首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
面对传统节能控制系统电能耗费大、实训室管理不全面,导致节能控制效果较差的问题,提出基于OneNET云平台与物联网MQTT协议的智慧节能控制系统;选择HTML5-20工控板,支持MQTT协议,并与单片机通信;使用MLX90614型号红外温度传感器,通过探测辐射情况,实现高精度温度测量;设计HC-SR501人体红外感应模块,监控实训室设备安全使用情况,避免出现电能消耗大的情况;根据系统软件部分功能模块,通过手机app端移动设备控制教室设备,并随时监管设备运行状态;将远程智能控制接入OneNET平台,实现机构管理员管理、设备运行报表和自动检修功能;由系统测试结果可知,该系统风扇最少耗电为40 W、电灯最少耗电为0.1度,说明电能消耗较少;实训室温度和湿度均在正常监管范围内,说明实训室处于安全状态;该系统设计从节能、安全管理角度,解决实训室的智能管理问题,也为资产失窃防患提供保障.  相似文献   

2.
Vehicular networks are mobile networks designed for the domain of vehicles and pedestrians. These networks are an essential component of intelligent transportation systems and have the potential to ease traffic management, lower accident rates, and offer other solutions to smart cities. One of the most challenging aspects in the design of a vehicular network is the distribution of its infrastructure units, which are called roadside units (RSUs). In this work, we tackle the gamma deployment problem that consists of deploying the minimum number of RSUs in a vehicular network in accordance with a quality of service metric called gamma deployment. This metric defines a vehicle as covered if it connects to some RSUs at least once in a given time interval during its whole trip. Then, the metric parameterizes the minimum percentage of covered vehicles necessary to make a deployment acceptable or feasible. In this paper, we prove that the decision version of the gamma deployment problem in grids is NP‐complete. Moreover, we correct the multiflow integer linear programming formulation present in the literature and introduce a new formulation based on set covering that is at least as strong as the multiflow formulation. In experiments with a commercial solver, the set covering formulation widely outperforms the multiflow formulation with respect to running time and linear programming relaxation gap.  相似文献   

3.
During the next decade, on-board pedestrian detection systems will play a key role in the challenge of increasing traffic safety. The main target of these systems, to detect pedestrians in urban scenarios, implies overcoming difficulties like processing outdoor scenes from a mobile platform and searching for aspect-changing objects in cluttered environments. This makes such systems combine techniques in the state-of-the-art Computer Vision. In this paper we present a three module system based on both 2D and 3D cues. The first module uses 3D information to estimate the road plane parameters and thus select a coherent set of regions of interest (ROIs) to be further analyzed. The second module uses Real AdaBoost and a combined set of Haar wavelets and edge orientation histograms to classify the incoming ROIs as pedestrian or non-pedestrian. The final module loops again with the 3D cue in order to verify the classified ROIs and with the 2D in order to refine the final results. According to the results, the integration of the proposed techniques gives rise to a promising system.  相似文献   

4.
We describe a framework for analyzing probabilistic reachability and safety problems for discrete time stochastic hybrid systems within a dynamic games setting. In particular, we consider finite horizon zero-sum stochastic games in which a control has the objective of reaching a target set while avoiding an unsafe set in the hybrid state space, and a rational adversary has the opposing objective. We derive an algorithm for computing the maximal probability of achieving the control objective, subject to the worst-case adversary behavior. From this algorithm, sufficient conditions of optimality are also derived for the synthesis of optimal control policies and worst-case disturbance strategies. These results are then specialized to the safety problem, in which the control objective is to remain within a safe set. We illustrate our modeling framework and computational approach using both a tutorial example with jump Markov dynamics and a practical application in the domain of air traffic management.  相似文献   

5.
A major problem associated with the rapid growth in automotive production is an increase in traffic congestion and accidents, especially in big cities of China. To solve the problem, the government has been increasing funds for improving the traffic infrastructure, enforcing traffic laws, and educating drivers about traffic regulations. In addition, research institutes have launched R&D projects in driver assistance and safety warning systems. In particular, in 1999, the Chinese Academy of Sciences' Intelligent Control and Systems Engineering Center started the Intelligent Vehicle Platforms project. The project aims to promote the use of intelligent technology for safe, efficient, and smart vehicles and to prototype vehicular electronic and sensory products and systems for the Chinese automotive industry. One of the project's key objectives is to develop a vehicular application-specific operating system (vASOS). The National Science Foundation of China and the CAS Knowledge Innovation Program support the project. Supported by the Vehicular Embedded Computing Platform project, the Xi'an Jiaotong University (XJTU-"Jiao Tong" means transportation in Chinese) Institute of Artificial Intelligence and Robotics and the CAS have collaborated to develop intelligent driver-assistance and safety warning systems for passenger vehicles, particularly GPS-and vision-based systems.  相似文献   

6.
近年来,随着智能手机的快速发展,低头族行人在过马路时依然保持浏览手机的姿态,由此造成的交通事故时有发生。如何有效检测低头族成为了当下亟待解决的问题。现有的检测方法需要大量的真实低头异常的数据集,且最终结果存在识别精度不高、速度不尽人意的问题。基于此,提出了一种快速有效的低头异常行人检测方法,与现有方法的区别在于该方法是基于关节点而不是图像。首先设计了一种构造数据集的方法,在识别人体关节点的基础上,调整左右腕关节坐标来模拟行人手持电子设备的姿态,解决了数据集缺少且需要大量标注的问题;其次,提出复杂环境中高效检测行人异常行为的算法,对上述关节点坐标进行分类识别,充分利用手臂与头部信息来实现行人异常行为检测。实验证明,所提算法能够实现实时检测,且检测精度达到了94.08%,从而可以为视频监控、驾驶员、辅助驾驶以及自动驾驶系统提供必要的参考信息。  相似文献   

7.
为保障铁路道口行车安全,利用移动数字通信公网的互联网接入平台通用分组无线业务(general packet radio service,简称GPRS)作为通讯手段,成功研发出一套全新的铁路道口行车安全监测系统;该系统不仅能够实时显示铁路道口部位列车运行情况,还可以结合列车行进位置,将监测数据进行信息化处理,并利用数据分析功能,对可能出现的安全问题发出警告;将这项技术用于列车与铁路道口进行试验,结果证明:当系统监测到电气特性指标超出安全范围或者是道口信号设备出现问题时,能够及时向工作人员发出警报,根据列车进出道口状态及运行状态迅速做出相应的处理。  相似文献   

8.
为解决变电站二次设备防误操作问题,用技术手段实现二次设备检修安全管控,本文探索基于物联网的二次设备防误操作技术。研究的技术方案是将系统数据存储在云端,通过手机APP授权智能钥匙的方式来实现变电站二次设备检修时的安全管控。系统包括二次设备检修安全管理软件、手机APP、智能钥匙、机械解锁钥匙、智能安全锁具、闭锁附件和安全警示牌等。当有检修任务时,运行人员根据工作票内容,通过手机授权智能钥匙,对检修面的二次设备关键点进行上锁,同时挂牌警示,防止误操作二次设备引发检修事故。检修过程中或检修结束需要开启锁具均需要手机授权,整个操作过程储存在云端,可查询和管控。该方案解决了二次设备防误技术硬件闭锁问题,实现了基于物联网的安全管控。  相似文献   

9.
Daytime running lamps (DRL) on vehicles have proven to be an effective measure to prevent accidents during the daytime, particularly when pedestrians and cyclists are involved. However, there are negative interactions of DRL with other functions in automotive lighting, such as delays in pedestrians’ visual reaction time (VRT) when turn indicators are activated in the presence of DRL. These negative interactions need to be reduced. This work analyses the influence of variables inherent to pedestrians, such as height, gender and visual defects, on the VRT using a classification and regression tree as an exploratory analysis and a generalized linear model to validate the results. Some pedestrian characteristics, such as gender, alone or combined with the DRL colour, and visual defects, were found to have a statistically significant influence on VRT and, hence, on traffic safety. These results and conclusions concerning the interaction between pedestrians and vehicles are presented and discussed.

Practitioner Summary: Visual interactions of vehicle daytime running lamps (DRL) with other functions in automotive lighting, such as turn indicators, have an important impact on a vehicle’s conspicuity for pedestrians. Depending on several factors inherent to pedestrians, the visual reaction time (VRT) can be remarkably delayed, which has implications in traffic safety.  相似文献   


10.
Soft computing techniques and particularly fuzzy inference systems are gaining momentum as tools for network traffic modeling, analysis and control. Efficient hardware implementations of these techniques that can achieve real-time operation in high-speed networking equipment as well as other highly time-constrained application fields is however an open problem. We introduce a development platform for fuzzy inference systems with applications to network traffic analysis and control. The platform addresses the current requirements and constraints of high performance networking equipment. For the development process, we set up a methodology and a CAD tool chain that span the entire design process from initial specification in a high-level language to implementation on FPGA devices. An FPGA development board with PCI/PCIe interface is employed to support an open platform that comprises CAD tools as well as IP cores. PCI compatible fuzzy inference modules are implemented as System-on-Programmable-Chip (SoPC). We present satisfactory experimental results from the implementation of fuzzy systems for a number of applications in analysis and control of Internet traffic. These systems are shown to satisfy operational and architectural requirements of current and future high performance routing equipment. The platform proposed allows for the development of prototypes while avoiding large investments and complicated management procedures which constrain the testing and adoption of soft computing techniques in high performance networking.  相似文献   

11.
《Ergonomics》2012,55(8):1185-1195
The approach to human reliability has been changing during the past decades, partly due to the needs from probabilistic risk assessment of large scale industrial installations, partly due to a change within psychological research towards cognitive studies. In the paper, some of the characteristic features of this change are discussed

Definition of human error and judgement of performance are becoming increasingly difficult concurrently with the change of tasks from routine activities towards decision making during abnormal situations. The nature of human error and the relationship with learning and adaptation are discussed, and the recent development of models of cognitive mechanisms behind errors is mentioned

The present approaches to human reliability within different application areas are reviewed. In industrial risk analysis, attempts are made to develop models of operators' decision making during emergency situations, and to obtain the necessary error data by simulator experiments and by systematic use of expert judgement. Simplifying assumptions are necessary for analytical risk assessment including human activities, and to make the results practically acceptable, a close coordination of risk analysis and risk management during operation appears to be necessary. In work safety, the analytical approach of risk analysis seems to be fruitful as a supplement to statistical analysis of accident reports, in particular if supported by application of cognitive models to judge the psychological feasibility of improvements. Finally, an approach to the study of traffic safety from the point of view of intentions and reasons behind behaviour is reviewed and related to the cognitive models described

The question is finally raised as to whether the development of cognitive models will be able to serve a more effective transfer of results between these traditionally rather separate lines of research  相似文献   

12.
大型动态网络上网管数据的采集,由于网络本身复杂性的不断增加而越来越困难,尤其是网络的动态性和可伸缩性等问题,为此利用移动代理实现分布式监测系统.提出了基于这种思想下的代理定位的一种分布式算法,该算法主要是基于局部信息进行代理的定位,从而可以减少网络管理的数据流量,实现系统的适应性.  相似文献   

13.
Owing to the increasing number of vehicles in vehicular cyber-physical systems (VCPSs) and the growing popularity of various services or applications for vehicles, cellular networks are being severely overloaded. Offloading mobile data traffic through Wi-Fi or a vehicular ad hoc network (VANET) is a promising solution for partially solving this problem because it involves almost no monetary cost. We propose combination optimization to facilitate mobile data traffic offloading in emerging VCPSs to reduce the amount of mobile data traffic for the QoS-aware service provision. We investigate mobile data traffic offloading models for Wi-Fi and VANET. In particular, we model mobile data traffic offloading as a multi-objective optimization problem for the simultaneous minimization of mobile data traffic and QoS-aware service provision; we use mixed-integer programming to obtain the optimal solutions with the global QoS guarantee. Our simulation results confirm that our scheme can offload mobile data traffic by up to 84.3% while satisfying the global QoS guarantee by more than 70% for cellular networks in VCPSs.  相似文献   

14.
伴随工业互联网的提出和推进,我国化工行业已开始将工业互联网广泛应用到工业生产的各个环节,并成为企业经营管理的常规手段,以优化现有生产流程、提升企业与市场的沟通能力、促进企业可持续性发展,使得工业互联网技术和工业生产不再相互独立进行、不再是单方的带动和促进关系,而是两者在技术、产品、管理等各个层面相互交融、彼此不可分割。然而,化工行业的各个生产、销售环节较为分散,设备、系统等存在的安全隐患无法及时收集、全面汇总、统一分析,造成潜在的网络安全风险长期存在于化工行业生产中,给企业安全生产带来影响。将基于分布式思想探讨化工行业的工业互联网安全防御体系。  相似文献   

15.
随着社会车辆的增多,带来了各种交通违章事故的多发,而对于当前交通违章查询及缴纳罚款的方式,人们总要东奔西跑,在交通管理部门查询了违章记录,然后再去银行缴纳罚款,不仅耽误了时间,而且显得麻烦。为此,结合当前移动信息技术的发展,有必要建立一套通过移动终端查询交通违章及缴纳罚款的信息系统,该系统有助于解决跑东跑西的繁琐环节,方便车主随时随地查询交通违章和缴纳交通罚款的需求,有利于节约时间、提高社会整体效率。  相似文献   

16.
《Computer Networks》2007,51(12):3595-3616
As mobile ad hoc network (MANET) systems research has matured and several testbeds have been built to study MANETs, research has focused on developing new MANET applications such as collaborative games, collaborative computing, messaging systems, distributed security schemes, MANET middleware, peer-to-peer file sharing systems, voting systems, resource management and discovery, vehicular computing and collaborative education systems. The growing set of diverse applications developed for MANETs pose far more complex traffic patterns than the simple one-to-one traffic pattern, and hence the one-to-one traffic pattern widely used in previous protocol studies has become inadequate in reflecting the relative performance of these protocols when deployed to support these emerging applications.As a first step towards effectively supporting newly developed and future diverse MANET applications, this paper studies the performance impact of diverse traffic patterns on routing protocols in MANETs. Specifically, we propose a new communication model that extends the previous communication model to include a more general traffic pattern that varies the number of connections per source node. We study the performance impact of traffic patterns on various routing protocols via detailed simulations of an ad hoc network of 112 mobile nodes. Our simulation results show that many of the conclusions drawn in previous protocol comparison studies no longer hold under the new traffic patterns. These results motivate the need for performance evaluation of ad hoc networks to not only include rich and diverse mobility models as has been done in the past but also include diverse traffic patterns that stress a wide set of protocol design issues.  相似文献   

17.
With the rapid development of technologies, many production systems and modes has been advanced with respect to manufacturing, management and information fields. The paper deals with the problem of the implementation of an autonomous industrial mobile robot in real-world industrial applications in which all these fields are considered, namely mobile robot technology, planning and scheduling and communication. A methodology for implementation consisting of: a mobile robot system design (Little Helper prototype), an appropriate industrial application (multiple-part feeding), an implementation concept for the industrial application (the Bartender Concept), a mathematical model and a genetic algorithm-based heuristic is proposed. Furthermore, in order for the mobile robot to work properly in a flexible (cloud-based) manufacturing environment, the communications and exchange of data between the mobile robot with other manufacturing systems and shop-floor operators are addressed in the methodology. The proposed methodology provides insight into how mobile robot technology and abilities contribute to cloud manufacturing systems. A real-world demonstration at an impeller production line in a factory and computational experiments are conducted to demonstrate the effectiveness of the proposed methodology.  相似文献   

18.
《Advanced Robotics》2013,27(6-7):739-763
This paper deals with the problem of coordinating flexible automated guided vehicles (AGVs) in real manufacturing systems. The problem consists of ensuring safe and successful task execution while several AGVs operate as a distributed transportation system in real industrial environments. The proposed solution combines different decentralized techniques to increase the flexibility and scalability of the multirobot system. The coordination is addressed by dividing the problem into path planning, obstacle avoidance and traffic control problems. The path planning method takes into account the location of mates for replanning the routes. The obstacle avoidance technique considers the kinematic constraints of the platform for reactive motion control. The traffic control approach makes use of a decentralized control policy that takes into account the capabilities of vehicles. By combining all these techniques and configuring the system properly, we present the successful development of a distributed transportation system composed of a team of flexible AGVs. The proposed solution has been validated using both a set of custom-modified AGVs operating in a real factory and a simulation of several AGVs operating in a virtual scenario.  相似文献   

19.
随着信息技术的发展,尤其是网络的普及,网络系统的安全问题开始引起人们的注意。但是仅仅依靠技术、安全设备远远不能够解决信息安全中遇到的所有问题。当使用了种类繁多的网络安全产品后,如何有效地对它们进行统一的管理和配置就成了使用者面临的一个主要问题。本文阐述了建设网络安全管理的必要性,在此基础上着重介绍了一套基于J2EE架构、利用Struts框架开发,以Web形式访问的网络安全管理平台。  相似文献   

20.
In this paper a modeling framework for urban traffic systems (UTS) is presented. The model, used for agent based micro-simulation, describes both the traffic network and dynamic entities, namely vehicles, traffic lights, and pedestrians. The framework allows defining systematically the necessary components and their behavior of a model oriented to event driven simulation, which can be executed in a distributed way. In the model, the vehicles are conceived as mobile agents with decision making capabilities that interact with the environment and other entities within the traffic network, performing diverse activities according to numerous situations arisen during the simulation. A multi-level Petri net based formalism, named n-LNS is used for describing the structure of the UTS and the components behavior. The first level describes the traffic network; the second level models the behavior of diverse road network users considered as agents, and the third level specifies detailed procedures performed by the agents, namely travel plans, tasks, etc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号