دانلود و نمایش مقالات مرتبط با Transportation::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Transportation

تعداد مقالات یافته شده: 382
ردیف عنوان نوع
1 Data Mining Strategies for Real-Time Control in New York City
استراتژی داده کاوی برای کنترل زمان واقعی در شهر نیویورک-2105
The Data Mining System (DMS) at New York City Department of Transportation (NYCDOT) mainly consists of four database systems for traffic and pedestrian/bicycle volumes, crash data, and signal timing plans as well as the Midtown in Motion (MIM) systems which are used as part of the NYCDOT Intelligent Transportation System (ITS) infrastructure. These database and control systems are operated by different units at NYCDOT as an independent database or operation system. New York City experiences heavy traffic volumes, pedestrians and cyclists in each Central Business District (CBD) area and along key arterial systems. There are consistent and urgent needs in New York City for real-time control to improve mobility and safety for all users of the street networks, and to provide a timely response and management of random incidents. Therefore, it is necessary to develop an integrated DMS for effective real-time control and active transportation management (ATM) in New York City. This paper will present new strategies for New York City suggesting the development of efficient and cost-effective DMS, involving: 1) use of new technology applications such as tablets and smartphone with Global Positioning System (GPS) and wireless communication features for data collection and reduction; 2) interface development among existing database and control systems; and 3) integrated DMS deployment with macroscopic and mesoscopic simulation models in Manhattan. This study paper also suggests a complete data mining process for real-time control with traditional static data, current real timing data from loop detectors, microwave sensors, and video cameras, and new real-time data using the GPS data. GPS data, including using taxi and bus GPS information, and smartphone applications can be obtained in all weather conditions and during anytime of the day. GPS data and smartphone application in NYCDOT DMS is discussed herein as a new concept. © 2014 The Authors. Published by Elsevier B.V. Selection and peer-review under responsibility of Elhadi M. Shakshu Keywords: Data Mining System (DMS), New York City, real-time control, active transportation management (ATM), GPS data
مقاله انگلیسی
2 Exploring Potential Applications of Quantum Computing in Transportation Modelling
بررسی کاربردهای بالقوه محاسبات کوانتومی در مدل سازی حمل و نقل-2022
The idea that quantum effects could be harnessed to allow faster computation was first proposed by Feynman. As of 2020 we appear to have achieved ‘quantum supremacy’, that is, a quantum computer that performs a given task faster than its classical counterpart. This paper examines some possibilities opened up by potential future application of quantum computing to transportation simulation and planning. To date, no such research was found to exist, therefore we begin with an introduction to quantum computing for the programmers of transport models. We discuss existing quantum computing research relevant to transportation, finding developments in network analysis, shortest path computation, multi-objective routing, optimization and calibration – of which the latter three appear to offer the greater promise in future research. Two examples are developed in greater detail, (1) an application of Grover’s quantum algorithm for extracting the mean, which has general applicability towards summarizing distributions which are expensive to compute classically, is applied to an assignment or betweenness model - quantum speedup is elusive in the general case but achievable when trading speed for accuracy for limited outputs; (2) quantum optimization is applied to an activity-based model, giving a theoretically quadratic speedup. Recent developments notwithstanding, implementation of quantum transportation algorithms will for the foreseeable future remain a challenge due to space overheads imposed by the requirement for reversible computation.
Index Terms: Quantum computing | assignment | betweenness | flows, activity models | tour models.
مقاله انگلیسی
3 Computer vision for package tracking on omnidirectional wheeled conveyor: Case study
بینایی کامپیوتری برای ردیابی بسته در نوار نقاله چرخدار همه جهته: مطالعه موردی-2022
In this paper, a real-time camera tracking system for package transportation on omnidirectional wheeled conveyor is presented. The camera tracking system is integrated with a closed-loop controller for packages path planning. No additional sensors are used for the controller implementation, only a 2-D Camera. The package’s position and orientation are detected by the camera tracking system in real-time. Two proposed systems are presented, System I is implemented using the conventional image processing technique threshold method while System II is implemented using computer vision. In System II, three computer vision models were evaluated: Detectron2, YOLOv5 and Faster R-CNN. Experimental results in real-time show that System I have lower accuracy rate 85.7% compared to System II which reported 98% and 88.1% for YOLOv5 and Detectron2, respectively. YOLOv5 reported the best results among the computer vision models with 1% missing rate, 45.5 FPS and average precision of 99.8%.
keywords: Camera tracking | Computer vision | Deep learning | Hexagonal conveyor | Image processing | Omnidirectional wheels | YOlO
مقاله انگلیسی
4 Computer vision technique for freshness estimation from segmented eye of fish image
تکنیک بینایی کامپیوتری برای تخمین تازگی از چشم تقسیم شده تصویر ماهی-2022
Preserving the quality of fish is a challenging task. Several different cooling methods and materials are used during their storage, transportation purpose. These are responsible factors that decide the freshness of a post harvested fish. In this proposed algorithm, a computer vision-based technique is developed to predict the freshness level of fish from its image. Eyes of the fish are considered as the region of interest, as a good corre- lation has been observed between the colour of the eye and different duration of storage day. It is segmented from the image of a fish sample and then a strategic framework is used for extraction of the discriminatory features. These extracted features show a degradation pattern which acts as an indicative parameter to determine the level of freshness of sample of fish. The proposed method provides a recognition accuracy of 96.67%. The experimental results indicate that this is an efficient and non-destructive methodology for detecting the fish freshness. The high accuracy of freshness detection and low computation time makes this non-destructive methodology efficient for real-world usage in the fish industry and market.
keywords: استخراج ویژگی | چشم ماهی | تکنیک های پردازش تصویر | سطح تازگی | تقسیم بندی | Feature extraction | Fish eye | Image processing techniques | Level of freshness | Segmentation
مقاله انگلیسی
5 Solving Vehicle Routing Problem Using Quantum Approximate Optimization Algorithm
حل مسئله مسیریابی خودرو با استفاده از الگوریتم بهینه سازی تقریبی کوانتومی-2022
Intelligent transportation systems (ITS) are a critical component of Industry 4.0 and 5.0, particularly having applications in logistic management. One of their crucial utilization is in supply-chain management and scheduling for optimally routing transportation of goods by vehicles at a given set of locations. This paper discusses the broader problem of vehicle traffic management, more popularly known as the Vehicle Routing Problem (VRP), and investigates the possible use of near-term quantum devices for solving it. For this purpose, we give the Ising formulation for VRP and some of its constrained variants. Then, we present a detailed procedure to solve VRP by minimizing its corresponding Ising Hamiltonian using a hybrid quantum-classical heuristic called Quantum Approximate Optimization Algorithm (QAOA), implemented on the IBM Qiskit platform. We compare the performance of QAOA with classical solvers such as CPLEX on problem instances of up to 15 qubits. We find that performance of QAOA has a multifaceted dependence on the classical optimization routine used, the depth of the ansatz parameterized by p, initialization of variational parameters, and problem instance itself.
Index Terms— Vehicle routing problem | ising model | combinatorial optimization | quantum approximate algorithms | variational quantum algorithms.
مقاله انگلیسی
6 The big picture on the internet of things and the smart city: a review of what we know and what we need to know
تصویر بزرگ در اینترنت اشیا و شهر هوشمند: مروری بر آنچه می‌دانیم و آنچه باید بدانیم-2022
This study examines how the application of the IoT in smart cities is discussed in the current academic literature. Based on bibliometric techniques, 1,802 articles were retrieved from the Scopus database and analyzed to identify the temporal nature of IoT research, the most relevant journals, authors, countries, keywords, and studies. The software tool VOSviewer was used to build the keyword co-occurrence network and to cluster the pertinent literature. Results show the significant growth of IoT research in recent years. The most productive authors, journals, and countries were also identified. The main findings from the keyword co-occurrence clustering and an in-depth qualitative analysis indicate that the IoT is used alongside other technologies including cloud computing, big data analytics, blockchain, artificial intelligence, and wireless telecommunication networks. The major applications of the IoT for smart cities include smart buildings, transportation, healthcare, smart parking, and smart grids. This review is one of the first attempts to map global IoT research in a smart city context and uses a comprehensive set of articles and bibliometric techniques to provide scholars and practitioners with an overview of what has been studied so far and to identify research gaps at the intersection of the IoT and the smart city.
keywords: اینترنت اشیا | شهر هوشمند | مرور | کتاب سنجی | Internet of things | Smart city | Review | Bibliometrics
مقاله انگلیسی
7 A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks
یک طرح جامع تغییر نام مستعار برای بهبود حریم خصوصی مکان در شبکه های وسایل نقلیه-2022
In an Intelligent Transportation System (ITS), many applications, such as collision avoidance and lane change warning, require real-time information from vehicles on the road. This typically includes detailed status information such as location, speed, heading and a vehicle identifier, which can be used to infer precise movement patterns leading to long-term driver profiling and vehicle tracking. The use of pseudonyms, instead of actual vehicle IDs, allows vehicles to protect their privacy while sharing relevant information. A pseudonym changing scheme (PCS) determines when and how a vehicle should change its pseudonyms to maintain an appropriate privacy level. In this paper, we propose a new comprehensive PCS that utilizes vehicle context and current traffic patterns to leverage the optimum situation for changing pseudonyms. Simulation results indicate that the proposed PCS outperforms existing approaches both in terms of user-centric and adversary-centric performance metrics.
Keywords: Location privacy | Pseudonym changing scheme | VANET | V2V communication | Context-aware
مقاله انگلیسی
8 Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
امضای دیجیتالی پیشرفته برای حفظ حریم خصوصی و مدیریت اعتماد در اینترنت اشیا ناهمگون سلسله مراتبی: طبقه بندی، قابلیت ها و اهداف-2022
Internet of Things (IoT) systems in different areas, such as manufacturing, transportation, and healthcare, are the convergence of several technologies. There are many concerns about security and privacy drawbacks in IoT systems. Apart from confidentiality supported by encryption primitives, authenticity and non-repudiation are of utmost importance. IoT entities generally use conventional digital signature schemes to achieve imperative goals. However, there are some state-of-the-art digital signatures with more functionalities, IoT-friendly properties, and privacy-preserving features.
This survey paper aims to accelerate the adoption of advanced digital signatures. We bridge the gap between the advanced theoretical digital signatures recently designed in cryptographic oriented papers and the applied IoT systems. It aids researchers in achieving more security, privacy as well as some unique functionality aspects. First, we illustrate the benefits of the hierarchical and heterogeneous IoT architecture supporting the end-edge-fog-cloud continuum accompanying blockchain technology. Second, our survey delves into five state-of-the-art digital signatures, including randomizable, keyless, double-authentication-prevention, sanitizable, and redactable schemes, that are aligned with entities in IoT systems. We provide an outline, taxonomy, comparison table, and diverse IoT-based use cases for each of them. Then, the integration of primitives and the relationship diagrams give guidelines to help select the appropriate advanced digital signatures and highlights how researchers can use them with different IoT entities for preserving privacy and management of trust.
keywords: امضای دیجیتالی | حفظ حریم خصوصی اینترنت اشیا | بلاک چین | محاسبات ابری | Digital signature | IoT Privacy-preserving | Blockchain | Cloud computing
مقاله انگلیسی
9 An investigation of the transmission success in Lorawan enabled IoT-HAPS communication
An investigation of the transmission success in Lorawan enabled IoT-HAPS communication-2022
As the communication and aviation technology expand, High altitude platform stations (HAPS) are increasingly gaining a wider usage area in modern Internet of Things (IoT) deployments. One of the areas in which HAPS can be effectively utilized is the wide area deployment of sensors that require a costly data acquisition effort in terms of transportation and communication access. Aerial communication using a low-energy technology such as LoRa can provide significant advantages in such scenarios. Our work models and simulates LoRAWAN communication in utilizing HAPS in data acquisition over a large distribution span of IoT devices/sensors. We conduct experiments on various different scenarios including changing number of devices, span area, HAPS speed and LoRa duty cycle to draw conclusions about how each of these parameters affect communication quality. Results of the simulation are used in regression analysis of equation factors to calculate the expected transmission performance under different experimental setups. Our results (and simulation code) can be used to reason about certain properties of IoT deployment (such as sensor count, sensor distribution area, HAPS speed, etc.) before the real deployment is done in LoRaWAN enabled IoT-HAPS communication.
keywords: High altitude platform station communication | LoRaWAN communication | Wide-area sensor network | IoT deployment simulation | Communication quality estimation
مقاله انگلیسی
10 Beacon Non-Transmission attack and its detection in intelligent transportation systems
حمله عدم انتقال Beacon و تشخیص آن در سیستم های حمل و نقل هوشمند-2022
Message dropping by intermediate nodes as well as RF jamming attack have been studied widely in ad hoc networks. In this paper, we thoroughly investigate a new type of attack in intelligent transportation systems (ITS) defined as Beacon Non-Transmission (BNT) attack in which attacker is not an intermediate vehicle, but rather a source vehicle. In BNT attack, a vehicle suppresses the transmissions of its own periodic beacon packets to get rid of the automated driving misbehavior detection protocols running in ITS, or to mount a Denial-ofService (DoS) attack to cripple the traffic management functionality of ITS. Considering BNT attack as a critical security threat to ITS, we propose two novel and lightweight techniques to detect it. Our first technique bases its detection by assuming a certain distribution of the number of beacons lost from a vehicle while accounting for loss due to channel-error. However, it fails to classify shortish BNT attacks wherein amount of denial and channel-error loss are comparable. Our second technique, suitable for identifying both shortish and longish BNT attacks, considers beacon loss pattern of a vehicle as a time-series data and employs autocorrelation function (ACF) to determine the existence of an attack. In order to trade-off detection accuracy for equitable use of limited computational resources, we propose a random inspection model in which the detection algorithm is executed at random time instances and for randomly selected set of vehicles. We have performed extensive simulations to evaluate the performance of proposed detection algorithms under random inspection and a practical attacker model. The results obtained corroborate the lightweight nature of both techniques, and the efficacy of ACF based technique over simple threshold based technique in terms of higher detection accuracy as well as smaller reaction delay.
keywords: DoS attack | Intrusion detection | Driving anomaly detection | Beacon | Autocorrelation function | Intelligent Transportation Systems
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 265 :::::::: بازدید دیروز: 3084 :::::::: بازدید کل: 3349 :::::::: افراد آنلاین: 9