Image Detection to Vehicle Queue Length of Crossroad Based on DSP

Author(s):  
Lu Weina ◽  
Wang Haifang ◽  
Ma Yuquan ◽  
Zhang Lihong ◽  
Wang Qingzhu
Keyword(s):  
Author(s):  
Georgiy Aleksandrovich Popov

The article deals with a two-channel queuing system with a Poisson incoming call flow, in which the application processing time on each of the devices is different. Such models are used, in particular, when describing the operation of the system for selecting service requests in a number of operating systems. A complex system characteristic was introduced at the time of service endings on at least one of the devices, including the queue length, the remaining service time on the occupied device, and the time since the beginning of the current period of employment. This characteristic determines the state of the system at any time. Recurrence relations are obtained that connect this characteristic with its marginal values when there is no queue in the system. The method of introducing additional events was chosen as one of the main methods for analyzing the model. The relationships presented in this article can be used for analysis of the average characteristics of this system, as well as in the process of its simulation. Summarizing the results of work on multichannel systems with an arbitrary number of servicing devices will significantly reduce the time required for simulating complex systems described by sets of multichannel queuing systems.


2020 ◽  
Vol 4 (26) ◽  
pp. 59-66
Author(s):  
A. G. Morozkov ◽  
◽  
M. R. Yazvenko ◽  

The article presents simplified queuing system model of freight marine port. The article discusses the basic elements of queuing system, its mathematical solution and structure. Simulation model was created using AnyLogic to analyze an effect of system capacity on queue length. The results were analyzed and the solution for queue optimization was proposed. Key words: queuing system, simulation modeling, AnyLogic, marine port, servers, queue.


Author(s):  
S. W. Kwon ◽  
I. S. Song ◽  
S. W. Lee ◽  
J. S. Lee ◽  
J. H. Kim ◽  
...  

2020 ◽  
Vol 13 (3) ◽  
pp. 422-432
Author(s):  
Madan Mohan Agarwal ◽  
Hemraj Saini ◽  
Mahesh Chandra Govil

Background: The performance of the network protocol depends on number of parameters like re-broadcast probability, mobility, the distance between source and destination, hop count, queue length and residual energy, etc. Objective: In this paper, a new energy efficient routing protocol IAOMDV-PF is developed based on the fixed threshold re-broadcast probability determination and best route selection using fuzzy logic from multiple routes. Methods: In the first phase, the proposed protocol determines fixed threshold rebroadcast probability. It is used for discovering multiple paths between the source and the destination. The threshold probability at each node decides the rebroadcasting of received control packets to its neighbors thereby reducing routing overheads and energy consumption. The multiple paths list received from the first phase and supply to the second phase that is the fuzzy controller selects the best path. This fuzzy controller has been named as Fuzzy Best Route Selector (FBRS). FBRS determines the best path based on function of queue length, the distance between nodes and mobility of nodes. Results: Comparative analysis of the proposed protocol named as "Improved Ad-Hoc On-demand Multiple Path Distance Vector based on Probabilistic and Fuzzy logic" (IAOMDV-PF) shows that it is more efficient in terms of overheads and energy consumption. Conclusion: The proposed protocol reduced energy consumption by about 61%, 58% and 30% with respect to FF-AOMDV, IAOMDV-F and FPAOMDV routing protocols, respectively. The proposed protocol has been simulated and analyzed by using NS-2.


2021 ◽  
Vol 7 (3) ◽  
pp. 50
Author(s):  
Anselmo Ferreira ◽  
Ehsan Nowroozi ◽  
Mauro Barni

The possibility of carrying out a meaningful forensic analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, child pornography, and even fake packages. Additionally, printing and scanning can be used to hide the traces of image manipulation or the synthetic nature of images, since the artifacts commonly found in manipulated and synthetic images are gone after the images are printed and scanned. A problem hindering research in this area is the lack of large scale reference datasets to be used for algorithm development and benchmarking. Motivated by this issue, we present a new dataset composed of a large number of synthetic and natural printed face images. To highlight the difficulties associated with the analysis of the images of the dataset, we carried out an extensive set of experiments comparing several printer attribution methods. We also verified that state-of-the-art methods to distinguish natural and synthetic face images fail when applied to print and scanned images. We envision that the availability of the new dataset and the preliminary experiments we carried out will motivate and facilitate further research in this area.


Sign in / Sign up

Export Citation Format

Share Document