Children in Detroit are disproportionately exposed to toxins and pollutants when compared to children who reside in the suburbs,subjecting Detroit children to many health conditions such as asthma and lead poisoning.T...Children in Detroit are disproportionately exposed to toxins and pollutants when compared to children who reside in the suburbs,subjecting Detroit children to many health conditions such as asthma and lead poisoning.This disturbing knowledge was the impetus to focus on looking at GIS datasets that might help start to address the following question:To what extent is the health of Detroit’s children threatened by brownfields in the neighborhoods in which they live and go to school?Three datasets were used to investigate the relationship between under 18 populations and brownfield presence in Detroit.This study was able to identify the potential areas of concern.This study recommends to discern how brownfield may be affecting residents,in particular those residents under the age of 18,by examining smaller areas at a larger scale to get a true picture of the brownfield landscape in Detroit.展开更多
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar...Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.展开更多
文摘Children in Detroit are disproportionately exposed to toxins and pollutants when compared to children who reside in the suburbs,subjecting Detroit children to many health conditions such as asthma and lead poisoning.This disturbing knowledge was the impetus to focus on looking at GIS datasets that might help start to address the following question:To what extent is the health of Detroit’s children threatened by brownfields in the neighborhoods in which they live and go to school?Three datasets were used to investigate the relationship between under 18 populations and brownfield presence in Detroit.This study was able to identify the potential areas of concern.This study recommends to discern how brownfield may be affecting residents,in particular those residents under the age of 18,by examining smaller areas at a larger scale to get a true picture of the brownfield landscape in Detroit.
文摘Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.