Search results

1 – 10 of over 3000
Open Access
Article
Publication date: 12 August 2022

Bolin Gao, Kaiyuan Zheng, Fan Zhang, Ruiqi Su, Junying Zhang and Yimin Wu

Intelligent and connected vehicle technology is in the ascendant. High-level autonomous driving places more stringent requirements on the accuracy and reliability of environmental…

1076

Abstract

Purpose

Intelligent and connected vehicle technology is in the ascendant. High-level autonomous driving places more stringent requirements on the accuracy and reliability of environmental perception. Existing research works on multitarget tracking based on multisensor fusion mostly focuses on the vehicle perspective, but limited by the principal defects of the vehicle sensor platform, it is difficult to comprehensively and accurately describe the surrounding environment information.

Design/methodology/approach

In this paper, a multitarget tracking method based on roadside multisensor fusion is proposed, including a multisensor fusion method based on measurement noise adaptive Kalman filtering, a global nearest neighbor data association method based on adaptive tracking gate, and a Track life cycle management method based on M/N logic rules.

Findings

Compared with fixed-size tracking gates, the adaptive tracking gates proposed in this paper can comprehensively improve the data association performance in the multitarget tracking process. Compared with single sensor measurement, the proposed method improves the position estimation accuracy by 13.5% and the velocity estimation accuracy by 22.2%. Compared with the control method, the proposed method improves the position estimation accuracy by 23.8% and the velocity estimation accuracy by 8.9%.

Originality/value

A multisensor fusion method with adaptive Kalman filtering of measurement noise is proposed to realize the adaptive adjustment of measurement noise. A global nearest neighbor data association method based on adaptive tracking gate is proposed to realize the adaptive adjustment of the tracking gate.

Details

Smart and Resilient Transportation, vol. 4 no. 2
Type: Research Article
ISSN: 2632-0487

Keywords

Open Access
Article
Publication date: 16 January 2024

Pengyue Guo, Tianyun Shi, Zhen Ma and Jing Wang

The paper aims to solve the problem of personnel intrusion identification within the limits of high-speed railways. It adopts the fusion method of millimeter wave radar and camera…

Abstract

Purpose

The paper aims to solve the problem of personnel intrusion identification within the limits of high-speed railways. It adopts the fusion method of millimeter wave radar and camera to improve the accuracy of object recognition in dark and harsh weather conditions.

Design/methodology/approach

This paper adopts the fusion strategy of radar and camera linkage to achieve focus amplification of long-distance targets and solves the problem of low illumination by laser light filling of the focus point. In order to improve the recognition effect, this paper adopts the YOLOv8 algorithm for multi-scale target recognition. In addition, for the image distortion caused by bad weather, this paper proposes a linkage and tracking fusion strategy to output the correct alarm results.

Findings

Simulated intrusion tests show that the proposed method can effectively detect human intrusion within 0–200 m during the day and night in sunny weather and can achieve more than 80% recognition accuracy for extreme severe weather conditions.

Originality/value

(1) The authors propose a personnel intrusion monitoring scheme based on the fusion of millimeter wave radar and camera, achieving all-weather intrusion monitoring; (2) The authors propose a new multi-level fusion algorithm based on linkage and tracking to achieve intrusion target monitoring under adverse weather conditions; (3) The authors have conducted a large number of innovative simulation experiments to verify the effectiveness of the method proposed in this article.

Details

Railway Sciences, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0907

Keywords

Open Access
Article
Publication date: 1 October 2018

Xunjia Zheng, Bin Huang, Daiheng Ni and Qing Xu

The purpose of this paper is to accurately capture the risks which are caused by each road user in time.

2856

Abstract

Purpose

The purpose of this paper is to accurately capture the risks which are caused by each road user in time.

Design/methodology/approach

The authors proposed a novel risk assessment approach based on the multi-sensor fusion algorithm in the real traffic environment. Firstly, they proposed a novel detection-level fusion approach for multi-object perception in dense traffic environment based on evidence theory. This approach integrated four states of track life into a generic fusion framework to improve the performance of multi-object perception. The information of object type, position and velocity was accurately obtained. Then, they conducted several experiments in real dense traffic environment on highways and urban roads, which enabled them to propose a novel road traffic risk modeling approach based on the dynamic analysis of vehicles in a variety of driving scenarios. By analyzing the generation process of traffic risks between vehicles and the road environment, the equivalent forces of vehicle–vehicle and vehicle–road were presented and theoretically calculated. The prediction steering angle and trajectory were considered in the determination of traffic risk influence area.

Findings

The results of multi-object perception in the experiments showed that the proposed fusion approach achieved low false and missing tracking, and the road traffic risk was described as a field of equivalent force. The results extend the understanding of the traffic risk, which supported that the traffic risk from the front and back of the vehicle can be perceived in advance.

Originality/value

This approach integrated four states of track life into a generic fusion framework to improve the performance of multi-object perception. The information of object type, position and velocity was used to reduce erroneous data association between tracks and detections. Then, the authors conducted several experiments in real dense traffic environment on highways and urban roads, which enabled them to propose a novel road traffic risk modeling approach based on the dynamic analysis of vehicles in a variety of driving scenarios. By analyzing the generation process of traffic risks between vehicles and the road environment, the equivalent forces of vehicle–vehicle and vehicle–road were presented and theoretically calculated.

Details

Journal of Intelligent and Connected Vehicles, vol. 1 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Content available
Article
Publication date: 21 June 2011

628

Abstract

Details

Industrial Robot: An International Journal, vol. 38 no. 4
Type: Research Article
ISSN: 0143-991X

Open Access
Article
Publication date: 16 October 2017

Bo Yan, Xiao-hua Wu, Bing Ye and Yong-wang Zhang

The Internet of Things (IoT) is used in the fresh agricultural product (FAP) supply chain, which can be coordinated through a revenue-sharing contract. The purpose of this paper…

7051

Abstract

Purpose

The Internet of Things (IoT) is used in the fresh agricultural product (FAP) supply chain, which can be coordinated through a revenue-sharing contract. The purpose of this paper is to make the three-level supply chain coordinate in IoT by considering the influence of FAP on market demand and costs of controlling freshness on the road.

Design/methodology/approach

A three-level FAP supply chain that comprises a manufacturer, distributor, and retailer in IoT is regarded as the research object. This study improves the revenue-sharing contract, determines the optimal solution when the supply chain achieves maximum profit in three types of decision-making situations, and develops the profit distribution model based on the improved revenue-sharing contract to coordinate the supply chain.

Findings

The improved revenue-sharing contract can coordinate the FAP supply chain that comprises a manufacturer, distributor, and retailer in IoT, as well as benefit all enterprises in the supply chain.

Practical implications

Resource utilization rate can be improved after coordinating the entire supply chain. Moreover, loss in the circulation process is reduced, and the circulation efficiency of FAPs is improved because of the application of IoT. The validity of the model is verified through a case analysis.

Originality/value

This study is different from other research in terms of the combination of supply chain coordination, FAPs, and radio frequency identification application in IoT.

Details

Industrial Management & Data Systems, vol. 117 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Content available
Article
Publication date: 1 June 2003

Jon Rigelsford

499

Abstract

Details

Sensor Review, vol. 23 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Open Access
Article
Publication date: 18 January 2021

Hongxing Wang, LianZheng Ge, Ruifeng Li, Yunfeng Gao and Chuqing Cao

An optimal solution method based on 2-norm is proposed in this study to solve the inverse kinematics multiple-solution problem caused by a high redundancy. The current research…

1200

Abstract

Purpose

An optimal solution method based on 2-norm is proposed in this study to solve the inverse kinematics multiple-solution problem caused by a high redundancy. The current research also presents a motion optimization based on the 2-Norm of high-redundant mobile humanoid robots, in which a kinematic model is designed through the entire modeling.

Design/methodology/approach

The current study designs a highly redundant humanoid mobile robot with a differential mobile platform. The high-redundancy mobile humanoid robot consists of three modular parts (differential driving platform with two degrees of freedom (DOF), namely, left and right arms with seven DOF, respectively) and has total of 14 DOFs. Given the high redundancy of humanoid mobile robot, a kinematic model is designed through the entire modeling and an optimal solution extraction method based on 2-norm is proposed to solve the inverse kinematics multiple solutions problem. That is, the 2-norm of the angle difference before and after rotation is used as the shortest stroke index to select the optimal solution. The optimal solution of the inverse kinematics equation in the step is obtained by solving the minimum value of the objective function of a step. Through the step-by-step cycle in the entire tracking process, the kinematic optimization of the highly redundant humanoid robot in the entire tracking process is realized.

Findings

Compared with the before and after motion optimizations based on the 2-norm algorithm of the robot, its motion after optimization shows minimal fluctuation, improved smoothness, limited energy consumption and short path during the entire mobile tracking and operating process.

Research limitations/implications

In this paper, the whole kinematics model of the highly redundant humanoid mobile robot is established and its motion is optimized based on 2-norm, which provides a theoretical basis for the follow-up research of the service robot.

Practical implications

In this paper, the whole kinematics model of the highly redundant humanoid mobile robot is established and its motion is optimized based on 2-norm, which provides a theoretical basis for the follow-up research of the service robot.

Social implications

In this paper, the whole kinematics model of the highly redundant humanoid mobile robot is established and its motion is optimized based on 2-norm, which provides a theoretical basis for the follow-up research of the service robot.

Originality/value

Motion optimization based on the 2-norm of a highly redundant humanoid mobile robot with the entire modeling is performed on the basis of the entire modeling. This motion optimization can make the highly redundant humanoid mobile robot’s motion path considerably short, minimize energy loss and shorten time. These researches provide a theoretical basis for the follow-up research of the service robot, including tracking and operating target, etc. Finally, the motion optimization algorithm is verified by the tracking and operating behaviors of the robot and an example.

Details

Assembly Automation, vol. 41 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Open Access
Article
Publication date: 29 July 2020

T. Mahalingam and M. Subramoniam

Surveillance is the emerging concept in the current technology, as it plays a vital role in monitoring keen activities at the nooks and corner of the world. Among which moving…

2351

Abstract

Surveillance is the emerging concept in the current technology, as it plays a vital role in monitoring keen activities at the nooks and corner of the world. Among which moving object identifying and tracking by means of computer vision techniques is the major part in surveillance. If we consider moving object detection in video analysis is the initial step among the various computer applications. The main drawbacks of the existing object tracking method is a time-consuming approach if the video contains a high volume of information. There arise certain issues in choosing the optimum tracking technique for this huge volume of data. Further, the situation becomes worse when the tracked object varies orientation over time and also it is difficult to predict multiple objects at the same time. In order to overcome these issues here, we have intended to propose an effective method for object detection and movement tracking. In this paper, we proposed robust video object detection and tracking technique. The proposed technique is divided into three phases namely detection phase, tracking phase and evaluation phase in which detection phase contains Foreground segmentation and Noise reduction. Mixture of Adaptive Gaussian (MoAG) model is proposed to achieve the efficient foreground segmentation. In addition to it the fuzzy morphological filter model is implemented for removing the noise present in the foreground segmented frames. Moving object tracking is achieved by the blob detection which comes under tracking phase. Finally, the evaluation phase has feature extraction and classification. Texture based and quality based features are extracted from the processed frames which is given for classification. For classification we are using J48 ie, decision tree based classifier. The performance of the proposed technique is analyzed with existing techniques k-NN and MLP in terms of precision, recall, f-measure and ROC.

Details

Applied Computing and Informatics, vol. 17 no. 1
Type: Research Article
ISSN: 2634-1964

Keywords

Content available
Book part
Publication date: 30 July 2018

Abstract

Details

Marketing Management in Turkey
Type: Book
ISBN: 978-1-78714-558-0

Open Access
Article
Publication date: 13 September 2018

Patrick O’Brien, Scott W.H. Young, Kenning Arlitsch and Karl Benedict

The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the…

8192

Abstract

Purpose

The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users.

Design/methodology/approach

The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features.

Findings

Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization.

Practical implications

Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses.

Originality/value

Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.

Details

Online Information Review, vol. 42 no. 6
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of over 3000