Browsing by Author "Asfaw, Biniyam"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Assessment of Stormwater Drainage Systems in Kemise Town(Addis Ababa University, 2016-06) Asfaw, Biniyam; Seleshi, Yilma (PhD)Storm water drainage problem is one of the major challenges facing many countries in Ethiopia in general and kemise also faced the problem. So, the study focuses on the assessment of storm water drainage system in Kemise town using statistical analysis, GIS and other material. A statistical analysis was applied to analyze the existing condition system and to analyze the peak discharge for the town and to fix the diameter of the pipe .GIS software was used to delineate water shed by combining DEM and aerial photograph. Based on primary and secondary data collected, the problems in the areas are categorized as construction, management and design problem. The method used to investigate management problem is direct field data collection and site visit but the construction problem is analyzed using field survey as well as comparison of design with what is implemented in the ground. Design of the study area is evaluated by redesigning of the system using the computation method used in ERA drainage design manual. Design of storm drainage system evaluated in this thesis includes hydraulic performance for existing situation by using manning‟s and fixing new size of reinforced concrete pipe for existing and proposed area. Based on the result of this thesis the drainage system is insufficient at different area and Most of the stations of the catchments were investigated that required construction of additional storm drainage system and its existing coverage and its proposed based on assessing and hydrologic and hydraulic calculation of this study the existing drainage convening capacity is only 19% at different catchment and the other 81% of new drainage system is required for different catchment at existing and proposed. Finally, appropriate mitigation measures were proposed for required 81% of new drainage system in order to serve the area from different negative effect and drainage structures for the future purposes sustainably. Additionally managing and improper construction alignment problem for the existing system were investigated and to avoid this problem periodic cleaning and modification of slope is recommended. Key words; Major problems, Assessment of storm drainage system, statistical analysis, Hydraulic performance, Mitigation measures, Kemise.Item Medical Pervasive Systems(Addis Ababa University, 2007-07) Asfaw, Biniyam; Bekele, Dawit (PhD)Pervasive computing is being applied to different areas of specialization. This is basically because of the features of pervasive computing like context-awareness, invisibility, nonintrusiveness, and mobility. The medical area is one where such devices are hugely deployed. In this case, the pervasive devices; PDA (Personal Digital Assistant), mobile phones and the like, are used for manipulating medical records on the move. The use of pervasive devices also comes with new challenges that did not exist with traditional computing systems. Among these challenges, security is probably the major one. In fact, insuring security with pervasive systems is difficult due to the use of wireless communication, the physical nature and the low processing and low power nature of the devices. In this research, we deal with intrusion detection, ID, to secure such systems. ID Systems, IDSs, are used to monitor a resource and notify someone in the event of a specific occurrence for an appropriate response. Based on attack identification, they can be those which implement misuse detection, matching against known attack patterns, and those which implement anomaly detection, deviation from normal patterns. Misuse detection is used for matching only known patterns of attacks while anomaly detection is capable of identifying new attacks by matching with an already established normal profile. Based on source of information for the IDS, it may be host-based, network-based or application-based. For our case, we deal with application based anomaly detection modeling issues through building normal users’ application usage profilesItem Medical Pervasive Systems(Addis Ababa University, 2007-07) Asfaw, Biniyam; Bekele, Dawit (PhD)Pervasive computing is being applied to different areas of specialization. This is basically because of the features of pervasive computing like context-awareness, invisibility, nonintrusiveness, and mobility. The medical area is one where such devices are hugely deployed. In this case, the pervasive devices; PDA (Personal Digital Assistant), mobile phones and the like, are used for manipulating medical records on the move. The use of pervasive devices also comes with new challenges that did not exist with traditional computing systems. Among these challenges, security is probably the major one. In fact, insuring security with pervasive systems is difficult due to the use of wireless communication, the physical nature and the low processing and low power nature of the devices. In this research, we deal with intrusion detection, ID, to secure such systems. ID Systems, IDSs, are used to monitor a resource and notify someone in the event of a specific occurrence for an appropriate response. Based on attack identification, they can be those which implement misuse detection, matching against known attack patterns, and those which implement anomaly detection, deviation from normal patterns. Misuse detection is used for matching only known patterns of attacks while anomaly detection is capable of identifying new attacks by matching with an already established normal profile. Based on source of information for the IDS, it may be host-based, network-based or application-based. For our case, we deal with application based anomaly detection modeling issues through building normal users’ application usage profiles