471 research outputs found

    A vehicle-to-infrastructure communication based algorithm for urban traffic control

    Full text link
    We present in this paper a new algorithm for urban traffic light control with mixed traffic (communicating and non communicating vehicles) and mixed infrastructure (equipped and unequipped junctions). We call equipped junction here a junction with a traffic light signal (TLS) controlled by a road side unit (RSU). On such a junction, the RSU manifests its connectedness to equipped vehicles by broadcasting its communication address and geographical coordinates. The RSU builds a map of connected vehicles approaching and leaving the junction. The algorithm allows the RSU to select a traffic phase, based on the built map. The selected traffic phase is applied by the TLS; and both equipped and unequipped vehicles must respect it. The traffic management is in feedback on the traffic demand of communicating vehicles. We simulated the vehicular traffic as well as the communications. The two simulations are combined in a closed loop with visualization and monitoring interfaces. Several indicators on vehicular traffic (mean travel time, ended vehicles) and IEEE 802.11p communication performances (end-to-end delay, throughput) are derived and illustrated in three dimension maps. We then extended the traffic control to a urban road network where we also varied the number of equipped junctions. Other indicators are shown for road traffic performances in the road network case, where high gains are experienced in the simulation results.Comment: 6 page

    A semi-decentralized control strategy for urban traffic

    Get PDF
    We present in this article a semi-decentralized approach for urban traffic control, based on the TUC (Traffic responsive Urban Control) strategy. We assume that the control is centralized as in the TUC strategy, but we introduce a contention time window inside the cycle time, where antagonistic stages alternate a priority rule. The priority rule is set by applying green colours for given stages and yellow colours for antagonistic ones, in such a way that the stages with green colour have priority over the ones with yellow colour. The idea of introducing this time window is to reduce the red time inside the cycle, and by that, increase the capacity of the network junctions. In practice, the priority rule could be applied using vehicle-to-vehicle (v2v) or vehicle-to-infrastructure (v2i) communications. The vehicles having the priority pass almost normally through the junction, while the others reduce their speed and yield the way. We propose a model for the dynamics and the control of such a system. The model is still formulated as a linear quadratic problem, for which the feedback control law is calculated off-line, and applied in real time. The model is implemented using the Simulation of Urban MObility (SUMO) tool in a small regular (American-like) network configuration. The results are presented and compared to the classical TUC strategy.Comment: 16 page

    Word Embeddings for Wine Recommender Systems Using Vocabularies of Experts and Consumers

    Get PDF
    This vision paper proposes an approach to use the most advanced word embeddings techniques to bridge the gap between the discourses of experts and non-experts and more specifically the terminologies used by the twocommunities. Word embeddings makes it possible to find equivalent terms between experts and non-experts, byapproach the similarity between words or by revealing hidden semantic relations. Thus, these controlledvocabularies with these new semantic enrichments are exploited in a hybrid recommendation system incorporating content-based ontology and keyword-based ontology to obtain relevant wines recommendations regardless of the level of expertise of the end user. The major aim is to find a non-expert vocabulary from semantic rules to enrich the knowledge of the ontology and improve the indexing of the items (i.e. wine) and the recommendation process

    Bolstering user authentication: a kernel-based fuzzy-clustering model for typing dynamics

    Get PDF
    In most information systems today, static user authentication is accomplished when the user provides a credential (for example, user ID and the matching password). However, passwords appear to be the most insecure authentication method as they are vulnerable to attacks chiefly caused by poor password hygiene. We contend that an additional, non-intrusive level of security can be achieved by analyzing keystroke biometrics and coming up with a unique biometric template of a user\u27s typing pattern. The paper proposes a new model for representing raw keystroke data collected when analyzing typing biometrics. The model is based on fuzzy sets and kernel functions. The corresponding algorithm is developed. In the static authentication problem, our model demonstrated relatively higher performance than some classic anomaly-detection algorithms, such as Mahalanobis, Manhattan, nearest neighbor, outlier counting, neural network, and the support-vector machine

    Analytical and numerical study of the apparent diffusion coefficient in diffusion MRI at long diffusion times and low b-values

    Get PDF
    Diffusion magnetic resonance imaging provides a measure of the average distance travelled by water molecules in a medium and can give useful information on cellular structure and structural change when the medium is biological tissue. In this paper, two approximate models for the apparent diffusion coefficient at low b-values and long diffusion times are formulated and validated. The first is a steady-state partial differential equation model that gives the steady-state (infinite time) effective diffusion tensor for general cellular geometries. For nearly isotropic diffusion where the intra-cellular compartment consists of non-elongated cells, a second approximate model is provided in the form of analytical formulae for the eigenvalue of the steady-state effective diffusion tensor. Both models are validated by numerical simulations on a variety of cells sizes and shapes

    ATMAD : robust image analysis for Automatic Tissue MicroArray De-arraying

    Get PDF
    International audienceBackground. Over the last two decades, an innovative technology called Tissue Microarray (TMA),which combines multi-tissue and DNA microarray concepts, has been widely used in the field ofhistology. It consists of a collection of several (up to 1000 or more) tissue samples that are assembledonto a single support – typically a glass slide – according to a design grid (array) layout, in order toallow multiplex analysis by treating numerous samples under identical and standardized conditions.However, during the TMA manufacturing process, the sample positions can be highly distorted fromthe design grid due to the imprecision when assembling tissue samples and the deformation of theembedding waxes. Consequently, these distortions may lead to severe errors of (histological) assayresults when the sample identities are mismatched between the design and its manufactured output.The development of a robust method for de-arraying TMA, which localizes and matches TMAsamples with their design grid, is therefore crucial to overcome the bottleneck of this prominenttechnology.Results. In this paper, we propose an Automatic, fast and robust TMA De-arraying (ATMAD)approach dedicated to images acquired with bright field and fluorescence microscopes (or scanners).First, tissue samples are localized in the large image by applying a locally adaptive thresholdingon the isotropic wavelet transform of the input TMA image. To reduce false detections, a parametricshape model is considered for segmenting ellipse-shaped objects at each detected position.Segmented objects that do not meet the size and the roundness criteria are discarded from thelist of tissue samples before being matched with the design grid. Sample matching is performed byestimating the TMA grid deformation under the thin-plate model. Finally, thanks to the estimateddeformation, the true tissue samples that were preliminary rejected in the early image processingstep are recognized by running a second segmentation step.Conclusions. We developed a novel de-arraying approach for TMA analysis. By combining waveletbaseddetection, active contour segmentation, and thin-plate spline interpolation, our approach isable to handle TMA images with high dynamic, poor signal-to-noise ratio, complex background andnon-linear deformation of TMA grid. In addition, the deformation estimation produces quantitativeinformation to asset the manufacturing quality of TMAs
    • …
    corecore