Lane closure due to events such as accidents creates bottlenecks on expressways. The mandatory lane changes of merging vehicles lead to congestion. As the cyber-physical system (CPS) develops, mixed traffic consisting...
详细信息
Lane closure due to events such as accidents creates bottlenecks on expressways. The mandatory lane changes of merging vehicles lead to congestion. As the cyber-physical system (CPS) develops, mixed traffic consisting of connected vehicles (CVs) and human-driven vehicles (HVs) has emerged. CVs can receive lane-changing (LC) advisories and complete merging to alleviate congestion. Most existing studies assume CVs can timely and exactly follow LC advisories, which is not realistic with human drivers. This study develops an LC advisory model for CVs, whose response time and compliance degrees are considered, at an expressway bottleneck with lane closure under mixed traffic of CVs and HVs. The LC strategies are optimized for CVs to minimize the total delay of CVs and HVs approaching the bottleneck. The constraints include the domains of decision variables, vehicle passing states at the bottleneck, vehicle kinematics, implementation of LC advisories, LC safety, the maximum number of LC manoeuvres, the minimum time interval between LC advisories, the potential LC CVs, and the evolution of vehicle states. The simulation-based method is applied to predict vehicle delay, which is formulated as an implicit function of the LC strategies for CVs. Genetic Algorithm (GA) is designed for solutions. The numerical studies validate the advantages of the proposed model. The sensitivity analysis shows that: 1) the critical CV penetration rate is 60%, below which the marginal benefits are significant with increasing CV penetration rates;and 2) the consideration of the response time and the compliance degree of CVs makes a great difference. IEEE
Human emotions, psychology, and social well-being are all parts of mental health. It has an impact on how people feel, think, and act. It aids in figuring out how individuals act under pressure, interact with each oth...
详细信息
A novel method for evaluating compensation networks in IPT systems is proposed for a fair comparison. An optimal control strategy is adopted in the comparison to ensure operation under optimal conditions. Results indi...
详细信息
As a neurological disability that affects muscles involved in articulation, dysarthria is a speech impairment that leads to reduced speech intelligibility. In severe cases, these individuals could also be handicapped ...
详细信息
This paper proposes a low-cost inductive power transfer (IPT) system, comprising an uncompensated foil primary coil and a compensated vertical Litz-wire secondary coil structure, for stationary electric vehicle (EV) c...
详细信息
In contemporary times, nations like Sri Lanka are actively enhancing their efforts to improve the life expectancy of their citizens, with a strong focus on public health. The relationship between health and life expec...
详细信息
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods...
详细信息
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods have become impractical due to their resource *** Machine Learning(AutoML)systems automate this process,but often neglect the group structures and sparsity in meta-features,leading to inefficiencies in algorithm recommendations for classification *** paper proposes a meta-learning approach using Multivariate Sparse Group Lasso(MSGL)to address these *** method models both within-group and across-group sparsity among meta-features to manage high-dimensional data and reduce multicollinearity across eight meta-feature *** Fast Iterative Shrinkage-Thresholding Algorithm(FISTA)with adaptive restart efficiently solves the non-smooth optimization *** validation on 145 classification datasets with 17 classification algorithms shows that our meta-learning method outperforms four state-of-the-art approaches,achieving 77.18%classification accuracy,86.07%recommendation accuracy and 88.83%normalized discounted cumulative gain.
Money laundering is an unlawful activity that has caused underdevelopment to Africa, it's a ravaging vices that cripples economic growth, increases criminality and leads to economic sabotage. Many works previously...
详细信息
Dynamic inductive power transfer (IPT) can be used to charge moving electric vehicles (EVs) through the magnetic coupling between primary coils in a road with secondary coils onboard an EV. However, consistency in cha...
详细信息
By identifying and responding to any malicious behavior that could endanger the system,the Intrusion Detection System(IDS)is crucial for preserving the security of the Industrial Internet of Things(IIoT)*** benefit of...
详细信息
By identifying and responding to any malicious behavior that could endanger the system,the Intrusion Detection System(IDS)is crucial for preserving the security of the Industrial Internet of Things(IIoT)*** benefit of anomaly-based IDS is that they are able to recognize zeroday attacks due to the fact that they do not rely on a signature database to identify abnormal *** order to improve control over datasets and the process,this study proposes using an automated machine learning(AutoML)technique to automate the machine learning processes for *** groundbreaking architecture,known as AID4I,makes use of automatic machine learning methods for intrusion *** automation of preprocessing,feature selection,model selection,and hyperparameter tuning,the objective is to identify an appropriate machine learning model for intrusion *** studies demonstrate that the AID4I framework successfully proposes a *** integrity,security,and confidentiality of data transmitted across the IIoT network can be ensured by automating machine learning processes in the IDS to enhance its capacity to identify and stop threatening *** a comprehensive solution that takes advantage of the latest advances in automated machine learning methods to improve network security,AID4I is a powerful and effective instrument for intrusion *** preprocessing module,three distinct imputation methods are utilized to handle missing data,ensuring the robustness of the intrusion detection system in the presence of incomplete *** selection module adopts a hybrid approach that combines Shapley values and genetic *** Parameter Optimization module encompasses a diverse set of 14 classification methods,allowing for thorough exploration and optimization of the parameters associated with each *** carefully tuning these parameters,the framework enhances its adaptability and accuracy in identifying potential
暂无评论