Search results for: anti-DDoS framework
830 Modeling ICT Adoption Factors for the Preservation of Indigenous Knowledge
Authors: K.M. Ngcobo, S.D. Eyono Obono
Abstract:
Indigenous Knowledge (IK) has many social and economic benefits. However, IK is at the risk of extinction due to the difficulties to preserve it as most of the IK largely remains undocumented. This study aims to design a model of the factors affecting the adoption of Information and Communication Technologies (ICTs) for the preservation of IK. The proposed model is based on theoretical frameworks on ICT adoption. It was designed following a literature review of ICT adoption theories for households, and of the factors affecting ICT adoption for IK. The theory that fitted to the best all factors was then chosen as the basis for the proposed model. This study found that the Model of Adoption of Technology in Households (MATH) is the most suitable theoretical framework for modeling ICT adoption factors for the preservation of IK.Keywords: Adoption factors, ICT adoption theories, Indigenous knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2685829 Compensated CIC-Hybrid Signed Digit Decimation Filter
Authors: Vishal Awasthi, Krishna Raj
Abstract:
In this paper, firstly, we present the mathematical modeling of finite impulse response (FIR) filter and Cascaded Integrator Comb (CIC) filter for sampling rate reduction and then an extension of Canonical signed digit (CSD) based efficient structure is presented in framework using hybrid signed digit (HSD) arithmetic. CSD representation imposed a restriction that two non-zero CSD coefficient bits cannot acquire adjacent bit positions and therefore, represented structure is not economical in terms of speed, area and power consumption. The HSD based structure gives optimum performance in terms of area and speed with 37.02% passband droop compensation.
Keywords: Multirate filtering, compensation theory, CIC filter, compensation filter, signed digit arithmetic, canonical signed digit.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1074828 Phenomenological and Semi-microscopic Analysis for Elastic Scattering of Protons on 6,7Li
Authors: A. Amar, N. Burtebayev, Sh. Hamada, Kerimkulov Zhambul, N. Amangieldy
Abstract:
Analysis of the elastic scattering of protons on 6,7Li nuclei has been done in the framework of the optical model at the beam energies up to 50 MeV. Differential cross sections for the 6,7Li + p scattering were measured over the proton laboratory–energy range from 400 to 1050 keV. The elastic scattering of 6,7Li+p data at different proton incident energies have been analyzed using singlefolding model. In each case the real potential obtained from the folding model was supplemented by a phenomenological imaginary potential, and during the fitting process the real potential was normalized and the imaginary potential optimized. Normalization factor NR is calculated in the range between 0.70 and 0.84.Keywords: scattering of protons on 6, 7Li nuclei, Esis88 Codesingle-folding model, phenomenological.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1375827 Using Services Oriented Architecture to Improve Efficient Web-Services for Postgraduate Students
Authors: Ehab N. Alkhanak, Salimah Mokhtar
Abstract:
The main aim of this paper is to present the research findings on the solution of centralized Web-Services for students by adopting a framework and a prototype for Service Oriented Architecture (SOA) Web-Services. The current situation of students- Web-based application services has been identified and proposed an effective SOA to increase the operational efficiency of Web-Services for them it was necessary to identify the challenges in delivering a SOA technology to increase operational efficiency of Web-Services. Moreover, the SOA is an emerging concept, used for delivering efficient student SOA Web-Services. Therefore, service reusability from SOA Web-Services is provided and logically divided services into smaller services to increase reusability and modularity. In this case each service is a modular unit by itself and interoperability services.Keywords: Services Oriented Architecture (SOA), Web-based Application services, and Web-Services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1273826 Ontology-based Query System for UNITEN Postgraduate Students
Authors: Zaihisma C. Cob, Alicia Y.C. Tang, Sharifah J. Syed Aziz
Abstract:
This paper proposes a new model to support user queries on postgraduate research information at Universiti Tenaga Nasional. The ontology to be developed will contribute towards shareable and reusable domain knowledge that makes knowledge assets intelligently accessible to both people and software. This work adapts a methodology for ontology development based on the framework proposed by Uschold and King. The concepts and relations in this domain are represented in a class diagram using the Protégé software. The ontology will be used to support a menudriven query system for assisting students in searching for information related to postgraduate research at the university.Keywords: Ontology, Protégé, postgraduate program, query system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1681825 Innovation, e-Learning and Higher Education: An Example of a University- LMS Adoption Process
Authors: Ana Mafalda Gonçalves, Neuza Pedro
Abstract:
The evolution of ICT has changed all sections of society and these changes have been creating an irreversible impact on higher education institutions, which are expected to adopt innovative technologies in their teaching practices. As theorical framework this study select Rogers theory of innovation diffusion which is widely used to illustrate how technologies move from a localized invented to a widespread evolution on organizational practices. Based on descriptive statistical data collected in a European higher education institution three years longitudinal study was conducted for analyzing and discussion the different stages of a LMS adoption process. Results show that ICT integration in higher education is not progressively successful and a linear process and multiple aspects must be taken into account.
Keywords: e-learning, higher education, LMS, innovation, technologies
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2469824 GRI – Reporting Chemical Sector's Environmental Item Disclosures
Authors: M. Suutari
Abstract:
In this content analysis research note the aim was to explore to how sustainability and especially environmental issues are conveyed into environmental items in annual reports and disclosures. As The Global Reporting Initiative (GRI) is a globally wide multistakeholder process, the enterprises using voluntarily GRI framework are considered to be aware of sustainability and environmental concerns. The findings were that although these enterprises included in an environmentally sensitive industry sector and had special capabilities to consider environmental issues there were few GRIreporting enterprises presented substantially detailed environmental items in audited financial statements. There were only slight differences between publishing years 2008 and 2009 - the beginning years of economic turmoil. The environmental issues seemed not to be considered substantial enough for financial reporting as a basis for concerning investment or voting decisions.
Keywords: Environmental, reporting, financial, GRI.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1772823 Multivalued Knowledge-Base based on Multivalued Datalog
Authors: Agnes Achs
Abstract:
The basic aim of our study is to give a possible model for handling uncertain information. This model is worked out in the framework of DATALOG. The concept of multivalued knowledgebase will be defined as a quadruple of any background knowledge; a deduction mechanism; a connecting algorithm, and a function set of the program, which help us to determine the uncertainty levels of the results. At first the concept of fuzzy Datalog will be summarized, then its extensions for intuitionistic- and interval-valued fuzzy logic is given and the concept of bipolar fuzzy Datalog is introduced. Based on these extensions the concept of multivalued knowledge-base will be defined. This knowledge-base can be a possible background of a future agent-model.
Keywords: Fuzzy-, intuitionistic-, bipolar datalog, multivalued knowledge-base
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1157822 Stochastic Programming Model for Power Generation
Authors: Takayuki Shiina
Abstract:
We consider power system expansion planning under uncertainty. In our approach, integer programming and stochastic programming provide a basic framework. We develop a multistage stochastic programming model in which some of the variables are restricted to integer values. By utilizing the special property of the problem, called block separable recourse, the problem is transformed into a two-stage stochastic program with recourse. The electric power capacity expansion problem is reformulated as the problem with first stage integer variables and continuous second stage variables. The L-shaped algorithm to solve the problem is proposed.Keywords: electric power capacity expansion problem, integerprogramming, L-shaped method, stochastic programming
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1825821 The Hybrid Knowledge Model for Product Development Management
Authors: Heejung Lee, Hyo-Won Suh
Abstract:
Hybrid knowledge model is suggested as an underlying framework for product development management. It can support such hybrid features as ontologies and rules. Effective collaboration in product development environment depends on sharing and reasoning product information as well as engineering knowledge. Many studies have considered product information and engineering knowledge. However, most previous research has focused either on building the ontology of product information or rule-based systems of engineering knowledge. This paper shows that F-logic based knowledge model can support such desirable features in a hybrid way.Keywords: Ontology, rule, F-logic, product development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1475820 Research on Building Urban Sustainability along the Coastal Area in China
Authors: Sun Jiaojiao, Fu Jiayan
Abstract:
At present, in China, the research about the urban sustainability construction is still in the exploratory stage. The ecological problems of the coastal area are more sensitive and complicated. In the background of global warming with serious ecological damage, this paper deeply researches on the main characteristics of urban sustainability and measures how to build urban sustainability. Through combining regional environmental with economic ability along the coastal area, then authors put forward the system planning framework, construction strategy and the evaluation index system, in order to seek the way of building urban sustainability along coastal area in China.Keywords: Urban sustainability, coastal areas, construction strategy, evaluation index system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1933819 Einstein’s General Equation of the Gravitational Field
Authors: A. Benzian
Abstract:
The generalization of relativistic theory of gravity based essentially on the principle of equivalence stipulates that for all bodies, the grave mass is equal to the inert mass which leads us to believe that gravitation is not a property of the bodies themselves, but of space, and the conclusion that the gravitational field must curved space-time what allows the abandonment of Minkowski space (because Minkowski space-time being nonetheless null curvature) to adopt Riemannian geometry as a mathematical framework in order to determine the curvature. Therefore the work presented in this paper begins with the evolution of the concept of gravity then tensor field which manifests by Riemannian geometry to formulate the general equation of the gravitational field.
Keywords: Inertia, principle of equivalence, tensors, Riemannian geometry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 764818 Integrated Learning in Engineering Services: A Conceptual Framework
Authors: Satya Pilla
Abstract:
This study explores how the mechanics of learning paves the way to engineering innovation. Theories related to learning in the new product/service innovation are reviewed from an organizational perspective, behavioral perspective, and engineering perspective. From this, an engineering team-s external interactions for knowledge brokering and internal composition for skill balance are examined from a learning and innovation viewpoints. As a result, an integrated learning model is developed by reconciling the theoretical perspectives as well as developing propositions that emphasize the centrality of learning, and its drivers, in the engineering product/service development. The paper also provides a review and partial validation of the propositions using the results of a previously published field study in the aerospace industry.Keywords: Engineering Services, Integrated Learning, NewProduct Development, Service Innovation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1289817 Adoption of E-Business by Thai SMEs
Authors: Pisit Chanvarasuth
Abstract:
The use of e-business in small and medium-sized enterprises (SMEs) has been recently received an enormous attention in information systems research by both academic and practitioners. With the adoption of new and efficient technologies to enhance businesses, Thai SMEs should be able to compete worldwide. Unfortunately, most of the owners are not used to new technologies. It is clear that most Thai SMEs prefer to work manually rather than electronically. This paper aims to provide a fundamental conceptual framework for E-business adoption by Thai SMEs. Rooted in Knowledge transfer model, several factors are identified, which drive and enable e-business adoption. By overlooking the benefits associated with implementing new technologies, it is difficult for Thai SMEs to perform well enough to compete globally. The paper also helps Thai SMEs to understand factors related to E-business adoption.Keywords: E-business, SME, Adoption, Knowledge Transfer, Thailand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2963816 Information System Life Cycle: Applications in Construction and Manufacturing
Authors: Carlos J. Costa, Manuela Aparício
Abstract:
In this paper, we present the information life cycle, and analyze the importance of managing the corporate application portfolio across this life cycle. The approach presented here does not correspond just to the extension of the traditional information system development life cycle. This approach is based in the generic life cycle employed in other contexts like manufacturing or marketing. In this paper it is proposed a model of an information system life cycle, supported in the assumption that a system has a limited life. But, this limited life may be extended. This model is also applied in several cases; being reported here two examples of the framework application in a construction enterprise, and in a manufacturing enterprise.
Keywords: Information systems/technology, informatio nsystems life cycle, organization engineering, information economics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1602815 Determinants of Enterprise Risk Management Adoption: An Empirical Analysis of Malaysian Public Listed Firms
Authors: Nargess Mottaghi Golshan, Siti Zaleha Abdul Rasid
Abstract:
Purpose:This paper aims to gain insights to the influential factors of ERM adoptions by public listed firms in Malaysia. Findings:The two factors of financial leverage and auditor type were found to be significant influential factors for ERM adoption. In other words the findings indicated that firms with higher financial leverage and with a Big Four auditor are more likely to have a form of ERM framework in place. Originality/Value:Since there are relatively few studies conducted in this area and specially in developing economies like Malaysia, this study will broaden the scope of literature by providing novel empirical evidence.
Keywords: Enterprise risk management, risk, public listed company.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2592814 Variable-Relation Criterion for Analysis of the Memristor
Authors: Qingjiang Li, Hui Xu, Haijun Liu, Xiaobo Tian
Abstract:
To judge whether the memristor can be interpreted as the fourth fundamental circuit element, we propose a variable-relation criterion of fundamental circuit elements. According to the criterion, we investigate the nature of three fundamental circuit elements and the memristor. From the perspective of variables relation, the memristor builds a direct relation between the voltage across it and the current through it, instead of a direct relation between the magnetic flux and the charge. Thus, it is better to characterize the memristor and the resistor as two special cases of the same fundamental circuit element, which is the memristive system in Chua-s new framework. Finally, the definition of memristor is refined according to the difference between the magnetic flux and the flux linkage.Keywords: Memristor, Fundamental, Variable-Relation Criterion, Memristive system
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1676813 Sampling Effects on Secondary Voltage Control of Microgrids Based on Network of Multiagent
Authors: M. J. Park, S. H. Lee, C. H. Lee, O. M. Kwon
Abstract:
This paper studies a secondary voltage control framework of the microgrids based on the consensus for a communication network of multiagent. The proposed control is designed by the communication network with one-way links. The communication network is modeled by a directed graph. At this time, the concept of sampling is considered as the communication constraint among each distributed generator in the microgrids. To analyze the sampling effects on the secondary voltage control of the microgrids, by using Lyapunov theory and some mathematical techniques, the sufficient condition for such problem will be established regarding linear matrix inequality (LMI). Finally, some simulation results are given to illustrate the necessity of the consideration of the sampling effects on the secondary voltage control of the microgrids.Keywords: Microgrids, secondary control, multiagent, sampling, LMI.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1450812 Designing and Implementing an Innovative Course about World Wide Web, Based on the Conceptual Representations of Students
Authors: Andreanna K. Koufou, Dimitrios K. Tsolis, Marida I. Ergazaki, Vasilis I. Komis, Vasiliki P. Zogza
Abstract:
Internet is nowadays included to all National Curriculums of the elementary school. A comparative study of their goals leads to the conclusion that a complete curriculum should aim to student-s acquisition of the abilities to navigate and search for information and additionally to emphasize on the evaluation of the information provided by the World Wide Web. In a constructivistic knowledge framework the design of a course has to take under consideration the conceptual representations of students. The following paper presents the conceptual representation of students of eleven years old, attending the Sixth Grade of Greek Elementary School about World Wide Web and their use in the design and implementation of an innovative course.Keywords: Conceptual representations, Constructivism, Internet Didactics, World Wide Web
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1401811 Identifying Corruption in Legislation using Risk Analysis Methods
Authors: Chvalkovska, J., Jansky, P., Mejstrik, M.
Abstract:
The objective of this article is to discuss the potential of economic analysis as a tool for identification and evaluation of corruption in legislative acts. We propose that corruption be perceived as a risk variable within the legislative process. Therefore we find it appropriate to employ risk analysis methods, used in various fields of economics, for the evaluation of corruption in legislation. Furthermore we propose the incorporation of these methods into the so called corruption impact assessment (CIA), the general framework for detection of corruption in legislative acts. The applications of the risk analysis methods are demonstrated on examples of implementation of proposed CIA in the Czech Republic. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2466810 Supporting Embedded Medical Software Development with MDevSPICE® and Agile Practices
Authors: Surafel Demissie, Frank Keenan, Fergal McCaffery
Abstract:
Emerging medical devices are highly relying on embedded software that runs on the specific platform in real time. The development of embedded software is different from ordinary software development due to the hardware-software dependency. MDevSPICE® has been developed to provide guidance to support such development. To increase the flexibility of this framework agile practices have been introduced. This paper outlines the challenges for embedded medical device software development and the structure of MDevSPICE® and suggests a suitable combination of agile practices that will help to add flexibility and address corresponding challenges of embedded medical device software development.
Keywords: Agile practices, challenges, embedded software, MDevSPICE®, medical device.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1115809 Cloud Computing Initiative using Modified Ant Colony Framework
Authors: Soumya Banerjee, Indrajit Mukherjee, P.K. Mahanti
Abstract:
Scheduling of diversified service requests in distributed computing is a critical design issue. Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. It is not only the clusters and grid but also it comprises of next generation data centers. The paper proposes an initial heuristic algorithm to apply modified ant colony optimization approach for the diversified service allocation and scheduling mechanism in cloud paradigm. The proposed optimization method is aimed to minimize the scheduling throughput to service all the diversified requests according to the different resource allocator available under cloud computing environment.Keywords: Ant Colony, Cloud Computing, Grid, Resource allocator, Service Request.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2768808 Balanced Scorecard (BSC) Usage and Financial Performance of Branches in Jordanian Banking Industry
Authors: Hamzah Hussein Al-mawali, Yuserrie Zainuddin, Noor Nasir Kader Ali
Abstract:
The purpose of this paper is to contribute to the body of knowledge in the area of management accounting, particularly performance measurement systems within the BSC framework, by investigating empirically the extent of multiple performance measures usage and their effects on the financial performance of Jordanian banks in the branches level. Nevertheless, the result of this study shows that the non-financial measures usages, particularly, customer oriented indicators and product/ service oriented indicators, appears to be important as it enhances firm performance. Remarkably, the findings reveal that there is positive relationship between the usages of multiple performance measures via overall BSC measures and financial performance in the branches level.Keywords: Performance measurements systems, BalancedScorecard, Jordan.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4941807 Security Engine Management of Router based on Security Policy
Authors: Su Hyung Jo, Ki Young Kim, Sang Ho Lee
Abstract:
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper relates to a security engine management of router based on a security policy, which is the definition of security function against a network intrusion. This paper explains the security policy and designs the structure of security engine management framework.Keywords: Policy server, security engine, security management, security policy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921806 Multiple Regression based Graphical Modeling for Images
Authors: Pavan S., Sridhar G., Sridhar V.
Abstract:
Super resolution is one of the commonly referred inference problems in computer vision. In the case of images, this problem is generally addressed using a graphical model framework wherein each node represents a portion of the image and the edges between the nodes represent the statistical dependencies. However, the large dimensionality of images along with the large number of possible states for a node makes the inference problem computationally intractable. In this paper, we propose a representation wherein each node can be represented as acombination of multiple regression functions. The proposed approach achieves a tradeoff between the computational complexity and inference accuracy by varying the number of regression functions for a node.
Keywords: Belief propagation, Graphical model, Regression, Super resolution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1547805 A Web-Based System for Mapping Features into ISO 14649-Compliant Machining Workingsteps
Authors: J. C. T. Benavente, J. C. E. Ferreira
Abstract:
The rapid development of manufacturing and information systems has caused significant changes in manufacturing environments in recent decades. Mass production has given way to flexible manufacturing systems, in which an important characteristic is customized or "on demand" production. In this scenario, the seamless and without gaps information flow becomes a key factor for success of enterprises. In this paper we present a framework to support the mapping of features into machining workingsteps compliant with the ISO 14649 standard (known as STEP-NC). The system determines how the features can be made with the available manufacturing resources. Examples of the mapping method are presented for features such as a pocket with a general surface.
Keywords: Features, ISO 14649 standard, STEP-NC, mapping, machining workingsteps.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1895804 Social Media as a Tool for Political Communication: A Case Study of India
Authors: Srikanth Bade
Abstract:
This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.Keywords: Collective action and social capital, political communication, political discourse, social media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1464803 Managing the Information System Life Cycle in Construction and Manufacturing
Authors: Carlos J. Costa, Manuela Aparício
Abstract:
In this paper we present the information life cycle and analyze the importance of managing the corporate application portfolio across this life cycle. The approach presented here corresponds not just to the extension of the traditional information system development life cycle. This approach is based in the generic life cycle. In this paper it is proposed a model of an information system life cycle, supported in the assumption that a system has a limited life. But, this limited life may be extended. This model is also applied in several cases; being reported here two examples of the framework application in a construction enterprise and in a manufacturing enterprise.
Keywords: Information systems/technology, information systems life cycle, organization engineering, information economics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1807802 Perceptual Framework for a Modern Left-Turn Collision Warning System
Authors: E. Dabbour, S. M. Easa
Abstract:
Most of the collision warning systems currently available in the automotive market are mainly designed to warn against imminent rear-end and lane-changing collisions. No collision warning system is commercially available to warn against imminent turning collisions at intersections, especially for left-turn collisions when a driver attempts to make a left-turn at either a signalized or non-signalized intersection, conflicting with the path of other approaching vehicles traveling on the opposite-direction traffic stream. One of the major factors that lead to left-turn collisions is the human error and misjudgment of the driver of the turning vehicle when perceiving the speed and acceleration of other vehicles traveling on the opposite-direction traffic stream; therefore, using a properly-designed collision warning system will likely reduce, or even eliminate, this type of collisions by reducing human error. This paper introduces perceptual framework for a proposed collision warning system that can detect imminent left-turn collisions at intersections. The system utilizes a commercially-available detection sensor (either a radar sensor or a laser detector) to detect approaching vehicles traveling on the opposite-direction traffic stream and calculate their speeds and acceleration rates to estimate the time-tocollision and compare that time to the time required for the turning vehicle to clear the intersection. When calculating the time required for the turning vehicle to clear the intersection, consideration is given to the perception-reaction time of the driver of the turning vehicle, which is the time required by the driver to perceive the message given by the warning system and react to it by engaging the throttle. A regression model was developed to estimate perception-reaction time based on age and gender of the driver of the host vehicle. Desired acceleration rate selected by the driver of the turning vehicle, when making the left-turn movement, is another human factor that is considered by the system. Another regression model was developed to estimate the acceleration rate selected by the driver of the turning vehicle based on driver-s age and gender as well as on the location and speed of the nearest approaching vehicle along with the maximum acceleration rate provided by the mechanical characteristics of the turning vehicle. By comparing time-to-collision with the time required for the turning vehicle to clear the intersection, the system displays a message to the driver of the turning vehicle when departure is safe. An application example is provided to illustrate the logic algorithm of the proposed system.Keywords: Collision warning systems, intelligent transportationsystems, vehicle safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2055801 Wireless Neural Stimulator with Adjustable Electrical Quantity
Authors: Young-Seok Choi
Abstract:
The neural stimulation has been gaining much interest in neuromodulation research and clinical trials. For efficiency, there is a need for variable electrical stimulation such as current and voltage stimuli as well as wireless framework. In this regard, we develop the wireless neural stimulator capable of voltage and current stimuli. The system consists of ZigBee which is a wireless communication module and stimulus generator. The stimulus generator with 8-bits resolution enable both mono-polar and bi-polar waveform in voltage (-3.3~3.3V) and current(-330~330µA) stimulus mode which is controllable. The experimental results suggest that the proposed neural stimulator can play a role as an effective approach for neuromodulation.
Keywords: Neural stimulator, current stimulation, voltage stimulation, neuromodulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2168