Search results

1 – 10 of over 1000
Article
Publication date: 7 September 2015

M. Navabi and R. Hamrah

The purpose of this paper is to perform a comparative study of two propagation models and a prediction of proximity distances among the space objects based on the two-line element…

Abstract

Purpose

The purpose of this paper is to perform a comparative study of two propagation models and a prediction of proximity distances among the space objects based on the two-line element set (TLEs) data, which identifies potentially risky approaches and is used to compute the probability of collision among the spacecrafts.

Design/methodology/approach

At first, the proximities are estimated for the mentioned satellites using a precise propagation model and based on a one-month simulation. Then, a study is performed to determine the probability of collision between two satellites using a formulation which takes into account the object sizes, covariance data and the relative distance at the point of closest approach. Simplifying assumptions such as a linear relative motion and normally distributed position uncertainties at the predicted closest approach time are applied in estimation.

Findings

For the case of Iridium-Cosmos collision and the prediction of a closest approach using available TLE orbital data and a propagation model which takes into account the effects of the earth’s zonal harmonics and drag atmospheric, the maximum probability of about 2 × 10 −6 was obtained, which can indicate the necessity of enacting avoidance maneuvers regarding the defined a probability threshold by satellite’s owner.

Originality/value

The contribution of this paper is to analyze and simulate the 2009 prominent collision between the Cosmos2251 and Iridium33 satellite by modeling their orbit propagation, predicting their closest approaches and, finally, assessing the risk of the possible collision. Moreover, an enhanced orbit determination can be effective to achieve an accurate assessment of the ongoing collision threat to active spacecrafts from orbital debris and preventing, if necessary, the hazards thereof.

Details

Aircraft Engineering and Aerospace Technology: An International Journal, vol. 87 no. 5
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 6 September 2011

L.M.B.C. Campos and J.M.G. Marques

The purpose of this paper is to calculate the probability of collision of flying aircraft crossing on straight paths in any direction.

Abstract

Purpose

The purpose of this paper is to calculate the probability of collision of flying aircraft crossing on straight paths in any direction.

Design/methodology/approach

The probability of deviations from the intended flight paths is used to calculate the probability of collision that is integrated over time to cover whole events.

Findings

The probabilities of collision are calculated in terms of the r.m.s. position errors and encounter geometry, that is aircraft velocities and flight path angles and crossing angles.

Research limitations/implications

The method does not apply to aircraft flying in parallel tracks at the same velocity in air corridors: that case has been covered elsewhere, as well as the case of climbing or descending aircraft.

Practical implications

International Civil Aviation Organization (ICAO) specifies as target level of safety (TLS) a probability of collision not exceeding 5×10−9 per hour. To meet the ICAO TLS standard, it is necessary to calculate collision probabilities for all stages of flight.

Social implications

A low collision probability is a safety metric; the value does depend on a realist choice of probability distribution.

Originality/value

Calculates the probability of collision for crossing flights, corresponding to a common scenario on air traffic management.

Details

Aircraft Engineering and Aerospace Technology, vol. 83 no. 5
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 12 October 2012

Guoqiang Zeng, Min Hu and Junling Song

The purpose of this paper is to evaluate the safety of formation flying satellites, and propose a method for practical collision monitoring and collision avoidance manoeuvre.

Abstract

Purpose

The purpose of this paper is to evaluate the safety of formation flying satellites, and propose a method for practical collision monitoring and collision avoidance manoeuvre.

Design/methodology/approach

A general formation description method based on relative orbital elements is proposed, and a collision probability calculation model is established. The formula for the minimum relative distance in the crosstrack plane is derived, and the influence of J2 perturbation on formation safety is analyzed. Subsequently, the optimal collision avoidance manoeuvre problem is solved using the framework of linear programming algorithms.

Findings

The relative orbital elements are illustrative of formation description and are easy to use for perturbation analysis. The relative initial phase angle between the in‐plane and cross‐track plane motions has considerable effect on the formation safety. Simulations confirm the flexibility and effectiveness of the linear programming‐based collision avoidance manoeuvre method.

Practical implications

The proposed collision probability method can be applied in collision monitoring for the proximity operations of spacecraft. The presented minimum distance calculation formula in the cross‐track plane can be used in safe configuration design. Additionally, the linear programming method is suitable for formation control, in which the initial and terminal states are provided.

Originality/value

The relative orbital elements are used to calculate collision probability and analyze formation safety. The linear programming algorithms are extended for collision avoidance, an approach that is simple, effective, and more suitable for on‐board implementation.

Article
Publication date: 31 December 2007

I‐Shyan Hwang and Chien‐An Chen

Wireless local area networks (WLANs) are the predominant option for broadband wireless access network, and multiple access points (APs) will be much more available for wireless…

Abstract

Purpose

Wireless local area networks (WLANs) are the predominant option for broadband wireless access network, and multiple access points (APs) will be much more available for wireless stations (WSTAs). Call admission control (CAC) on AP selection problem over 802.11 WLAN is a critical issue. In the existing architecture, strongest‐signal‐first is the default AP selection mechanism in 802.11 WLAN which uses the single criterion, received signal strength indicator, to select AP. However, this method suffers from bandwidth deficiency and unbalanced load among APs due to the uneven distribution of user load, thus degrading the system throughput. Instead, the purpose of this paper is to propose a multi‐criteria CAC on AP selection algorithms.

Design/methodology/approach

The distributed multi‐criteria considered in order are RSSI, minimum required bandwidth of WSTA, estimated effective bandwidth (EEB) and AP‐WSTA distance. A semiMarkov model considering both packet retransmission limit, packet error rate and collision effect is proposed to predict the system throughput and validated through simulation results. Two multi‐criteria AP selection algorithms after EEB is evaluated are proposed and compared based on this analytical model.

Findings

The proposed algorithms outperform the traditional SSF algorithm in terms of the balance index for AP and the average system throughput.

Originality/valve

The paper presents performance analysis for multi‐criteria CAC for distributed access point selection in WLANs.

Details

International Journal of Pervasive Computing and Communications, vol. 3 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 December 2005

C. Shu, X.H. Mao and Y.T. Chew

This paper aims to give some guidance on the selection of particle numbers per cell and the number of molecules per particle in the micro flow simulation by using DSMC method.

Abstract

Purpose

This paper aims to give some guidance on the selection of particle numbers per cell and the number of molecules per particle in the micro flow simulation by using DSMC method.

Design/methodology/approach

The numerical investigation is performed to study the effects of particle number per cell and the scaling factor of real molecules to a simulated particle on accuracy of DSMC simulation of two‐dimensional micro channel flows in the “slip flow” and “transition flow” regimes.

Findings

Numerical results show that both the particle number per cell and the scaling factor have effect on the accuracy of the DSMC results from the statistical error and the physical aspects. In the “slip flow” regime, a larger value of scaling factor can be used to obtain accurate results as compared to the “transition flow” regime. However, in the “transition flow” regime, much less number of particles in each cell can be used to generate accurate DSMC results as compared to the “slip flow” regime.

Research limitations/implications

The present work is limited to the two‐dimensional case.

Practical implications

The results of this paper are very useful for the two‐dimensional micro flow simulation by DSMC.

Originality/value

The work in this paper is original and provides guidance on micro flow simulation.

Details

International Journal of Numerical Methods for Heat & Fluid Flow, vol. 15 no. 8
Type: Research Article
ISSN: 0961-5539

Keywords

Article
Publication date: 1 October 2006

Kainan Cha, Maciej Zawodniok, Anil Ramachandran, Jagannathan Sarangapani and Can Saygin

This paper investigates interference mitigation and read rate improvement by using novel power control and graph‐based scheduling schemes for radio frequency identification (RFID…

Abstract

Purpose

This paper investigates interference mitigation and read rate improvement by using novel power control and graph‐based scheduling schemes for radio frequency identification (RFID) systems.

Design/methodology/approach

The first method is a distributed power control (DPC) scheme proposed as an alternative to listen‐before‐talk (LBT) for RFID systems specified under CEPT regulations. The DPC algorithm employs reader transmission power as the system control variable to achieve a desired read range and read rate without causing unwanted interference. The second approach is graph‐based scheduling, which uses a graph coloring‐based approach to temporally separate readers with overlapping interrogation zones. The scheduling of the timeslots is carried out so as to offer better efficiency for each reader.

Findings

This paper shows that power control, graph theory, collision probability analysis along with timeslot scheduling schemes can be widely adapted to solve general RFID problems. The study shows that selection of timeslot allocation schemes should be carried out after carefully analysing the process/workflow in the application domain. While fair scheduling schemes can be applicable to stable manufacturing environments, event‐triggered scheduling schemes are more effective in fairly chaotic environments.

Originality/value

The study shows that the proposed interference mitigation and read rate improvement techniques can be generalized to assist in design, development, and implementation of a variety of RFID‐based systems, ranging from supply chain level operations to shop floor control. The proposed techniques improve not only the reliability of RFID systems but, more importantly, improve business processes that rely on RFID data.

Details

Sensor Review, vol. 26 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 21 August 2017

Ruolong Qi, Weijia Zhou and Wang Tiejun

Uncertainty can arise for a manipulator because its motion can deviate unpredictably from the assumed dynamical model and because sensors might provide information regarding the…

Abstract

Purpose

Uncertainty can arise for a manipulator because its motion can deviate unpredictably from the assumed dynamical model and because sensors might provide information regarding the system state that is imperfect because of noise and imprecise measurement. This paper aims to propose a method to estimate the probable error ranges of the entire trajectory for a manipulator with motion and sensor uncertainties. The aims are to evaluate whether a manipulator can safely avoid all obstacles under uncertain conditions and to determine the probability that the end effector arrives at its goal area.

Design/methodology/approach

An effective, analytical method is presented to evaluate the trajectory error correctly, and a motion plan was executed using Gaussian models by considering sensor and motion uncertainties. The method used an integrated algorithm that combined a Gaussian error model with an extended Kalman filter and a linear–quadratic regulator. Iterative linearization of the nonlinear dynamics was used around every section of the trajectory to derive all of the prior probability distributions before execution.

Findings

Simulation and experimental results indicate that the proposed trajectory planning method based on the motion and sensor uncertainties is indeed highly convenient and efficient.

Originality/value

The proposed approach is applicable to manipulators with motion and sensor uncertainties. It helps determine the error distribution of the predefined trajectory. Based on the evaluation results, the most appropriate trajectory can be selected among many predefined trajectories according to the error ranges and the probability of arriving at the goal area. The method has been successfully applied to a manipulator operating on the Chinese Space Station.

Details

Industrial Robot: An International Journal, vol. 44 no. 5
Type: Research Article
ISSN: 0143-991X

Keywords

Open Access
Article
Publication date: 8 September 2021

Haijian Li, Junjie Zhang, Zihan Zhang and Zhufei Huang

This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control…

1033

Abstract

Purpose

This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control under the environment of intelligent connected vehicles (ICVs) in the future.

Design/methodology/approach

By analyzing the traffic capacities and traffic behaviors of domestic and foreign weaving areas and combining them with field investigation, the paper proposes the active and fine lane management methods for ICVs to optimal driving behavior in a weaving area. The VISSIM simulation of traffic flow vehicle driving behavior in weaving areas of urban expressways was performed using research data. The influence of lane-changing in advance on the weaving area was evaluated and a conflict avoidance area was established in the weaving area. The active fine lane management methods applied to a weaving area were verified for different scenarios.

Findings

The results of the study indicate that ICVs complete their lane changes before they reach a weaving area, their time in the weaving area does not exceed the specified time and the delay of vehicles that pass through the weaving area decreases.

Originality/value

Based on the vehicle group behavior, this paper conducts a simulation study on the active traffic management control-oriented to ICVs. The research results can optimize the management of lanes, improve the traffic capacity of a weaving area and mitigate traffic congestion on expressways.

Details

Journal of Intelligent and Connected Vehicles, vol. 4 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 14 August 2017

Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…

2879

Abstract

Purpose

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.

Design/methodology/approach

In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.

Findings

DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.

Research limitations/implications

To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.

Practical implications

Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.

Social implications

More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.

Originality/value

Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.

Article
Publication date: 23 August 2019

Honggang Wang, Shanshan Wang, Jia Yao, Ruoyu Pan, Qiongdan Huang, Hanlu Zhang and Jingfeng Yang

The purpose of this paper is to study how to improve the performance of RFID robot system by anti-collision algorithms. For radio frequency identification (RFID) robots operating…

Abstract

Purpose

The purpose of this paper is to study how to improve the performance of RFID robot system by anti-collision algorithms. For radio frequency identification (RFID) robots operating in mobile scenes, effective anti-collision algorithm not only reduces missed reading but also enhances the speed of RFID robots movement.

Design/methodology/approach

An effective anti-collision algorithm is proposed to accelerate tag identification in RFID robots systems in this paper. The tag collisions in the current time slot are detected by a new method, and then further resolve each small tag collision to improve system throughput, rather than the total tags number estimation. After the reader detected the collision, three different collision resolution methods were described and studied, and the situation of missing tag caused by reader moving is also discussed.

Findings

The proposed algorithm achieves theoretical system throughput of about 0.48, 0.50 and 0.61 and simulates to show that the proposed algorithm performance is significantly improved compared with the existing ALOHA-based algorithm.

Originality/value

The proposed RFID anti-collision algorithm is beneficial to improve the moving speed and identification reliability of the RFID robots in complex environments.

Details

Assembly Automation, vol. 40 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

1 – 10 of over 1000