373 research outputs found

    An adaptive fuzzy logic controller for intelligent networking and control

    Get PDF
    In this thesis, we present a fuzzy logic control scheme to regulate the flow of traffic approaching a set of intersections. An adaptive Fuzzy Logic Traffic Controller (FLTC) is used to adjust the green phase split of the north-south and east-west approaches of a set of traffic signals based on the actual traffic approaching the intersection. Each intersection is coordinated with its neighbouring intersections by adjusting the offset of the local intersection. The offset is adjusted by a local fuzzy logic controller loacted at each intersection. A new fuzzy control scheme, using a supervisory Fuzzy Logic Controller, is also proposed for adjusting the offset. The fuzzy knowledge base of the supervisory Fuzzy Logic Controller is automatically generated by Genetic Algorithms (GAs). The fuzzy rules generated by the integrated Fuzzy Logic and Genetic Algorithm architecture is found to be effective in optimising the traffic flow. The effectiveness of the above fuzzy control scheme is established through simulations of the traffic flow approaching an isolated intersection, two adjacent intersections, and a set of three intersections. The superiority of adjusting offset using a supervisory fuzzy logic controller is established through simulations

    The Impact of Empowering Investors on Trust and Trustworthiness

    Get PDF
    This paper uses laboratory mechanism design in an investment environment to examine the impact of empowering investors with the right to veto the investee’s profit distribution decision on the level of trust and trustworthiness. One of the key findings is that the empowerment of investors through both costless and costly vetoes significantly increases trust by over 30% in both cases. Interestingly, we observe a comparable pattern when the power to veto is removed. Analyses of veto decisions indicate that empowering investors increases both trust and trustworthiness without an undue abuse of the power to veto and that the veto decisions are largely driven by unfair responses, consistent with the theory on inequity aversion.Empowerment; Veto; Investment; Trust; Trustworthiness; Reciprocity

    The Impact of Social Value Orientation and Risk Attitudes on Trust and Reciprocity

    Get PDF
    Prior experimental studies provide evidence that the levels of trust and reciprocity are highly susceptible to individuals’ preferences towards payoffs, prior experience, capacity to learn more about personal characteristics of each other and social distance. The objective of this study is to examine whether social value orientation as developed by Griesinger and Livingstone (1973) and Liebrand (1984) and risk preferences can help to account for the variability of trust and trustworthiness. We use the Berg et al. (1995) investment game to generate indices of trust and reciprocity. Prior to their participation in the investment game, all subjects participated in two other games. One is used to measure their social value orientation (a measure of other regarding behavior) and the second to measure risk attitudes. These variables are introduced as treatments in the analysis of the trust and reciprocity data. In addition to these preference related variables, gender is introduced to capture any differences between men and women which may not be encompassed by value orientation and risk attitudes. The statistical analysis indicates that the social value orientation measure significantly accounts for variation in trust and reciprocity. As well, the level of trust exhibited by an investor significantly affects the reciprocity of the responders and this measure of trust interacts with social value orientation. Individuals who are highly pro-social reciprocate more as the sender’s trust increases, while those who are highly pro-self reciprocate less as the sender’s trust increases. For this sample of participants, the gender variable does not capture any differences in the behavior of men and women that is not already reflected by the differences captured by their value orientations. Risk attitudes do not significantly account for variation in trusting behavior, except for the case where individuals have neither strongly pro-social nor pro-self social value orientations. In this case, more riskseeking individuals are more trusting.Trust, Reciprocity, Social Value Orientation, Risk Attitudes, Gender

    Trust and Reciprocity with Transparency and Repeated Interactions

    Get PDF
    This paper uses data from a controlled laboratory environment to study the impact of transparency (i.e., complete information versus incomplete information) and repeated interactions on the level of trust and trustworthiness in an investment game setting. The key findings of the study are that transparency (complete information) significantly increases trusting behavior in one-shot interactions. This result persists in repeated interactions. Further, transparency appears important for trustworthiness in one-shot interactions. In addition, repeated interaction increases trust and reciprocity with or without transparency. These results suggest transparency is important in building trust in business environments such as alliances and joint-ventures which are loosely connected organizational forms that bring together otherwise independent firms. It also provides support for the Sarbanes-Oxley Act of 2002 (SOX) and similar legislation elsewhere which attempt to regain investors’ trust in corporate management and financial markets by stipulating enhanced disclosures.Transparency; Trust; Reciprocity; Repeated interaction; Business Alliances; SOX

    Three-Phase State Estimation for Distribution-Grid Analytics

    Get PDF
    Power-distribution grids consist of assets such as transformers, cables, and switches, of which the proper utilization is essential for the provision of a secure and reliable power supply to end customers. Distribution-system operators (DSOs) are responsible for the operation and maintenance of these assets. Due to the increased use of renewable sources such as wind and solar, grid assets are prone to operation conditions outside safe boundaries, such as overloading, large voltage unbalance, and a rise in voltage. At present, distribution grids are poorly monitored by DSOs, and the above-mentioned problems may thereby go unnoticed until the failure of a critical asset occurs. The deployment of smart meters in distribution grids has enabled measurements of grid variables such as power, current, and voltage. However, their measurements are used only for billing purposes, and not for monitoring and improving the operating condition of distribution grids. In this paper, a state-estimation algorithm is proposed that utilizes smart-meter data for offline analysis, and estimates the loading of grid assets and power losses. Single- and three-phase state-estimation algorithms are compared through simulation studies on a real-life low-voltage distribution grid using measured smart-meter data. The three-phase state-estimation algorithm based on the nonlinear weighted least-squares method was found to be more accurate in estimating cable loading and line power losses. The proposed method is useful for DSOs to analyze power flows in their distribution grids and take necessary actions such as grid upgrades or the rerouting of power flows

    Role of parents, teachers at home and school in prevention of female sexual abuse: an analysis

    Get PDF
    Background: Sexual assault is an act performed by one person on another without the person’s consent or on a victim who is incapable of giving consent. The purpose of this article is to analyze the female sexual assault cases reported in one year –and the role of parents, teachers, at home and school in prevention of child sexual abuse.Methods: Data of victims who were admitted in GDMCH in the department of obstetrics and gynaecology in the year 2020 were collected from the medico legal register retrospectively and analyzed.Results: Age wise distribution showed 70% of cases were in the age group 15-19 years. 57% of assaults were with consent and 43% without consent. 93% of the perpetrators were known to the victim. Around 48% of the assaults were multiple episodes by a single perpetrator. The place of assault in 39% of cases was perpetrator’s house, 35% was in friend’s or relative’s house.Conclusions: 86% of the victims were <19 years of age, hence, educational awareness services are to be given to high school students and teachers .School authorities and teachers should implement strict vigilance against improper use of the internet and mobile phones by the students. Most common location of assault was the perpetrator's house (39%), followed by their friend’s house (22%). Hence parents should take every care to watch over the child and never leave them unsupervised.

    INTENT-AWARE FLOW REDIRECT USING SINGLE-HOP INTERNET CONTROL MESSAGE PROTOCOL (ICMP) EXTENSION

    Get PDF
    Techniques presented herein provide for a Control Agent that monitors flow distribution and Smart Network Interface Card (sNIC) capability and utilizes a simple Internet Control Message Protocol (ICMP) extension to instruct upstream node(s) to redirect traffic over other sNIC connected link(s). The techniques may be utilized for both Layer 2 (L2) and Layer 3 (L3) links and may provide a novel mechanism to leverage an sNIC for flow-based/intent-based/capability-aware load balancing and/or policy-balancing
    • …
    corecore