50 research outputs found

    Haalbaarheid van dynamisch verkeersmanagement gebaseerd op gegevensuitwisseling tussen een verkeerscentrale en voertuigen

    Get PDF
    In theory data originating from vehicles can be applied to support dynamic traffic management. This concept is called Floating Car Data (FCD), and has been extensively studied for the past decade. The main advantage of an FCD system is that it allows coverage of an extensive area in a short amount of time. This is in contradiction with the approach of extending the classical sensing infrastructure based on inductive loops and cameras. The downside is that the FCD technology is less mature then the classical infrastructure. It is not clear if in reality a FCD system will be able to effectively provide the same services with the same quality as existing systems. The final cost and organizational approach of an FCD roll-out is also uncertain. Hence policy makers face difficulties when deciding rather to invest in the further expansion of the classical infrastructure based on inductive loops and cameras, or to invest in the roll-out of an FCD system. The goal of this report is therefore to provide well-founded insights in the feasibility of using FCD in the context of dynamic traffic management. In contradiction to many existing studies we will adopt a top down approach instead of a bottom up approach. Within this research context we aim to answer the following questions: What are the requirements for the FCD data? What is the required penetration rate? Which data should be part of the FCD samples? What is the sampling and transmission interval? Which functionality can be provided using this data? Are they different for the different types of roads (highway, arterial road, urban environment)? Are there reliability issues? What is the impact of the FCD system on the supporting mobile data network in case of high traffic concentrations? How much will the roll-out of an FCD system cost? How can the roll-out of an FCD system be organized best? To define an answer to these questions the report starts with an extensive literature study. From this study estimations can be derived regarding the first two groups of questions. However, they are not accurate enough. To further refine them a specially developed platform is utilized. This platform is based on microscopic traffic simulation. Concerning the last three groups of questions (impact on the mobile data network, cost, organization), no existing studies could be found in literature. To further research these questions several techniques are applied: an adjusted model for the determination of the load on a mobile data network that was developed in previous work, a specially developed cost model and a specially developed organizational model (so-called value networks). Based on the obtained results it can be concluded that it is best to aim for a FCD configuration with a penetration rate of 1% and a sampling rate of 10 seconds. Samples are first stored locally and contain accurate information regarding position and speed of the vehicle, and exact moment of sampling. Every 30 seconds an aggregate of 3 samples is then sent to the FCD server. During connection setup a security optimization is applied: the so-called SSL restart handshake. An FCD system as described above will be able to make accurate speed estimations in a highway environment. In this environment it will also be able to accurately determine the location of an incident and the tail of a traffic jam. On arterial roads and in urba

    Leveraging upon standards to build the Internet of things

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there were many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. Long time, most efforts were focusing on the networking layer. More recently, the IETF CoRE working group started working on an embedded counterpart of HTTP, allowing the integration of constrained devices into existing service networks. In this paper, we will briefly review the history of integrating constrained devices into the Internet, with a prime focus on the IETF standardization work in the ROLL and CoRE working groups. This is further complemented with some research results that illustrate how these novel technologies can be extended or used to tackle other problems.The research leading to these results has received funding from the European Union's Seventh Framework Programme (FP7/2 007-2013) under grant agreement n°258885 (SPITFIRE project), from the iMinds ICON projects GreenWeCan and O’CareCloudS, and a VLI R PhD scholarship to Isam Ishaq

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Implications of a Behavioral Weight Loss Program for Obese, Sedentary Women: A Focus on Mood Enhancement and Exercise Enjoyment

    Get PDF
    The benefits of a 6-month behavioral weight loss program were investigated by examining mood changes after a graded exercise test (GXT), changes in exercise enjoyment, and the relation of mood and enjoyment to program success. Obese, sedentary, postmenopausal women completed a demographic questionnaire, and physical and psychological measures. Women who completed the program (n = 25) significantly decreased their body weight and body mass index and reported significantly less tension and confusion post-GXT when measured both at the beginning and end of the program. Although their exercise enjoyment increased, their exercise-related mood changes appeared to be independent of enjoyment. Finally, women who completed the program initially reported more positive mood changes post-GXT than did dropouts (n = 7). In conclusion, mood alteration may be a factor leading to successful completion of a behavioral weight loss program by obese women. © 2010 ISSP

    Support of multiple sinks via a virtual root for the RPL routing protocol

    Get PDF
    Data acquisition in large wireless sensor networks consisting of only a single sink can typically lead to scalability and energy efficiency issues. A solution to this problem is the deployment of multiple sinks in the network. This approach is however not supported by the popular sensor network routing protocol, IPv6 routing protocol for low-power and lossy networks (RPL). This paper describes a method to support the usage of multiple sinks for RPL in accordance to the limited guidelines of RPL:IPv6 Routing Protocol for Low-Power and Lossy Networks (RFC 6550). Hereby this paper shows that the concept of a virtual root can work and can be implemented with a minimal complexity. The correct behaviour of this extension was verified, by performance tests, in both a simulation environment and a real-life environment (iMinds wiLab.t office testbed). The chosen approach has the advantage that for an existing deployment of a RPL network, only the sink nodes need to be adapted. The results confirm that the use of multiple sinks in RPL can deliver the desired advantages. For an increase in the number of sinks from 1 to 4, a decrease of about 45% in the maximal and more than 30% in the average energy consumption was obtained in simulations for the used topology. For the real-life tests, the average energy consumption decreased with more than 30% and with more than 50% for the maximal energy consumption when the number of sinks was increased from 1 to 2 on the iMinds wiLab. t office testbed. By using a positioning algorithm to determine the optimal position, for the sinks, possibly even better performances can be obtained
    corecore