Search results
1 – 10 of over 1000The purpose of this paper is to perform a comparative study of two propagation models and a prediction of proximity distances among the space objects based on the two-line element…
Abstract
Purpose
The purpose of this paper is to perform a comparative study of two propagation models and a prediction of proximity distances among the space objects based on the two-line element set (TLEs) data, which identifies potentially risky approaches and is used to compute the probability of collision among the spacecrafts.
Design/methodology/approach
At first, the proximities are estimated for the mentioned satellites using a precise propagation model and based on a one-month simulation. Then, a study is performed to determine the probability of collision between two satellites using a formulation which takes into account the object sizes, covariance data and the relative distance at the point of closest approach. Simplifying assumptions such as a linear relative motion and normally distributed position uncertainties at the predicted closest approach time are applied in estimation.
Findings
For the case of Iridium-Cosmos collision and the prediction of a closest approach using available TLE orbital data and a propagation model which takes into account the effects of the earth’s zonal harmonics and drag atmospheric, the maximum probability of about 2 × 10 −6 was obtained, which can indicate the necessity of enacting avoidance maneuvers regarding the defined a probability threshold by satellite’s owner.
Originality/value
The contribution of this paper is to analyze and simulate the 2009 prominent collision between the Cosmos2251 and Iridium33 satellite by modeling their orbit propagation, predicting their closest approaches and, finally, assessing the risk of the possible collision. Moreover, an enhanced orbit determination can be effective to achieve an accurate assessment of the ongoing collision threat to active spacecrafts from orbital debris and preventing, if necessary, the hazards thereof.
Details
Keywords
L.M.B.C. Campos and J.M.G. Marques
The purpose of this paper is to calculate the probability of collision of flying aircraft crossing on straight paths in any direction.
Abstract
Purpose
The purpose of this paper is to calculate the probability of collision of flying aircraft crossing on straight paths in any direction.
Design/methodology/approach
The probability of deviations from the intended flight paths is used to calculate the probability of collision that is integrated over time to cover whole events.
Findings
The probabilities of collision are calculated in terms of the r.m.s. position errors and encounter geometry, that is aircraft velocities and flight path angles and crossing angles.
Research limitations/implications
The method does not apply to aircraft flying in parallel tracks at the same velocity in air corridors: that case has been covered elsewhere, as well as the case of climbing or descending aircraft.
Practical implications
International Civil Aviation Organization (ICAO) specifies as target level of safety (TLS) a probability of collision not exceeding 5×10−9 per hour. To meet the ICAO TLS standard, it is necessary to calculate collision probabilities for all stages of flight.
Social implications
A low collision probability is a safety metric; the value does depend on a realist choice of probability distribution.
Originality/value
Calculates the probability of collision for crossing flights, corresponding to a common scenario on air traffic management.
Details
Keywords
Guoqiang Zeng, Min Hu and Junling Song
The purpose of this paper is to evaluate the safety of formation flying satellites, and propose a method for practical collision monitoring and collision avoidance manoeuvre.
Abstract
Purpose
The purpose of this paper is to evaluate the safety of formation flying satellites, and propose a method for practical collision monitoring and collision avoidance manoeuvre.
Design/methodology/approach
A general formation description method based on relative orbital elements is proposed, and a collision probability calculation model is established. The formula for the minimum relative distance in the crosstrack plane is derived, and the influence of J2 perturbation on formation safety is analyzed. Subsequently, the optimal collision avoidance manoeuvre problem is solved using the framework of linear programming algorithms.
Findings
The relative orbital elements are illustrative of formation description and are easy to use for perturbation analysis. The relative initial phase angle between the in‐plane and cross‐track plane motions has considerable effect on the formation safety. Simulations confirm the flexibility and effectiveness of the linear programming‐based collision avoidance manoeuvre method.
Practical implications
The proposed collision probability method can be applied in collision monitoring for the proximity operations of spacecraft. The presented minimum distance calculation formula in the cross‐track plane can be used in safe configuration design. Additionally, the linear programming method is suitable for formation control, in which the initial and terminal states are provided.
Originality/value
The relative orbital elements are used to calculate collision probability and analyze formation safety. The linear programming algorithms are extended for collision avoidance, an approach that is simple, effective, and more suitable for on‐board implementation.
Details
Keywords
I‐Shyan Hwang and Chien‐An Chen
Wireless local area networks (WLANs) are the predominant option for broadband wireless access network, and multiple access points (APs) will be much more available for wireless…
Abstract
Purpose
Wireless local area networks (WLANs) are the predominant option for broadband wireless access network, and multiple access points (APs) will be much more available for wireless stations (WSTAs). Call admission control (CAC) on AP selection problem over 802.11 WLAN is a critical issue. In the existing architecture, strongest‐signal‐first is the default AP selection mechanism in 802.11 WLAN which uses the single criterion, received signal strength indicator, to select AP. However, this method suffers from bandwidth deficiency and unbalanced load among APs due to the uneven distribution of user load, thus degrading the system throughput. Instead, the purpose of this paper is to propose a multi‐criteria CAC on AP selection algorithms.
Design/methodology/approach
The distributed multi‐criteria considered in order are RSSI, minimum required bandwidth of WSTA, estimated effective bandwidth (EEB) and AP‐WSTA distance. A semiMarkov model considering both packet retransmission limit, packet error rate and collision effect is proposed to predict the system throughput and validated through simulation results. Two multi‐criteria AP selection algorithms after EEB is evaluated are proposed and compared based on this analytical model.
Findings
The proposed algorithms outperform the traditional SSF algorithm in terms of the balance index for AP and the average system throughput.
Originality/valve
The paper presents performance analysis for multi‐criteria CAC for distributed access point selection in WLANs.
Details
Keywords
Abstract
Purpose
This paper aims to give some guidance on the selection of particle numbers per cell and the number of molecules per particle in the micro flow simulation by using DSMC method.
Design/methodology/approach
The numerical investigation is performed to study the effects of particle number per cell and the scaling factor of real molecules to a simulated particle on accuracy of DSMC simulation of two‐dimensional micro channel flows in the “slip flow” and “transition flow” regimes.
Findings
Numerical results show that both the particle number per cell and the scaling factor have effect on the accuracy of the DSMC results from the statistical error and the physical aspects. In the “slip flow” regime, a larger value of scaling factor can be used to obtain accurate results as compared to the “transition flow” regime. However, in the “transition flow” regime, much less number of particles in each cell can be used to generate accurate DSMC results as compared to the “slip flow” regime.
Research limitations/implications
The present work is limited to the two‐dimensional case.
Practical implications
The results of this paper are very useful for the two‐dimensional micro flow simulation by DSMC.
Originality/value
The work in this paper is original and provides guidance on micro flow simulation.
Details
Keywords
Kainan Cha, Maciej Zawodniok, Anil Ramachandran, Jagannathan Sarangapani and Can Saygin
This paper investigates interference mitigation and read rate improvement by using novel power control and graph‐based scheduling schemes for radio frequency identification (RFID…
Abstract
Purpose
This paper investigates interference mitigation and read rate improvement by using novel power control and graph‐based scheduling schemes for radio frequency identification (RFID) systems.
Design/methodology/approach
The first method is a distributed power control (DPC) scheme proposed as an alternative to listen‐before‐talk (LBT) for RFID systems specified under CEPT regulations. The DPC algorithm employs reader transmission power as the system control variable to achieve a desired read range and read rate without causing unwanted interference. The second approach is graph‐based scheduling, which uses a graph coloring‐based approach to temporally separate readers with overlapping interrogation zones. The scheduling of the timeslots is carried out so as to offer better efficiency for each reader.
Findings
This paper shows that power control, graph theory, collision probability analysis along with timeslot scheduling schemes can be widely adapted to solve general RFID problems. The study shows that selection of timeslot allocation schemes should be carried out after carefully analysing the process/workflow in the application domain. While fair scheduling schemes can be applicable to stable manufacturing environments, event‐triggered scheduling schemes are more effective in fairly chaotic environments.
Originality/value
The study shows that the proposed interference mitigation and read rate improvement techniques can be generalized to assist in design, development, and implementation of a variety of RFID‐based systems, ranging from supply chain level operations to shop floor control. The proposed techniques improve not only the reliability of RFID systems but, more importantly, improve business processes that rely on RFID data.
Details
Keywords
Ruolong Qi, Weijia Zhou and Wang Tiejun
Uncertainty can arise for a manipulator because its motion can deviate unpredictably from the assumed dynamical model and because sensors might provide information regarding the…
Abstract
Purpose
Uncertainty can arise for a manipulator because its motion can deviate unpredictably from the assumed dynamical model and because sensors might provide information regarding the system state that is imperfect because of noise and imprecise measurement. This paper aims to propose a method to estimate the probable error ranges of the entire trajectory for a manipulator with motion and sensor uncertainties. The aims are to evaluate whether a manipulator can safely avoid all obstacles under uncertain conditions and to determine the probability that the end effector arrives at its goal area.
Design/methodology/approach
An effective, analytical method is presented to evaluate the trajectory error correctly, and a motion plan was executed using Gaussian models by considering sensor and motion uncertainties. The method used an integrated algorithm that combined a Gaussian error model with an extended Kalman filter and a linear–quadratic regulator. Iterative linearization of the nonlinear dynamics was used around every section of the trajectory to derive all of the prior probability distributions before execution.
Findings
Simulation and experimental results indicate that the proposed trajectory planning method based on the motion and sensor uncertainties is indeed highly convenient and efficient.
Originality/value
The proposed approach is applicable to manipulators with motion and sensor uncertainties. It helps determine the error distribution of the predefined trajectory. Based on the evaluation results, the most appropriate trajectory can be selected among many predefined trajectories according to the error ranges and the probability of arriving at the goal area. The method has been successfully applied to a manipulator operating on the Chinese Space Station.
Details
Keywords
Haijian Li, Junjie Zhang, Zihan Zhang and Zhufei Huang
This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control…
Abstract
Purpose
This paper aims to use active fine lane management methods to solve the problem of congestion in a weaving area and provide theoretical and technical support for traffic control under the environment of intelligent connected vehicles (ICVs) in the future.
Design/methodology/approach
By analyzing the traffic capacities and traffic behaviors of domestic and foreign weaving areas and combining them with field investigation, the paper proposes the active and fine lane management methods for ICVs to optimal driving behavior in a weaving area. The VISSIM simulation of traffic flow vehicle driving behavior in weaving areas of urban expressways was performed using research data. The influence of lane-changing in advance on the weaving area was evaluated and a conflict avoidance area was established in the weaving area. The active fine lane management methods applied to a weaving area were verified for different scenarios.
Findings
The results of the study indicate that ICVs complete their lane changes before they reach a weaving area, their time in the weaving area does not exceed the specified time and the delay of vehicles that pass through the weaving area decreases.
Originality/value
Based on the vehicle group behavior, this paper conducts a simulation study on the active traffic management control-oriented to ICVs. The research results can optimize the management of lanes, improve the traffic capacity of a weaving area and mitigate traffic congestion on expressways.
Details
Keywords
Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi
Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…
Abstract
Purpose
Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.
Design/methodology/approach
In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.
Findings
DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.
Research limitations/implications
To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.
Practical implications
Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.
Social implications
More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.
Originality/value
Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.
Details
Keywords
Honggang Wang, Shanshan Wang, Jia Yao, Ruoyu Pan, Qiongdan Huang, Hanlu Zhang and Jingfeng Yang
The purpose of this paper is to study how to improve the performance of RFID robot system by anti-collision algorithms. For radio frequency identification (RFID) robots operating…
Abstract
Purpose
The purpose of this paper is to study how to improve the performance of RFID robot system by anti-collision algorithms. For radio frequency identification (RFID) robots operating in mobile scenes, effective anti-collision algorithm not only reduces missed reading but also enhances the speed of RFID robots movement.
Design/methodology/approach
An effective anti-collision algorithm is proposed to accelerate tag identification in RFID robots systems in this paper. The tag collisions in the current time slot are detected by a new method, and then further resolve each small tag collision to improve system throughput, rather than the total tags number estimation. After the reader detected the collision, three different collision resolution methods were described and studied, and the situation of missing tag caused by reader moving is also discussed.
Findings
The proposed algorithm achieves theoretical system throughput of about 0.48, 0.50 and 0.61 and simulates to show that the proposed algorithm performance is significantly improved compared with the existing ALOHA-based algorithm.
Originality/value
The proposed RFID anti-collision algorithm is beneficial to improve the moving speed and identification reliability of the RFID robots in complex environments.
Details