The study of large-scale area lighting device conflict detection mechanism

Author(s):  
Xiaohui Rong ◽  
Pan Deng ◽  
Feng Chen ◽  
Shilong Ma
Author(s):  
J Leonard ◽  
A Savvaris ◽  
A Tsourdos

The large-scale of unmanned aerial vehicle applications has escalated significantly within the last few years, and the current research is slowly hinting at a move from single vehicle applications to multivehicle systems. As the number of agents operating in the same environment grows, conflict detection and resolution becomes one of the most important factors of the autonomous system to ensure the vehicles’ safety throughout the completion of their missions. The work presented in this paper describes the implementation of the novel distributed reactive collision avoidance algorithm proposed in the literature, improved to fit a swarm of quadrotor helicopters. The original method has been extended to function in dense and crowded environments with relevant spatial obstacle constraints and deconfliction manoeuvres for high number of vehicles. Additionally, the collision avoidance is modified to work in conjunction with a dynamic close formation flight scheme. The solution presented to the conflict detection and Resolution problem is reactive and distributed, making it well suited for real-time applications. The final avoidance algorithm is tested on a series of crowded scenarios to test its performances in close quarters.


2010 ◽  
Vol 2010 ◽  
pp. 1-11 ◽  
Author(s):  
Yanfei Zheng ◽  
Kefei Chen ◽  
Weidong Qiu

Data aggregation is an essential operation to reduce energy consumption in large-scale wireless sensor networks (WSNs). A compromised node may forge an aggregation result and mislead base station into trusting a false reading. Efficient and secure aggregation scheme is critical in WSN applications due to the stringent resource constraints. In this paper, we propose a method to build up the representative-based aggregation tree in the WSNs such that the sensing data are aggregated along the route from the leaf cell to the root of the tree. In the cinema of large-scale and high-density sensor nodes, representative-based aggregation tree can reduce the data transmission overhead greatly by directed aggregation and cell-by-cell communications. It also provides security services including the integrity, freshness, and authentication, via detection mechanism in the cells.


2020 ◽  
Vol 6 (18) ◽  
pp. eaaz6511 ◽  
Author(s):  
Gongjin Li ◽  
Zhe Ma ◽  
Chunyu You ◽  
Gaoshan Huang ◽  
Enming Song ◽  
...  

The sensing module that converts physical or chemical stimuli into electrical signals is the core of future smart electronics in the post-Moore era. Challenges lie in the realization and integration of different detecting functions on a single chip. We propose a new design of on-chip construction for low-power consumption sensor, which is based on the optoelectronic detection mechanism with external stimuli and compatible with CMOS technology. A combination of flipped silicon nanomembrane phototransistors and stimuli-responsive materials presents low-power consumption (CMOS level) and demonstrates great functional expansibility of sensing targets, e.g., hydrogen concentration and relative humidity. With a device-first, wafer-compatible process introduced for large-scale silicon flexible electronics, our work shows great potential in the development of flexible and integrated smart sensing systems for the realization of Internet of Things applications.


2015 ◽  
Vol 27 (8) ◽  
pp. 1617-1632 ◽  
Author(s):  
Ravi D. Mill ◽  
Ian Cavin ◽  
Akira R. O'Connor

Neural substrates of memory control are engaged when participants encounter unexpected mnemonic stimuli (e.g., a new word when told to expect an old word). The present fMRI study (n = 18) employed the likelihood cueing recognition task to elucidate the role of functional connectivity (fcMRI) networks in supporting memory control processes engaged by these unexpected events. Conventional task-evoked BOLD analyses recovered a memory control network similar to that previously reported, comprising medial prefrontal, lateral prefrontal, and inferior parietal regions. These were split by their differential affiliation to distinct fcMRI networks (“conflict detection” and “confirmatory retrieval” networks). Subsequent ROI analyses clarified the functional significance of this connectivity differentiation, with “conflict” network-affiliated regions specifically sensitive to cue strength, but not to response confidence, and “retrieval” network-affiliated regions showing the opposite pattern. BOLD time course analyses corroborated the segregation of memory control regions into “early” conflict detection and “late” retrieval analysis, with both processes underlying the allocation of memory control. Response specificity and time course findings were generalized beyond task-recruited ROIs to clusters within the large-scale fcMRI networks, suggesting that this connectivity architecture could underlie efficient processing of distinct processes within cognitive tasks. The findings raise important parallels between prevailing theories of memory and cognitive control.


2013 ◽  
Vol 380-384 ◽  
pp. 2699-2702
Author(s):  
Guang Yi Tang ◽  
Hong Feng Wang ◽  
Li Jie Cui

nteroperable role-based access control model (IRBAC 2000) has solved inter-domains authentication access through role-mapping, but it may appear related conflicts in the process of role-mapping and then posing a security risk. This study introduces the conflict detection mechanism on the inter-domain of Role-Mapping process, and it is effectively and quickly detected the associated conflicts, and gives the detection algorithm and experimental verification, to improve the inter-domain security interoperable.


Sign in / Sign up

Export Citation Format

Share Document