22,899 research outputs found
A novel Big Data analytics and intelligent technique to predict driver's intent
Modern age offers a great potential for automatically predicting the driver's intent through the increasing miniaturization of computing technologies, rapid advancements in communication technologies and continuous connectivity of heterogeneous smart objects. Inside the cabin and engine of modern cars, dedicated computer systems need to possess the ability to exploit the wealth of information generated by heterogeneous data sources with different contextual and conceptual representations. Processing and utilizing this diverse and voluminous data, involves many challenges concerning the design of the computational technique used to perform this task. In this paper, we investigate the various data sources available in the car and the surrounding environment, which can be utilized as inputs in order to predict driver's intent and behavior. As part of investigating these potential data sources, we conducted experiments on e-calendars for a large number of employees, and have reviewed a number of available geo referencing systems. Through the results of a statistical analysis and by computing location recognition accuracy results, we explored in detail the potential utilization of calendar location data to detect the driver's intentions. In order to exploit the numerous diverse data inputs available in modern vehicles, we investigate the suitability of different Computational Intelligence (CI) techniques, and propose a novel fuzzy computational modelling methodology. Finally, we outline the impact of applying advanced CI and Big Data analytics techniques in modern vehicles on the driver and society in general, and discuss ethical and legal issues arising from the deployment of intelligent self-learning cars
A Survey of Location Prediction on Twitter
Locations, e.g., countries, states, cities, and point-of-interests, are
central to news, emergency events, and people's daily lives. Automatic
identification of locations associated with or mentioned in documents has been
explored for decades. As one of the most popular online social network
platforms, Twitter has attracted a large number of users who send millions of
tweets on daily basis. Due to the world-wide coverage of its users and
real-time freshness of tweets, location prediction on Twitter has gained
significant attention in recent years. Research efforts are spent on dealing
with new challenges and opportunities brought by the noisy, short, and
context-rich nature of tweets. In this survey, we aim at offering an overall
picture of location prediction on Twitter. Specifically, we concentrate on the
prediction of user home locations, tweet locations, and mentioned locations. We
first define the three tasks and review the evaluation metrics. By summarizing
Twitter network, tweet content, and tweet context as potential inputs, we then
structurally highlight how the problems depend on these inputs. Each dependency
is illustrated by a comprehensive review of the corresponding strategies
adopted in state-of-the-art approaches. In addition, we also briefly review two
related problems, i.e., semantic location prediction and point-of-interest
recommendation. Finally, we list future research directions.Comment: Accepted to TKDE. 30 pages, 1 figur
Computational Modelling of Wing Downwash Profile with Reynolds-Averaged and Delayed Detached-Eddy Simulations
This paper describes the computational model to predict downwash for a conventional
fixed wing configuration at flight scales (ReMAC = 2.26 × 107
). The lack of resolution in the
downwash wake region resulted in an over-dissipation of the turbulent behaviour of airflow
in the wing’s wake. This artificially inflates the effectiveness of the horizontal stabilizer where
an over-prediction of pitch stiffness was observed. To resolve this over-dissipation, both the
Reynolds-Averaged and Delayed Detached-Eddy Simulation methodology were adopted to
accurately capture the downwash profile leaving the wing. Comparisons between the
estimation of wall shear stresses and viscous wall unit against a ‘first-cut’ simulation are made
and discussed. Fundamental features of the downwash profile including the spatial and
temporal scales used for the mesh are also presented and detailed in this paper
Synchronization of spatio-temporal chaos as an absorbing phase transition: a study in 2+1 dimensions
The synchronization transition between two coupled replicas of
spatio-temporal chaotic systems in 2+1 dimensions is studied as a phase
transition into an absorbing state - the synchronized state. Confirming the
scenario drawn in 1+1 dimensional systems, the transition is found to belong to
two different universality classes - Multiplicative Noise (MN) and Directed
Percolation (DP) - depending on the linear or nonlinear character of damage
spreading occurring in the coupled systems. By comparing coupled map lattice
with two different stochastic models, accurate numerical estimates for MN in
2+1 dimensions are obtained. Finally, aiming to pave the way for future
experimental studies, slightly non-identical replicas have been considered. It
is shown that the presence of small differences between the dynamics of the two
replicas acts as an external field in the context of absorbing phase
transitions, and can be characterized in terms of a suitable critical exponent.Comment: Submitted to Journal of Statistical Mechanics: Theory and Experimen
Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks
This article explores one of the key enablers of beyond G wireless
networks leveraging small cell network deployments, namely proactive caching.
Endowed with predictive capabilities and harnessing recent developments in
storage, context-awareness and social networks, peak traffic demands can be
substantially reduced by proactively serving predictable user demands, via
caching at base stations and users' devices. In order to show the effectiveness
of proactive caching, we examine two case studies which exploit the spatial and
social structure of the network, where proactive caching plays a crucial role.
Firstly, in order to alleviate backhaul congestion, we propose a mechanism
whereby files are proactively cached during off-peak demands based on file
popularity and correlations among users and files patterns. Secondly,
leveraging social networks and device-to-device (D2D) communications, we
propose a procedure that exploits the social structure of the network by
predicting the set of influential users to (proactively) cache strategic
contents and disseminate them to their social ties via D2D communications.
Exploiting this proactive caching paradigm, numerical results show that
important gains can be obtained for each case study, with backhaul savings and
a higher ratio of satisfied users of up to and , respectively.
Higher gains can be further obtained by increasing the storage capability at
the network edge.Comment: accepted for publication in IEEE Communications Magazin
Performance of an ideal turbine in an inviscid shear flow
Although wind and tidal turbines operate in turbulent shear flow, most theoretical results concerning turbine performance, such as the well-known Betz limit, assume the upstream velocity profile is uniform. To improve on these existing results we extend the classical actuator disc model in this paper to investigate the performance of an ideal turbine in steady, inviscid shear flow. The model is developed on the assumption that there is negligible lateral interaction in the flow passing through the disc and that the actuator applies a uniform resistance across its area. With these assumptions, solution of the model leads to two key results. First, for laterally unbounded shear flow, it is shown that the normalised power extracted is the same as that for an ideal turbine in uniform flow, if the average of the cube of the upstream velocity of the fluid passing through the turbine is used in the normalisation. Second, for a laterally bounded shear flow, it is shown that the same normalisation can be applied, but allowance must also be made for the fact that non-uniform flow bypassing the turbine alters the background pressure gradient and, in turn, the turbines ‘effective blockage’ (so that it may be greater or less than the geometric blockage, defined as the ratio of turbine disc area to cross-sectional area of the flow). Predictions based on the extended model agree well with numerical simulations approximating the incompressible Euler equations. The model may be used to improve interpretation of model-scale results for wind and tidal turbines in tunnels/flumes, to investigate the variation in force across a turbine and to update existing theoretical models of arrays of tidal turbines
- …