closed circuit
Recently Published Documents


TOTAL DOCUMENTS

1474
(FIVE YEARS 199)

H-INDEX

35
(FIVE YEARS 4)

2022 ◽  
pp. 969-1001
Author(s):  
Jelena L. Pisarov ◽  
Gyula Mester

Even the behavior of a single driver can have a dramatic impact on hundreds of cars, making it more difficult to manage traffic. While the attempts to analyze and correct the traffic patterns that lead to congestion began as early in the 1930s, it wasn't until recently that scientists developed simulation techniques and advanced algorithms to create more realistic visualizations of traffic flow. In experiments conducted by Alexandre Bayen and the Liao-Cho, which included several dozen cars in a small-scale closed circuit, a single autonomous vehicle could eliminate traffic jams by moderating the speed of every car on the road. In larger simulations, the research showed that once their number rises to 5-10% of all cars in the traffic, they can manage localized traffic even in complex environments, such as merging multiple lanes of traffic into two or navigating extremely busy sections.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0259713
Author(s):  
Adarsh Jagan Sathyamoorthy ◽  
Utsav Patel ◽  
Moumita Paul ◽  
Yash Savle ◽  
Dinesh Manocha

Observing social/physical distancing norms between humans has become an indispensable precaution to slow down the transmission of COVID-19. We present a novel method to automatically detect pairs of humans in a crowded scenario who are not maintaining social distancing, i.e. about 2 meters of space between them using an autonomous mobile robot and existing CCTV (Closed-Circuit TeleVision) cameras. The robot is equipped with commodity sensors, namely an RGB-D (Red Green Blue—Depth) camera and a 2-D lidar to detect social distancing breaches within their sensing range and navigate towards the location of the breach. Moreover, it discreetly alerts the relevant people to move apart by using a mounted display. In addition, we also equip the robot with a thermal camera that transmits thermal images to security/healthcare personnel who monitors COVID symptoms such as a fever. In indoor scenarios, we integrate the mobile robot setup with a static wall-mounted CCTV camera to further improve the number of social distancing breaches detected, accurately pursuing walking groups of people etc. We highlight the performance benefits of our robot + CCTV approach in different static and dynamic indoor scenarios.


2021 ◽  
Vol 10 (23) ◽  
pp. 5657
Author(s):  
Davide Chiumello ◽  
Luca Bolgiaghi ◽  
Paolo Formenti ◽  
Tommaso Pozzi ◽  
Manuela Lucenteforte ◽  
...  

Mechanically ventilated patients periodically require endotracheal suctioning. There are conflicting data regarding the loss of lung gas volume caused by the application of a negative pressure by closed-circuit suctioning. The aim of this study was to evaluate the effects of suctioning performed by a closed-circuit system in ARDS patients during volume- or pressure-controlled ventilation. In this prospective crossover-design study, 18 ARDS patients were ventilated under volume and pressure control applied in random order. Gas exchange, respiratory mechanics and EIT-derived end-expiratory lung volume (EELV) before the suctioning manoeuvre and after 5, 15 and 30 min were recorded. The tidal volume and respiratory rate were similar in both ventilation modes; in volume control, the EELV decreased by 31 ± 23 mL, 5 min after the suctioning, but it remained similar after 15 and 30 min; the oxygenation, PaCO2 and respiratory system elastance did not change. In the pressure control, 5 min after suctioning, EELV decreased by 35 (26–46) mL, the PaO2/FiO2 did not change, while PaCO2 increased by 5 and 30 min after suctioning (45 (40–51) vs. 48 (43–52) and 47 (42–54) mmHg, respectively). Our results suggest minimal clinical advantages when a closed system is used in volume-controlled compared to pressure-controlled ventilation.


Author(s):  
Pavithra S

Abstract: This paper discusses thief detection, which is one of the important applications of suspicious human activity detections. Individual safety is a major concern in our busy scheduling life. The main reason for this concern is an ever-increasing number of activities that pose a threat. A simple closed-circuit television (CCTV) installation system is not sufficient enough because it usually requires a person to be alert and monitoring the cameras always is inefficient. The necessitates for the development of a fully automated security system detects anomalous activities in real-time, and provides instant assistance to the victim. As a consequence, we proposed a framework that examines and detects suspicious human activity from real-time Surveillance video using deep learning techniques and generates an alert if abnormal activity occurs. The method was tested on a dataset with both normal and abnormal activity and yielded better results. Keywords: Thief detection, deep-learning, surveillance video, predictive analysis, yolo.


Author(s):  
Costantino Balestra ◽  
François Guerrero ◽  
Sigrid Theunissen ◽  
Peter Germonpré ◽  
Pierre Lafère
Keyword(s):  

2021 ◽  
Vol 10 (46) ◽  
Author(s):  
Yasuyuki Takemura ◽  
Masataka Aoki ◽  
Thao Tran P. ◽  
Noriko Tomioka ◽  
Keiichi Kubota ◽  
...  

Information about sediment microbiota affected by sediment microbial fuel cells (SMFC) is limited. A laboratory-scale SMFC was applied to a eutrophic lake sediment under closed-circuit/open-circuit conditions. We analyzed the prokaryotes in the sediment adhering to the anode material. The archaeal family Methanoperedenceae was a predominant group under closed-circuit conditions.


2021 ◽  
pp. 65-92
Author(s):  
Kent Cartwright

Chapter 2, treating comic doubleness as a structural matter, explores the way scenes, actions, and plot lines reflect each other, as if to create an uncanny closed circuit or dream-world. Those reflections call up a long-standing critical recognition of ‘magical parallelisms,’ such as between the story lines of Viola and Sebastian, that express the Renaissance fascination with analogy and with occult theories of sympathetic influence. Within the play, structural doublings create affects ranging from enervation and frustrated desires, to a premonition of fatedness and converging destinies, to the agitation of manically accelerated action, to the liberating recognition of differences with in repetitions. Focusing on Twelfth Night, this chapter considers how the play creates the sense of a numinous but opaque providentialism, features that it also finds in other Shakespearean, Italian, and Tudor plays, including those of John Lyly.


2021 ◽  
Vol 1 (7) ◽  
pp. 35-44
Author(s):  
Sergei I. Evdokimov ◽  
◽  
Tatiana E. Gerasimenko ◽  

Research objective is to address an up to date task of developing the technology of associated gold recovery from complex ore. Object of research is the gold-bearing copper-pyrite ore. Gold was recovered in laboratory conditions with the use of gravity methods of mineral separation. Research tools. Rational modes of machinery operation have been determined through mathematical planning of experiments including the obtained results processing by mathematical and statistical methods. Methods of research. Gold was recovered in the grinding-classification circuit based on a seriesinstalled short-cone hydrocyclone, a jigging machine and a shaking table. Research results. The developed jig mode differs from the existing ones by the closed-circuit of jig machine chambers: from the feed of the second (in the direction of the light fraction travel) jig chamber, the light fraction (tailings) and undersize product – fraction with the increased content of accessory minerals (rough concentrate) are separated. The rough concentrate in the second chamber is directed to the first chamber of the machine, where the finished jig concentrate is obtained in the form of an undersize product. The light fraction moves from the first chamber to the second and is removed from the machine through the tail board. When fine-tuning the heavy fraction of jigging on a shaking table, it is recommended to mix 1/2 part of the initial feed of the tables with the rough concentrate isolated from the other 1/2 of the original feed. The new jigging mode and the scheme of concentration on the tables provide an increase in the gold content in the initial feed of the apparatus, which is the reason for a decrease in gold losses with the tails of the gravity circuit. Research relevance. Gold recovery increment by 4.77% was obtained due to the use of all three recommended scientific and technical measures, namely sands concentration in a short head cone crusher on a jig, switching the jig chambers to a closed circuit, and jet motion of concentrates on shaking tables. Scope of the results. The results should be applied when concentrating ore containing free (amalgamable) gold, as well as gold-bearing pyrite.


2021 ◽  
Vol 11 (2) ◽  
pp. 578-593
Author(s):  
Muhammad Huri Fikri ◽  
Ida Nurhaida

Penggunaan Nagios dan Zabbix sebagai alat untuk mendeteksi dan mengirimkan notifikasi peringatan apabila terdapat suatu device atau host yang mati secara tiba-tiba (down). Objek pemantauan dari penelitian ini adalah IP kamera CCTV (Internet Protocol Closed Circuit Television) dan server kamera (Host Windows) yang mengelola IP kamera tersebut. Kegagalan sistem ini dapat disebabkan karena pemadaman listrik. Hal ini menyebabkan matinya seluruh perangkat jaringan (network device). Maka dari itu perlu sebuah notifikasi secara real time apabila salah satu dari kamera atau server kamera mengalami kegagalan sistem. Penelitian ini menggunakan metodologi Network Development Life Cycle (NDLC). Dalam penelitian ini dapat disimpulkan bahwa penggunaan aplikasi Telegram dan Gmail bisa digunakan sebagai alat untuk mendapatkan notifikasi di perangkat telepon pintar. Pengiriman notifikasi dari aplikasi Nagios akan langsung dikirimkan (tanpa penundaan pengiriman) ke Telegram dan Gmail setelah terdeteksi status down / up sedangkan aplikasi Zabbix mengalami penundaan. Tetapi aplikasi Zabbix dapat medeteksi lebih cepat daripada aplikasi Nagios untuk pantauan Host Windows dan IP Kamera.


Sign in / Sign up

Export Citation Format

Share Document