Using Micro-Simulation VISSIM to Study the Effectiveness of Left-Turn Waiting Area Implementation

2018 ◽  
Vol 876 ◽  
pp. 187-191
Author(s):  
Da Zhi Sun

Numerous attempts have been made to improve the existing intersection systems to maximize capacity and reduce the delay costs and queues. This paper introduces a simulation method to study the effectiveness of a new technique introduced recently in China – the left-turn waiting area. This has an extended left lane that allows the vehicles to wait before the signal turns green. It is reported that this system can significantly improve intersection performance. This paper introduces the different types of left-turn waiting areas which have been widely implemented in China. The method of using micro-simulation VISSIM to study the effectiveness of left-turn waiting area is proposed in this paper, along with some preliminary results of a case study.

2010 ◽  
Vol 26-28 ◽  
pp. 714-719 ◽  
Author(s):  
Dong Zhou ◽  
Jian Ming Shi ◽  
Jie Geng ◽  
Chuan Lv

The paper first demonstrates some relevant concepts with virtual maintenance, and further discusses the concepts and connotations of virtual maintenance. As the key techniques, virtual maintenance model and simulation method are studied in the paper. Virtual maintenance model (VMM) is present, and the model is based on Petri Net and can describe the relations of maintenance resources. In addition, virtual maintenance simulation rules are built in the paper. Finally, a case study of the LRU repair of an aircraft is conducted, and the result confirms the validation and feasibility of all the studies, which can become a new technique means for maintainability engineering.


Author(s):  
Stian Skjong ◽  
Eilif Pedersen

In this work, a co-simulation case study of a marine offshore surface vessel in Dynamic Positioning (DP) operation, where the DP-controller is placed on an Arduino® micro-controller, is presented. The reasons for using co-simulation are that it is possible to distribute the model among different cores in one computer as well as among different computing members over a local area network. Also, it is possible to export submodels from different software and connect them together in a common simulation. This enables the use of suited modeling software for different types of dynamical systems, as well as hardware, such as micro-controllers for Hardware-In-the-Loop testing. Such an integrated and open simulation method facilitates the development of new products as well as shortening the iterative process in design phases. As for co-simulation standard, the Functional Mock-up Interface (FMI) for co-simulation will be used in this work, and a communication Functional Mock-up Unit (FMU) that communicates with hardware and handles the signal flow between the hardware and the co-simulation will be developed. In the case study, a DP-controller is implemented on the microcontroller and connected to a filter, a position reference system and an offshore vessel model, all implemented as FMUs in the total co-simulation. For simulation master algorithm, the open source software “Coral”, that was developed in the knowledge building project “Virtual Prototyping of Maritime Systems and Operations” (ViProMa), will be used. The simulation results show that even though the micro-controller is set to communicate with a lower frequency than the rest of the co-simulation submodels, the total c-simulation is stable and produces good results. It also show that the FMI standard facilitates hardware in the loop in the co-simulation, and that the co-simulation master algorithm Coral is suited for such simulation cases.


2008 ◽  
Vol 56 (S 1) ◽  
Author(s):  
I Breitenbach ◽  
A El-Essawi ◽  
U Carstens-Fitz ◽  
MB Anssar ◽  
W Ahl ◽  
...  

2017 ◽  
Vol 1 (1) ◽  
pp. 1-16
Author(s):  
John Harner ◽  
Lee Cerveny ◽  
Rebecca Gronewold

Natural resource managers need up-to-date information about how people interact with public lands and the meanings these places hold for use in planning and decision-making. This case study explains the use of public participatory Geographic Information System (GIS) to generate and analyze spatial patterns of the uses and values people hold for the Browns Canyon National Monument in Colorado. Participants drew on maps and answered questions at both live community meetings and online sessions to develop a series of maps showing detailed responses to different types of resource uses and landscape values. Results can be disaggregated by interaction types, different meaningful values, respondent characteristics, seasonality, or frequency of visit. The study was a test for the Bureau of Land Management and US Forest Service, who jointly manage the monument as they prepare their land management plan. If the information generated is as helpful throughout the entire planning process as initial responses seem, this protocol could become a component of the Bureau’s planning tool kit.


Author(s):  
Guillaume Celi ◽  
Sylvain Dudit ◽  
Thierry Parrassin ◽  
Philippe Perdu ◽  
Antoine Reverdy ◽  
...  

Abstract For Very Deep submicron Technologies, techniques based on the analysis of reflected laser beam properties are widely used. The Laser Voltage Imaging (LVI) technique, introduced in 2009, allows mapping frequencies through the backside of integrated circuit. In this paper, we propose a new technique based on the LVI technique to debug a scan chain related issue. We describe the method to use LVI, usually dedicated to frequency mapping of digital active parts, in a way that enables localization of resistive leakage. Origin of this signal is investigated on a 40nm case study. This signal can be properly understood when two different effects, charge carrier density variations (LVI) and thermo reflectance effect (Thermal Frequency Imaging, TFI), are taken into account.


The effective altruism movement consists of a growing global community of people who organize significant parts of their lives around two key ideas, represented in its name. Altruism: If we use a significant portion of the resources in our possession—whether money, time, or talents—with a view to helping others, we can improve the world considerably. Effectiveness: When we do put such resources to altruistic use, it is crucial to focus on how much good this or that intervention is reasonably expected to do per unit of resource expended (for example, per dollar donated). While global poverty is a widely used case study in introducing and motivating effective altruism, if the ultimate aim is to do the most good one can with the resources expended, it is far from obvious that global poverty alleviation is highest priority cause area. In addition to ranking possible poverty-alleviation interventions against one another, we can also try to rank interventions aimed at very different types of outcome against one another. This includes, for example, interventions focusing on animal welfare or future generations. The scale and organization of the effective altruism movement encourage careful dialogue on questions that have perhaps long been there, throwing them into new and sharper relief, and giving rise to previously unnoticed questions. In the present volume, the first of its kind, a group of internationally recognized philosophers, economists, and political theorists contribute in-depth explorations of issues that arise once one takes seriously the twin ideas of altruistic commitment and effectiveness.


Author(s):  
Andrea B. Temkin ◽  
Mina Yadegar ◽  
Christine Cho ◽  
Brian C. Chu

In recent years, the field of clinical psychology has seen a growing movement toward the research and development of transdiagnostic treatments. Transdiagnostic approaches have the potential to address numerous issues related to the development and treatment of mental disorders. Among these are the high rates of comorbidity across disorders, the increasing need for efficient protocols, and the call for treatments that can be more easily disseminated. This chapter provides a review of the current transdiagnostic treatment approaches for the treatment of youth mental disorders. Three different types of transdiagnostic protocols are examined: mechanism-based protocols, common elements treatments, and general treatment models that originated from single-disorder approaches to have broader reach. A case study illuminates how a mechanism-based approach would inform case conceptualization for a client presenting with internalizing and externalizing symptoms and how a transdiagnostic framework translates into practice.


Geosciences ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 150
Author(s):  
Nilgün Güdük ◽  
Miguel de la Varga ◽  
Janne Kaukolinna ◽  
Florian Wellmann

Structural geological models are widely used to represent relevant geological interfaces and property distributions in the subsurface. Considering the inherent uncertainty of these models, the non-uniqueness of geophysical inverse problems, and the growing availability of data, there is a need for methods that integrate different types of data consistently and consider the uncertainties quantitatively. Probabilistic inference provides a suitable tool for this purpose. Using a Bayesian framework, geological modeling can be considered as an integral part of the inversion and thereby naturally constrain geophysical inversion procedures. This integration prevents geologically unrealistic results and provides the opportunity to include geological and geophysical information in the inversion. This information can be from different sources and is added to the framework through likelihood functions. We applied this methodology to the structurally complex Kevitsa deposit in Finland. We started with an interpretation-based 3D geological model and defined the uncertainties in our geological model through probability density functions. Airborne magnetic data and geological interpretations of borehole data were used to define geophysical and geological likelihoods, respectively. The geophysical data were linked to the uncertain structural parameters through the rock properties. The result of the inverse problem was an ensemble of realized models. These structural models and their uncertainties are visualized using information entropy, which allows for quantitative analysis. Our results show that with our methodology, we can use well-defined likelihood functions to add meaningful information to our initial model without requiring a computationally-heavy full grid inversion, discrepancies between model and data are spotted more easily, and the complementary strength of different types of data can be integrated into one framework.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document