22,899 research outputs found

    A novel Big Data analytics and intelligent technique to predict driver's intent

    Get PDF
    Modern age offers a great potential for automatically predicting the driver's intent through the increasing miniaturization of computing technologies, rapid advancements in communication technologies and continuous connectivity of heterogeneous smart objects. Inside the cabin and engine of modern cars, dedicated computer systems need to possess the ability to exploit the wealth of information generated by heterogeneous data sources with different contextual and conceptual representations. Processing and utilizing this diverse and voluminous data, involves many challenges concerning the design of the computational technique used to perform this task. In this paper, we investigate the various data sources available in the car and the surrounding environment, which can be utilized as inputs in order to predict driver's intent and behavior. As part of investigating these potential data sources, we conducted experiments on e-calendars for a large number of employees, and have reviewed a number of available geo referencing systems. Through the results of a statistical analysis and by computing location recognition accuracy results, we explored in detail the potential utilization of calendar location data to detect the driver's intentions. In order to exploit the numerous diverse data inputs available in modern vehicles, we investigate the suitability of different Computational Intelligence (CI) techniques, and propose a novel fuzzy computational modelling methodology. Finally, we outline the impact of applying advanced CI and Big Data analytics techniques in modern vehicles on the driver and society in general, and discuss ethical and legal issues arising from the deployment of intelligent self-learning cars

    A Survey of Location Prediction on Twitter

    Full text link
    Locations, e.g., countries, states, cities, and point-of-interests, are central to news, emergency events, and people's daily lives. Automatic identification of locations associated with or mentioned in documents has been explored for decades. As one of the most popular online social network platforms, Twitter has attracted a large number of users who send millions of tweets on daily basis. Due to the world-wide coverage of its users and real-time freshness of tweets, location prediction on Twitter has gained significant attention in recent years. Research efforts are spent on dealing with new challenges and opportunities brought by the noisy, short, and context-rich nature of tweets. In this survey, we aim at offering an overall picture of location prediction on Twitter. Specifically, we concentrate on the prediction of user home locations, tweet locations, and mentioned locations. We first define the three tasks and review the evaluation metrics. By summarizing Twitter network, tweet content, and tweet context as potential inputs, we then structurally highlight how the problems depend on these inputs. Each dependency is illustrated by a comprehensive review of the corresponding strategies adopted in state-of-the-art approaches. In addition, we also briefly review two related problems, i.e., semantic location prediction and point-of-interest recommendation. Finally, we list future research directions.Comment: Accepted to TKDE. 30 pages, 1 figur

    Computational Modelling of Wing Downwash Profile with Reynolds-Averaged and Delayed Detached-Eddy Simulations

    Get PDF
    This paper describes the computational model to predict downwash for a conventional fixed wing configuration at flight scales (ReMAC = 2.26 × 107 ). The lack of resolution in the downwash wake region resulted in an over-dissipation of the turbulent behaviour of airflow in the wing’s wake. This artificially inflates the effectiveness of the horizontal stabilizer where an over-prediction of pitch stiffness was observed. To resolve this over-dissipation, both the Reynolds-Averaged and Delayed Detached-Eddy Simulation methodology were adopted to accurately capture the downwash profile leaving the wing. Comparisons between the estimation of wall shear stresses and viscous wall unit against a ‘first-cut’ simulation are made and discussed. Fundamental features of the downwash profile including the spatial and temporal scales used for the mesh are also presented and detailed in this paper

    Synchronization of spatio-temporal chaos as an absorbing phase transition: a study in 2+1 dimensions

    Full text link
    The synchronization transition between two coupled replicas of spatio-temporal chaotic systems in 2+1 dimensions is studied as a phase transition into an absorbing state - the synchronized state. Confirming the scenario drawn in 1+1 dimensional systems, the transition is found to belong to two different universality classes - Multiplicative Noise (MN) and Directed Percolation (DP) - depending on the linear or nonlinear character of damage spreading occurring in the coupled systems. By comparing coupled map lattice with two different stochastic models, accurate numerical estimates for MN in 2+1 dimensions are obtained. Finally, aiming to pave the way for future experimental studies, slightly non-identical replicas have been considered. It is shown that the presence of small differences between the dynamics of the two replicas acts as an external field in the context of absorbing phase transitions, and can be characterized in terms of a suitable critical exponent.Comment: Submitted to Journal of Statistical Mechanics: Theory and Experimen

    Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks

    Full text link
    This article explores one of the key enablers of beyond 44G wireless networks leveraging small cell network deployments, namely proactive caching. Endowed with predictive capabilities and harnessing recent developments in storage, context-awareness and social networks, peak traffic demands can be substantially reduced by proactively serving predictable user demands, via caching at base stations and users' devices. In order to show the effectiveness of proactive caching, we examine two case studies which exploit the spatial and social structure of the network, where proactive caching plays a crucial role. Firstly, in order to alleviate backhaul congestion, we propose a mechanism whereby files are proactively cached during off-peak demands based on file popularity and correlations among users and files patterns. Secondly, leveraging social networks and device-to-device (D2D) communications, we propose a procedure that exploits the social structure of the network by predicting the set of influential users to (proactively) cache strategic contents and disseminate them to their social ties via D2D communications. Exploiting this proactive caching paradigm, numerical results show that important gains can be obtained for each case study, with backhaul savings and a higher ratio of satisfied users of up to 22%22\% and 26%26\%, respectively. Higher gains can be further obtained by increasing the storage capability at the network edge.Comment: accepted for publication in IEEE Communications Magazin

    Performance of an ideal turbine in an inviscid shear flow

    Get PDF
    Although wind and tidal turbines operate in turbulent shear flow, most theoretical results concerning turbine performance, such as the well-known Betz limit, assume the upstream velocity profile is uniform. To improve on these existing results we extend the classical actuator disc model in this paper to investigate the performance of an ideal turbine in steady, inviscid shear flow. The model is developed on the assumption that there is negligible lateral interaction in the flow passing through the disc and that the actuator applies a uniform resistance across its area. With these assumptions, solution of the model leads to two key results. First, for laterally unbounded shear flow, it is shown that the normalised power extracted is the same as that for an ideal turbine in uniform flow, if the average of the cube of the upstream velocity of the fluid passing through the turbine is used in the normalisation. Second, for a laterally bounded shear flow, it is shown that the same normalisation can be applied, but allowance must also be made for the fact that non-uniform flow bypassing the turbine alters the background pressure gradient and, in turn, the turbines ‘effective blockage’ (so that it may be greater or less than the geometric blockage, defined as the ratio of turbine disc area to cross-sectional area of the flow). Predictions based on the extended model agree well with numerical simulations approximating the incompressible Euler equations. The model may be used to improve interpretation of model-scale results for wind and tidal turbines in tunnels/flumes, to investigate the variation in force across a turbine and to update existing theoretical models of arrays of tidal turbines
    • …
    corecore