17 research outputs found

    Enhanced Traffic Management Procedures of Connected and Autonomous Vehicles in Transition Areas

    Get PDF
    In light of the increasing trend towards vehicle connectivity and automation, there will be areas and situations on the roads where high automation can be granted, and others where it is not allowed or not possible. These are termed ‘Transition Areas’. Without proper traffic management, such areas may lead to vehicles issuing take-over requests (TORs), which in turn can trigger transitions of control (ToCs), or even minimum-risk manoeuvres (MRMs). In this respect, the TransAID Horizon 2020 project develops and demonstrates traffic management procedures and protocols to enable smooth coexistence of automated, connected, andconventional vehicles, with the goal of avoiding ToCs and MRMs, or at least postponing/accommodating them. Our simulations confirmed that proper traffic management, taking the traffic mix into account, can prevent drops in traffic efficiency, which in turn leads to a more performant, safer, and cleaner traffic system, when taking the capabilities of connected and autonomous vehicles into account

    TransAID Deliverable 6.2/2 - Assessment of Traffic Management Procedures in Transition Areas

    Get PDF
    This Deliverable 6.2 of the TransAID project presents and evaluates the simulation results obtained for the scenarios considered during the project's first and second iterations. To this end, driver- and AV-models designed in WP3, traffic management procedures developed in WP4, and V2X communication protocols and models from WP5 were implemented within the iTETRIS simulation framework. Previous main results from Deliverable 4.2, where baseline and traffic management measures without V2X communication were compared, have been confirmed. While not all TransAID scenarios' traffic KPIs were affected, the realistic simulation of V2X communication has shown a discernible impact on some of them, which makes it an indispensable modelling aspect for a realistic performance evaluation of V2X traffic scenarios. Flaws of the first iteration's traffic management algorithms concerning wireless V2X communication and the accompanying possibility of packet loss were identified and have been addressed during the project's second iteration. Finally, lessons learned while working on these simulation results and assessments have additionally been described in the form of recommendations for the real-world prototype to be developed in WP7. We conclude that all results obtained for all scenarios when employing ideal communication confirmed the statistical trends of the results from the original TM scenarios as reported in Deliverable 4.2 where no V2X communication was considered. Furthermore, the performance evaluation of the considered scenarios and parameter combinations has shown the following, which held true in both the first and second iterations: (1) The realistic simulation of V2X communication has an impact on traffic scenarios, which makes them indispensable for a realistic performance evaluation of V2X traffic scenarios. (2) Traffic management algorithms need to account for sporadic packet loss of various message types in some way. (3) Although important, the realistic modelling and simulation of V2X communication also induces a significant computational overhead. Thus, from a general perspective, a trade-off between computation time and degree of realism should be considered

    Security in IoMT Communications: A Survey

    No full text
    The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various network layers creates new opportunities for remote adversaries. Since most of the communication protocols have not been specifically designed for the needs of connected medical devices, there is a need to classify the available IoT communication technologies in terms of security. In this paper we classify IoT communication protocols, with respect to their application in IoMT. Then we describe the main characteristics of IoT communication protocols used at the perception, network and application layer of medical devices. We examine the inherent security characteristics and limitations of IoMT-specific communication protocols. Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps

    Critical infrastructure monitoring using UAV imagery

    No full text
    The constant technological evolution in Computer Vision enabled the development of new techniques which in conjunction with the use of Unmanned Aerial Vehicles (UAVs) may extract high quality photogrammetric products for several applications. Dense Image Matching (DIM) is a Computer Vision technique that can generate a dense 3D point cloud of an area or object. The use of UAV systems and DIM techniques is not only a flexible and attractive solution to produce accurate and high qualitative photogrammetric results but also is a major contribution to cost effectiveness. In this context, this study aims to highlight the benefits of the use of the UAVs in critical infrastructure monitoring applying DIM. A Multi-View Stereo (MVS) approach using multiple images (RGB digital aerial and oblique images), to fully cover the area of interest, is implemented. The application area is an Olympic venue in Attica, Greece, at an area of 400 acres. The results of our study indicate that the UAV+DIM approach respond very well to the increasingly greater demands for accurate and cost effective applications when provided with, a 3D point cloud and orthomosaic

    Upper limb segment loading : the effect of training on the throwing velocity of novice handball players

    No full text
    Revue de littérature de différentes méthodes testées pour améliorer la performance en lancer dans plusieurs sports et particulièrement en handball. Evaluation d'une méthode utilisant des charges externes sur les bras et les avant-bras à l'entraînement

    From Automated to Manual - Modeling Control Transitions with SUMO

    Get PDF
    Transitions of Control (ToC) play an important role in the simulative impact assessment of automated driving because they may represent major perturbations of smooth and safe traffic operation. The drivers' efforts to take back control from the automation are accompanied by a change of driving behavior and may lead to increased error rates, altered headways, safety critical situations, and, in the case of a failing takeover, even to minimum risk maneuvers. In this work we present modeling approaches for these processes, which have been introduced into SUMO recently in the framework of the TransAID project. Further, we discuss the results of an evaluation of some hierarchical traffic management (TM) procedures devised to ameliorate related disturbances in transition areas, i.e., zones of increased probability for the automation to request a ToC

    The combination of gemcitabine and carboplatin as first-line treatment in patients with advanced urothelial carcinoma: A Phase II study of the Hellenic Cooperative Oncology Group

    No full text
    BACKGROUND. The toxicity of platinum-based combinations represents a common problem for patients with advanced urothelial carcinoma. The authors previously reported encouraging efficacy for the combination of carboplatin and gemcitabine in patients considered to be unfit for cisplatin-based treatment. The objective of the current multicenter Phase II study was to evaluate the safety and efficacy of the combination of gemcitabine and carboplatin as first-line treatment in unselected patients with advanced urothelial carcinoma. METHODS. Patients with previously untreated, bidimensionally measurable, inoperable or metastatic urothelial carcinoma were treated with carboplatin, area under the concentration curve of 5 (Day 1) and gemcitabine at a dose of 1000 mg/m2 (Days 1 and 8), every 21 days for a total of 6 cycles. RESULTS. Sixty patients (49 men and 11 women, with a median age of 69 yrs) were enrolled in the current study. Intent-to-treat analysis demonstrated an objective response rate (ORR) of 38.4% (95% confidence interval [95% CI], 26-51.8%) (11.7% complete responses and 26.7% partial responses). The median time to disease progression was 7.6 months (95% CI, 4.5-10.7 mos) and the median overall survival was 16.3 months (95% CI, 12-20.6 mos). The median survival was comparable to that reported for the combination of methotrexate, vinblastine, doxorubicin, and cisplatin (M-VAC) according to the Memorial Sloan-Kettering Cancer Center prognostic model for patients with similar baseline prognostic features. Grade 3 or 4 toxicity (according to the National Cancer Institute Common Toxicity Criteria [version 2.0]) included anemia (18%), thrombocytopenia (23%), and neutropenia (52%), with 7 episodes of febrile neutropenia (11%) reported. Nonhematologic toxicity was rare. One toxic death occurred during the study. CONCLUSIONS. The combination of gemcitabine and carboplatin appears to have considerable activity as the first-line treatment of unselected patients with advanced urothelial carcinoma with manageable toxicity, and deserves further evaluation in this setting. © 2005 American Cancer Society

    Enhanced Traffic Management Procedures in Transition Areas

    Get PDF
    In light of the increasing trend towards vehicle connectivity and automation, there will be areas and situations on the roads where high automation can be granted, and others where it is not allowed or not possible. These are termed "Transition Areas". Without proper traffic management, such areas may lead to vehicles issuing take-over requests (TORs), which in turn can trigger transitions of control (ToCs), or even minimum-risk manoeuvres (MRMs). In this respect, the TransAID Horizon 2020 project develops and demonstrates traffic management procedures and protocols to enable smooth coexistence of automated, connected, and conventional vehicles, with the goal of avoiding ToCs and MRMs, or at least postponing/accommodating them. Our baseline simulations confirmed that a coordinated distribution of takeover events can prevent a drop in traffic efficiency, which in turn leads to a more performant, safer, and cleaner traffic system, when taking the capabilities of connected and autonomous vehicles into account

    TransAID Deliverable 3.2: Cooperative maneuvring in the presence of hierarchical traffic management (2nd iteration)

    Get PDF
    This present document is Deliverable D3.2 entitled "Cooperative manoeuvring in the presence of hierarchical traffic management", which was prepared in the context of the WP3 framework of the TransAID project. The scope of this document encompasses the modelling and simulation of cooperative manoeuvring in the context of the microscopic traffic simulation activities conducted within TransAID. Initially, the state of the art in the domain of cooperative manoeuvring is provided and then two different cooperative manoeuvring frameworks are introduced. The first one is a decentralized framework where cooperative manoeuvring is solely based on vehicle-to-vehicle (V2V) communications, while the second one is a centralized framework that utilizes vehicle-toanything (V2X) communications. A work zone scenario is used to elaborate on the operation of the centralized approach. The logic for simulating the decentralized approach in the microscopic traffic simulator SUMO is subsequently introduced along with the corresponding functionalities that were developed within SUMO for this purpose. Cooperative manoeuvring is coupled with hierarchical traffic management by explaining how the decentralized approach can be integrated in the traffic management plans that were developed for each use case examined in the context of TransAID. Cooperative manoeuvring is coupled with traffic separation in SUMO and a timeline of cooperative manoeuvring actions in the simulation is presented. Coupling with communications is also addressed. Moreover, adaptations to the driver-vehicle models encompassing communication requirements are proposed to enable integration in iTETRIS. Finally, recommendations for finetuning of driver-vehicle models in simulation are provided based on the findings of the real-world prototype experiments
    corecore