Sunlight power is a type of green energy that can be harvested by using photovoltaic (PV) panels to convert solar radiation to electrical power for fulfilling the power demand. However, there are limitations on renewa...
详细信息
Multi-lane roundabouts allow drivers to change lanes by merging and diverging among circulating lanes, yielding weaving in the roundabout. Weaving yields traffic conflicts as crossing traffic slows down the circulatin...
详细信息
ISBN:
(纸本)9789819955466
Multi-lane roundabouts allow drivers to change lanes by merging and diverging among circulating lanes, yielding weaving in the roundabout. Weaving yields traffic conflicts as crossing traffic slows down the circulating flow. Speed reduction creates significant gaps that reduce capacity. Thus, weaving is crucial due to its significant effect on roundabout capacity. However, little information is available on weaving in multi-lane roundabouts with inscribed circle diameters (ICD) of more than 100 m. A possible reason for the lack of weaving data is the difficulty of collecting lane change data due to the traffic flow complexity, which involves several lane changes and the required resources. Typical data collection methods include using ground-level recorders and surveyors. Ground-level recorders could only provide limited data points due to view coverage constraints. Increasing the workforce and equipment can overcome this limitation, but it may prolong the post-recording analysis due to more views for analysis. Conversely, Unmanned Aerial Vehicles (UAVs) can capture complex traffic interaction data in a single session. Extraction of UAV-based recording by traffic video analyser could provide a wide range of outputs in a shorter time than manual analysis. This paper proposes a novel methodology to extract UAV-based lane change data using a traffic video analyser. The fieldwork involves flying a UAV at a multi-lane roundabout with an ICD of 151 m in Kuching, Malaysia. Turning movement and lane change were obtained using a traffic video analyser. Virtual gates are specified at 10 m intervals to get lane change location. A lane change can be detected when a vehicle crosses two consecutive virtual gates over two adjacent circulating lanes. Weaving occurs when two lane change swap paths along circulating lanes. The findings show that 86% of lane change happens in the weaving section. This paper demonstrated that using UAV and traffic video analyser is feasible to investig
In healthcare systems,the Internet of Things(IoT)innovation and development approached new ways to evaluate patient data.A cloud-based platform tends to process data generated by IoT medical devices instead of high st...
详细信息
In healthcare systems,the Internet of Things(IoT)innovation and development approached new ways to evaluate patient data.A cloud-based platform tends to process data generated by IoT medical devices instead of high storage,and computational *** this paper,an intelligent healthcare system has been proposed for the prediction and severity analysis of lung disease from chest computer tomography(CT)images of patients with pneumonia,Covid-19,tuberculosis(TB),and ***,the CT images are captured and transmitted to the fog node through IoT *** the fog node,the image gets modified into a convenient and efficient format for further *** encryption Standard(AES)algorithm serves a substantial role in IoT and fog nodes for preventing data from being accessed by other operating ***,the preprocessed image can be classified automatically in the cloud by using various transfer and ensemble learning *** different pre-trained deep learning architectures(Inception-ResNet-v2,VGG-19,ResNet-50)used transfer learning is adopted for feature *** softmax of heterogeneous base classifiers assists to make individual *** a meta-classifier,the ensemble approach is employed to obtain final optimal *** predicted image is consigned to the recurrent neural network with long short-term memory(RNN-LSTM)for severity analysis,and the patient is directed to seek therapy based on the *** proposed method achieved 98.6%accuracy,0.978 precision,0.982 recalls,and 0.974 F1-score on five class *** experimental findings reveal that the proposed framework assists medical experts with lung disease screening and provides a valuable second perspective.
Limited available land is leading to the emerging demand for trenchless methods for the installation of buried pipelines. Pipe jacking is one such method. The prediction of jacking forces is crucial in assessing the p...
详细信息
The oil and gas industry employs numerical simulation tools extensively in reservoir analysis and strategic planning. This study presents a machine-learning proxy model, employing a Few-shot Learning approach with a D...
详细信息
Reliable transmission is vital to the success of the next generation ofcommunications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit fr...
详细信息
Reliable transmission is vital to the success of the next generation ofcommunications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters themaintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wirelessnetwork and constantly needs to be self-configured to provide consistent and effi-cient data transmission. The medical devices need to be connected with sophisticated protocols and architecture to handle the synergy of the monitoring ***, one of the commonly used algorithms in D2D communication is the Optimized Link State Routing protocol (OLSR). The OLSR is considerably good ateffectively utilizing the bandwidth and reserving the paths. One of the majorattack against the OLSR is the Node isolation attack, also known as the Gray holedenial of service attack. The Gray hole attack exploits the vulnerabilities presentwith sharing the topological information of the network. The attackers may usethis topological information to maliciously disconnect the target nodes from theexisting network and stops rendering the communication services to the victimnode. Hence, considering the sensitivity and security concerns of the data usedin e-Health applications, these types of attacks must be detected and disabledproactively. In this work, a novel Node Authentication (NA) with OLSR is proposed. The simulation experiments illustrated that the proposed protocol has anexcellent Packet Delivery Ratio, minimal End-End delay, and minimal Packet losswhen compared to the Ad-hoc On-Demand Distance Victor (AODV) protocol andthe proposed authentication scheme was able to protect the OLSR protocol from anode isolation attack.
Global warming is causing climate change, disrupting the national economy, and affecting people's living habits. Numerous papers point out that human activity shows that large amounts of waste heat or energy are b...
详细信息
This paper presents application of artificial intelligence (AI) fuzzy logic technique for creating expert system that will be able to predict bevel angle as quality response in plasma jet cutting process. Bevel angle ...
详细信息
Ensuring data security, integrity, and privacy despite increased cyber threats and hacking attempts is one of the primary implementation difficulties of secure e-governance. Interoperability and seamless exchange of d...
详细信息
The development of autonomous vehicles (AVs) has advanced dramatically due to the rapid evolution of artificial intelligence (AI) technologies, which hold the potential to revolutionize the transportation industry. Th...
详细信息
暂无评论