HOME
*





Scalable Urban Traffic Control
Scalable Urban Traffic Control (SURTRAC) is an adaptive traffic control system developed by researchers at the Robotics Institute, Carnegie Mellon University. SURTAC dynamically optimizes the control of traffic signals to improve traffic flow for both urban grids and corridors; optimization goals include less waiting, reduced traffic congestion, shorter trips, and less pollution. The core control engine combines schedule-driven intersection control with decentralized coordination mechanisms. Since June 2012, a pilot implementation of the SURTRAC system has been deployed on nine intersections in the East Liberty neighborhood of Pittsburgh, Pennsylvania. SURTRAC reduced travel times by more than 25% on average, and wait times were reduced by an average of 40%. A second phase of the pilot program for the Bakery Square district has been running since October 2013. In 2015, Rapid Flow Technologies was formed to commercialize the SURTRAC technology. The lead inventor of this technology, Dr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Adaptive Traffic Control
Adaptive traffic control system (ATCS) is a traffic management strategy in which traffic signal timing changes, or adapts, based on actual traffic demand. This is accomplished using an adaptive traffic control system consisting of both hardware and software. Every Day Counts initiative The U.S. Federal Highway Administration, through its Every Day Counts initiative, is working to accelerate the adoption of adaptive signal control technologies in the U.S. Its website states, "Real-time management of traffic systems is proven to work, yet these systems have been deployed on less than 1 percent of existing traffic signals. FHWA is now working to bring these technologies to the rest of the country." Examples InSync adaptive traffic control system is a real-time adaptive traffic control system that enables traffic signals to immediately adapt to traffic demand. MASSTR (Meadowlands Adaptive Signal System for Traffic Reduction) located in the Meadowlands Region of northern New Jersey ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Mathematical Optimization
Mathematical optimization (alternatively spelled ''optimisation'') or mathematical programming is the selection of a best element, with regard to some criterion, from some set of available alternatives. It is generally divided into two subfields: discrete optimization and continuous optimization. Optimization problems of sorts arise in all quantitative disciplines from computer science and engineering to operations research and economics, and the development of solution methods has been of interest in mathematics for centuries. In the more general approach, an optimization problem consists of maxima and minima, maximizing or minimizing a Function of a real variable, real function by systematically choosing Argument of a function, input values from within an allowed set and computing the Value (mathematics), value of the function. The generalization of optimization theory and techniques to other formulations constitutes a large area of applied mathematics. More generally, op ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Traffic Optimization
Traffic Optimization are the methods by which time stopped in road traffic (particularly, at traffic signals) is reduced. Need for traffic optimization Texas Transportation Institute estimates travel delays of between 17–55 hours of delay per person per year relating to congestion on the streets. Traffic device optimization hence becomes a significant aspect of operations. Techniques Several techniques exist to reduce delay of traffic. Generally the algorithms attempt to reduce delays (user time), stops, exhaust gas emissions, or some other measure of effectiveness. Many optimization software are geared towards pre-timed coordinated systems. Normally optimization of signals along a road is a challenging and expensive task, because the sources for traffic monitoring have been limited to inductive loops, cameras or manually counting. However, due to recent advances in information technology, portable devices with Bluetooth and Wi-Fi communication are becoming more common, en ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Facial Feature
The face is the front of an animal's head that features the eyes, nose and mouth, and through which animals express many of their emotions. The face is crucial for human identity, and damage such as scarring or developmental deformities may affect the psyche adversely. Structure The front of the human head is called the face. It includes several distinct areas, of which the main features are: *The forehead, comprising the skin beneath the hairline, bordered laterally by the temples and inferiorly by eyebrows and ears *The eyes, sitting in the orbit and protected by eyelids and eyelashes * The distinctive human nose shape, nostrils, and nasal septum *The cheeks, covering the maxilla and mandibula (or jaw), the extremity of which is the chin *The mouth, with the upper lip divided by the philtrum, sometimes revealing the teeth Facial appearance is vital for human recognition and communication. Facial muscles in humans allow expression of emotions. The face is itself a highly ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Facial Recognition Software
A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image. Development began on similar systems in the 1960s, beginning as a form of computer application. Since their inception, facial recognition systems have seen wider uses in recent times on smartphones and in other forms of technology, such as robotics. Because computerized facial recognition involves the measurement of a human's physiological characteristics, facial recognition systems are categorized as biometrics. Although the accuracy of facial recognition systems as a biometric technology is lower than iris recognition and fingerprint recognition, it is widely adopted due to its contactless process. Facial recognition systems have been deployed in advanced human–comp ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Automatic Number-plate Recognition
Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task. ANPR is used by police forces around the world for law enforcement purposes, including to check if a vehicle is registered or licensed. It is also used for electronic toll collection on pay-per-use roads and as a method of cataloguing the movements of traffic, for example by highways agencies. Automatic number-plate recognition can be used to store the images captured by the cameras as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at any time of day or night. ANPR technology must take into account plate variations from ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person be non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, a certain other values, such as privacy, or liberty. Over the past few years, anonymity tools used on the dark web by criminals and malicious users have drastically altered the ability of law enforcement to use conventional surveillance techniques. An important example for anonymity being not only protected, but enforced by law is the vote in free elections. In many other situations (like conversation between strangers, buying some product or service in a shop), anonymity is traditionally accepted as natural. There are also various situations in which a person might choose to withhold their identity. Acts of char ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authoritarianism
Authoritarianism is a political system characterized by the rejection of political plurality, the use of strong central power to preserve the political ''status quo'', and reductions in the rule of law, separation of powers, and democratic voting. Political scientists have created many typologies describing variations of authoritarian forms of government. Authoritarian regimes may be either autocratic or oligarchic and may be based upon the rule of a party or the military. States that have a blurred boundary between democracy and authoritarianism have some times been characterized as "hybrid democracies", " hybrid regimes" or "competitive authoritarian" states. The political scientist Juan Linz, in an influential 1964 work, ''An Authoritarian Regime: Spain'', defined authoritarianism as possessing four qualities: # Limited political pluralism, is realized with constraints on the legislature, political parties and interest groups. # Political legitimacy is based upon ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations, or individuals is part of many countries' privacy laws, and in some cases, constitutions. The concept of universal individual privacy is a modern concept primarily associated with Western culture, particularly British and North American, and remained virtually unknown in some cultures until recent times. Now, most cultures recognize the ability of individuals to withhold certain parts of personal information from wider society. With the rise of technology, the debate regarding privacy has shifted from a bodily sense to a digital sense. As the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as Human intelligence (intelligence gathering), human intelligence gathering and postal interception. Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to Industrial espionage, gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting he ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

CCTV
Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP), or Mesh networking, mesh wired or Wireless, wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring (Videotelephony is seldom called "CCTV"). Surveillance of the public using CCTV is common in many areas around the world. In recent years, the use of body worn video cameras has been introduced as a new form of surveillance, often used in law enforcement, with cameras located on a police officer's chest or head. Video surveillance has generated significant debate about balancing its use with individuals' right to privac ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]