabul told VOA.

Hit-and-hide strategy

IS has also claimed responsibility for several recent attacks in urban areas, however, with a hit-and-hide strategy that is proving effective. And it is engaging too in more skirmishes with U.S. forces that initially were sent to the country to help Afghan forces halt the spread of Taliban.

Three American service members based in eastern Afghanistan were killed in April during operations targeting IS militants, according to the Pentagon.

“ISIS-K remains a threat to Afghan and regional security, a threat to U.S. and coalition forces, and it retains the ability to conduct high-profile attacks in urban centers,” the Pentagon said. (VOA)

Next Story

Satellite sends First Quantum Signal to Earth

This is a big step towards achieving a secure and developed way to encrypt communications because ever-improving computer algorithms can not crack them

0
136
Micius
Micius satellite. wikimedia
  • An orbiting satellite has sent the first entangled pair of photons to Earth
  • It is a big step towards achieving a secure and developed way to encrypt communications
  • They can not be cracked by ever-improving computer algorithms

June 18, 2017: It was reported by scientists today that an orbiting satellite has sent the first entangled pair of photons to Earth. It is a big step towards sending quantum keys from satellites — an approach that has been heralded as a secure and developed way to encrypt communications because ever-improving computer algorithms can not crack them.

A laser on China’s Micius satellite, which was launched last year and is dedicated to researches related to quantum satellite communications, spit out pairs of entangled photons from its position, 500 km above Earth. Then two telescopes on Earth – about 1200 km apart — had 5 minutes each day to look for them as the satellite passed over both telescopes. It was found that paired photons survived the journey through Earth’s atmosphere. They detected 1 entangled pair per second out of the 6 million sent in that time.

So how exactly does all this work?

A quantum key needs to be generated first by two people who are looking to communicate. Then, one person receives one of the entangled photons in the pair, the other person receives the other. When the received photons have measured the photons, they obtain bits of information strung together to create a key that they both have. That key can be used to encrypt and decrypt a message. The users can also share a portion of the key publicly to check if it has been compromised. In case if someone tries to intercept the communication at any point, they would then notice a difference between their strings.

Also read: NASA’s Curiosity rover finds a Wide Variety of Minerals in Martian Rocks

There is a certain set of problems as well. Caltech’s John Preskill believes even though it is an important proof of concept, the feat doesn’t address one of the biggest problems with quantum communications. Currently, these messages can’t be sent long distances. Photons, using an optical fiber to carry a quantum signal, can only make it about 100 km before the dissipation of the light.

Quantum systems are similar to optical telecommunications here on earth and need repeaters that are able to amplify the message so it can be passed long distances. But amplifying a quantum message in the same way optical ones are done would effectively result in the destruction of the information. That is why satellite-based communication are being eyed by researchers. The reported 500 km from space is an improvement over optical. Quantum signals were measured in another study published today from a satellite 38,000 km away to a single point. But in deploying a global network which would likely be able to combine optical fiber and satellites, the repeater problem still stands.

Preskill has predicted that it is more likely we will first come up with another form of encryption for communication. “There will be other ways of doing classical public key cryptosystems that we won’t know how to break with quantum computers,” he added.

– prepared by Durba Mandal of NewsGram. Twitter: @dubumerang