3,251 research outputs found

    Fine-grained traffic state estimation and visualisation

    No full text
    Tools for visualising the current traffic state are used by local authorities for strategic monitoring of the traffic network and by everyday users for planning their journey. Popular visualisations include those provided by Google Maps and by Inrix. Both employ a traffic lights colour-coding system, where roads on a map are coloured green if traffic is flowing normally and red or black if there is congestion. New sensor technology, especially from wireless sources, is allowing resolution down to lane level. A case study is reported in which a traffic micro-simulation test bed is used to generate high-resolution estimates. An interactive visualisation of the fine-grained traffic state is presented. The visualisation is demonstrated using Google Earth and affords the user a detailed three-dimensional view of the traffic state down to lane level in real time

    An integrated information management model for proactive prevention of struck-by-falling-object accidents on construction sites

    Get PDF
    The construction industry is one of the most hazardous industries in many countries. Struck-by-falling-object accidents are not given adequate attention even though they are of great importance on construction sites. The objective of this paper is to analyze the proactively preventive information requirement of struck-by-falling-object accidents and propose an integrated information management model using a ZigBee RFID sensor network to fulfill these requirements. First, the frequency of particular type of objects is analyzed based on vast historical accident cases. Next, this paper analyzes the proactively preventive information requirement of struck-by-falling-object accidents and brought forth an integrated information management model. Furthermore, considering the crucial and controllable objects, an integrated information management model is proposed. This study would provide a possible approach for tracking struck-by-falling-object accidents based on real-time information for proactive prevention and could serve as a foundation for further study. © 2012 Elsevier B.V. All rights reserved

    Parking lot monitoring system using an autonomous quadrotor UAV

    Get PDF
    The main goal of this thesis is to develop a drone-based parking lot monitoring system using low-cost hardware and open-source software. Similar to wall-mounted surveillance cameras, a drone-based system can monitor parking lots without affecting the flow of traffic while also offering the mobility of patrol vehicles. The Parrot AR Drone 2.0 is the quadrotor drone used in this work due to its modularity and cost efficiency. Video and navigation data (including GPS) are communicated to a host computer using a Wi-Fi connection. The host computer analyzes navigation data using a custom flight control loop to determine control commands to be sent to the drone. A new license plate recognition pipeline is used to identify license plates of vehicles from video received from the drone

    Electronic Toll Collection System based on Radio Frequency Identification System

    Get PDF
    This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent their valuable time in queue at tollgate due to traffic congestion as well as using traditional manual method in most existing toll ETC system to collect toll from road users. Besides that, the barrier design where each vehicle stop waiting until barrier lift which consider source of time delay. To tackle stated problems, an electronic toll collection system is proposed which based on RFID technology. The integrated system consists of two main sections, electronic sides where all input data received from while database management office is where all necessary information stored. To compare the current ETC system, in this research elaborated internet of things where all data transmit through cloud and then to the main office in real time. Not only that, there is some enhancement based on barrier design where, gate is remained open for all vehicles with sufficient tags without requiring to stop to eliminate time delay.By check system throughput compare to existing toll systems, various tests have been carried out in different method where proposed system throughput much higher percentage the current system

    An Intelligent Reconnaissance Framework for Homeland Security

    Get PDF
    The cross border terrorism and internal terrorist attacks are critical issues for any country to deal with. In India, such types of incidents that breach homeland security are increasing now a day. Tracking and combating such incidents depends only on the radio communications and manual operations of security agencies. These security agencies face various challenges to get the real-time location of the targeted vehicles, their direction of fleeing, etc. This paper proposes a novel application for automatic tracking of suspicious vehicles in real-time. The proposed application tracks the vehicle based on their registration number, type, colour and RFID tag. The proposed approach for vehicle recognition based on image processing achieves 92.45 per cent accuracy. The RFID-based vehicle identification technique achieves 100 per cent accuracy. This paper also proposes an approach for vehicle classification. The average classification accuracy obtained by the proposed approach is 93.3 per cent. An integrated framework for tracking of any vehicle at the request of security agencies is also proposed. Security agencies can track any vehicles in a specific time period by using the user interface of the application

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    One datum and many values for sustainable Industry 4.0: a prognostic and health management use case

    Get PDF
    Industrial context of today, driven by the Industry 4.0 paradigm, is overwhelmed by data. Decreasing cost of innovative technologies, and recent market dynamics have pushed and pulled respectively for those architectures and practices in which data are the masters. While advancing, we have to take care of waste, even though intangibility of data makes them hardly connected to waste. In this paper we are going to reflect on data intensive context of today, focusing on the industrial sector. A smart approach for fully exploiting data collecting infrastructures is proposed, and its declination in a prognostic and health management (PHM) use case set inside an automatic painting system is presented. The contributions of this papers are mainly two: first of all, the general conceptual take-away of "data re-use" is presented and discussed. Moreover, a PHM solution for painting system's number plates, based on optical character recognition (OCR), is proposed and tested as a proof-of-concept for the "data re-use" concept. Summarizing, the already-in-use data sharing principle for achieving transparency and integration inside Industry 4.0, is presented as complementary with the proposed "data re-use", in order to develop a really sustainable shift toward the future

    Basics of Geomatics

    Full text link
    • 

    corecore