-
A Comprehensive Study on Modelling and Control of Autonomous Underwater Vehicle
Authors:
Rajini Makam,
Pruthviraj Mane,
Suresh Sundaram,
P. B. Sujit
Abstract:
Autonomous underwater vehicles (AUV) have become the de facto vehicle for remote operations involving oceanography, inspection, and monitoring tasks. These vehicles operate in different and often challenging environments; hence, the design and development of the AUV involving hydrodynamics and control systems need to be designed in detail. This book chapter presents a study on the modelling and ro…
▽ More
Autonomous underwater vehicles (AUV) have become the de facto vehicle for remote operations involving oceanography, inspection, and monitoring tasks. These vehicles operate in different and often challenging environments; hence, the design and development of the AUV involving hydrodynamics and control systems need to be designed in detail. This book chapter presents a study on the modelling and robust control of a research vehicle in the presence of uncertainties. The vehicle's dynamic behaviour is modelled using a 6-degree-of-freedom approach, considering the effect of ocean currents. The level flight requirements for different speeds are derived, and the resulting model is decomposed into horizontal and vertical subsystems for linear analysis. The simulation results presented focus on the efficacy of linear controllers within three key subsystems: depth, yaw, and speed. Moreover, level-flight outcomes are demonstrated for a speed of 4 knots. The nonlinear control strategies employed in this study encompass conventional and sliding-mode control (SMC) methodologies. To ensure accurate tracking performance, the controller design considers the vehicle's dynamics with various uncertainties such as ocean currents, parameter uncertainty, CG (Center of Gravity) deviation and buoyancy variation. Both conventional and nonlinear SMC controllers' outcomes are showcased with a lawn-mowing manoeuvre scenario. A systematic comparison is drawn between the robustness of SMC against disturbances and parameter fluctuations in contrast to conventional controllers. Importantly, these results underscore the trade-off that accompanies SMC's robustness, as it necessitates a higher level of complexity in terms of controller design, intricate implementation intricacies, and the management of chattering phenomena.
△ Less
Submitted 18 January, 2024; v1 submitted 5 December, 2023;
originally announced December 2023.
-
Origin of Low-${}^{26}{\rm Al}/{}^{27}{\rm Al}$ Corundum/Hibonite Inclusions in Meteorites
Authors:
Steven J. Desch,
Emilie T. Dunham,
Ashley K. Herbst,
Cayman T. Unterborn,
Thomas G. Sharp,
Maitrayee Bose,
Prajkta Mane,
Curtis D. Williams
Abstract:
Most meteoritic calcium-rich, aluminum-rich inclusions (CAIs) formed from a reservoir with ${}^{26}{\rm Al}/{}^{27}{\rm Al} \approx 5 \times 10^{-5}$, but some record lower $({}^{26}{\rm Al}/{}^{27}{\rm Al})_0$, demanding they sampled a reservoir without live ${}^{26}{\rm Al}$. This has been interpreted as evidence for "late injection" of supernova material into our protoplanetary disk. We instead…
▽ More
Most meteoritic calcium-rich, aluminum-rich inclusions (CAIs) formed from a reservoir with ${}^{26}{\rm Al}/{}^{27}{\rm Al} \approx 5 \times 10^{-5}$, but some record lower $({}^{26}{\rm Al}/{}^{27}{\rm Al})_0$, demanding they sampled a reservoir without live ${}^{26}{\rm Al}$. This has been interpreted as evidence for "late injection" of supernova material into our protoplanetary disk. We instead interpret the heterogeneity as chemical, demonstrating that these inclusions are strongly associated with the refractory phases corundum or hibonite. We name them "Low-${}^{26}{\rm Al}/{}^{27}{\rm Al}$ Corundum/Hibonite Inclusions" (LAACHIs). We present a detailed astrophysical model for LAACHI formation in which they derive their Al from presolar corundum, spinel or hibonite grains $0.5 - 2 \, μ{\rm m}$ in size with no live ${}^{26}{\rm Al}$; live ${}^{26}{\rm Al}$ is carried on smaller ($<$50 nm) presolar chromium spinel grains from recent nearby Wolf-Rayet stars or supernovae. In hot ($\approx$ 1350-1425 K) regions of the disk these grains, and perovskite grains, would be the only survivors. These negatively charged grains would grow to sizes $1 - 10^3 \, μ{\rm m}$, even incorporating positively charged perovskite grains, but not the small, negatively charged ${}^{26}{\rm Al}$-bearing grains. Chemical and isotopic fractionations due to grain charging was a significant process in hot regions of the disk. Our model explains the sizes, compositions, oxygen isotopic signatures, and the large, correlated ${}^{48}{\rm Ca}$ and ${}^{50}{\rm Ti}$ anomalies (if carried by presolar perovskite) of LAACHIs, and especially how they incorporated no ${}^{26}{\rm Al}$ in a solar nebula with uniform, canonical ${}^{26}{\rm Al}/{}^{27}{\rm Al}$. A late injection of supernova material is obviated, although formation of the Sun in a high-mass star-forming region is demanded.
△ Less
Submitted 15 July, 2023;
originally announced July 2023.
-
Enhancing the ultrafast third order nonlinear optical response by charge transfer in VSe2-reduced graphene oxide hybrid
Authors:
Vinod Kumar,
Afreen,
K. A. Sree Raj,
Pratap mane,
Brahmananda Chakraborty,
Chandra S. Rout,
K. V. Adarsh
Abstract:
Nonlinear optical phenomena play a critical role in understanding microscopic light-matter interactions and have far-reaching applications across various fields, such as biosensing, quantum information, optical switching, and all-optical data processing. Most of these applications require materials with high third-order absorptive and refractive optical nonlinearities. However, most materials show…
▽ More
Nonlinear optical phenomena play a critical role in understanding microscopic light-matter interactions and have far-reaching applications across various fields, such as biosensing, quantum information, optical switching, and all-optical data processing. Most of these applications require materials with high third-order absorptive and refractive optical nonlinearities. However, most materials show weak nonlinear optical responses due to their perturbative nature and often need to be improved for practical applications. Here, we demonstrate that the charge donor-acceptor hybrid of VSe2-reduced graphene oxide (rGO) hybrid exhibits enhanced ultrafast third-order absorptive and refractive nonlinearities compared to the pristine systems, at least by one order of magnitude. Through density functional theory and Bader charge analysis, we elucidate the strong electronic coupling in the VSe2-rGO hybrid, involving the transfer of electrons from VSe2 to rGO. Steady-state and time-resolved photoluminescence (PL) measurements confirm the electronic coupling and charge transfer. Furthermore, we fabricate an ultrafast optical limiter device with better performance parameters, such as an onset threshold of 2.5 mJ cm-2 and differential transmittance of 0.42.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Peer-to-Peer Network: Kantian Cooperation Discourage Free Riding
Authors:
Pramod C. Mane,
Snehal Ratnaparkhi
Abstract:
The problem of how to achieve cooperation among rational peers in order to discourage free riding is one that has received a lot of attention in peer-to-peer computing and is still an important one. The field of game theory is applied to the task of finding solutions that will encourage cooperation while discouraging free riding. The cooperative conduct of peers is typically portrayed as a traditi…
▽ More
The problem of how to achieve cooperation among rational peers in order to discourage free riding is one that has received a lot of attention in peer-to-peer computing and is still an important one. The field of game theory is applied to the task of finding solutions that will encourage cooperation while discouraging free riding. The cooperative conduct of peers is typically portrayed as a traditional version of the game known as the "Prisoners' Dilemma." It is common knowledge that if two peers engage in a situation known as the Prisoner's Dilemma more than once, collaboration can be achieved through the use of punishment. Nevertheless, this is not the case when there is only one interaction between peers. This short article demonstrates that Kantian peers prefer to cooperate and attain social welfare even when they interacted only once. This, dissuade peers from freeriding.
△ Less
Submitted 6 February, 2024; v1 submitted 18 April, 2023;
originally announced April 2023.
-
Statistical Chronometry of Meteorites. I. The Pb-Pb age of the Solar System's t=0
Authors:
Steven J. Desch,
Daniel R. Dunlap,
Emilie T. Dunham,
Curtis D. Williams,
Prajkta Mane
Abstract:
We use rapidly cooled achondrites to test the assumption of 26Al homogeneity in the solar nebula, by checking if there is a single value of tSS, the absolute "Pb-Pb" age of the Solar System's t=0, that makes concordant their ages from the Al-Mg and Pb-Pb systems. We find that values tSS = 4568.42 +/-0.24 Myr do make these ages concordant, and therefore the hypothesis of homogeneous 26Al is not fal…
▽ More
We use rapidly cooled achondrites to test the assumption of 26Al homogeneity in the solar nebula, by checking if there is a single value of tSS, the absolute "Pb-Pb" age of the Solar System's t=0, that makes concordant their ages from the Al-Mg and Pb-Pb systems. We find that values tSS = 4568.42 +/-0.24 Myr do make these ages concordant, and therefore the hypothesis of homogeneous 26Al is not falsified. This age, defined to be when the solar nebula had (26Al/27Al) = 5.23 x 10^-5, is significantly older than the ~4567.3 Myr inferred from direct measurements of Pb-Pb ages in CAIs. Discrepancies between the Al-Mg and Pb-Pb chronometers in chondrules and CAIs have previously been interpreted as arising from heterogeneities in 26Al, under the presumption that the Al-Mg and Pb-Pb systems in CAIs closed simultaneously. We examine this assumption and show that resetting is to be expected in CAIs. In particular, we quantitatively demonstrate that it is plausible that Pb-Pb ages of CAIs were reset at late times, without resetting the earlier Al-Mg ages, if they were transiently heated in the same manner as chondrules. We critically examine Pb-Pb isochrons, refining data and suggesting best practices for their calculation and reporting. We advocate reporting chronometry as times of formation after t=0 rather than absolute ages, as only the former is useful for astrophysical models of the solar nebula. We strongly advocate averaging of multiple samples, rather than anchoring to individual meteorites, to improve precision.
△ Less
Submitted 3 May, 2023; v1 submitted 1 December, 2022;
originally announced December 2022.
-
Statistical Chronometry of Meteorites. II. Initial Abundances and Homogeneity of Short-lived Radionuclides
Authors:
Steven J. Desch,
Daniel R. Dunlap,
Curtis D. Williams,
Prajkta Mane,
Emilie T. Dunham
Abstract:
Astrophysical models of planet formation require accurate radiometric dating of meteoritic components by short-lived (Al-Mg, Mn-Cr, Hf-W) and long-lived (Pb-Pb) chronometers, to develop a timeline of such events in the solar nebula as formation of Ca-rich, Al-rich Inclusions (CAIs), chondrules, planetesimals, etc. CAIs formed mostly around a time ("t=0") when the short-lived radionuclide 26Al (t1/…
▽ More
Astrophysical models of planet formation require accurate radiometric dating of meteoritic components by short-lived (Al-Mg, Mn-Cr, Hf-W) and long-lived (Pb-Pb) chronometers, to develop a timeline of such events in the solar nebula as formation of Ca-rich, Al-rich Inclusions (CAIs), chondrules, planetesimals, etc. CAIs formed mostly around a time ("t=0") when the short-lived radionuclide 26Al (t1/2 = 0.72 Myr) was present and presumably homogeneously distributed at a known level we define as (26Al/27Al)SS = 5.23 x10^-5. The time of formation after t=0 of another object can be found by determining its initial (26Al/27Al)0 ratio and comparing it to (26Al/27Al)SS. Dating of meteoritic objects using the Mn-Cr or Hf-W systems is hindered because the abundances (53Mn/55Mn)SS and (182Hf/180Hf)SS at t=0 are not known precisely. To constrain these quantities, we compile literature Al-Mg, Mn-Cr, Hf-W and Pb-Pb data for 14 achondrites and use novel statistical techniques to minimize the discrepancies between their times of formation across these systems. We find that for (53Mn/55Mn)SS = (8.09+/-0.65)x10^-6, (182Hf/180Hf)SS = (10.42+/-0.25)x10^-5, tSS = 4568.36+/-0.20 Myr, and a 53Mn half-life of 3.80+/-0.23 Myr, these four free parameters make concordant 37 formation times recorded by the different systems in 14 achondrites. These parameters also make concordant the ages derived for chondrules from CB/CH achondrites, formed simultaneously in an impact, and are apparently concordant with the I-Xe chronometer as well. Our findings provide very strong support for homogeneity of 26Al, 53Mn, and 182Hf in the solar nebula, and our approach offers a framework for more precise chronometry.
△ Less
Submitted 8 May, 2023; v1 submitted 30 November, 2022;
originally announced December 2022.
-
Real-Time Denoising of Volumetric Path Tracing for Direct Volume Rendering
Authors:
Jose A. Iglesias-Guitian,
Prajita Mane,
Bochang Moon
Abstract:
Direct Volume Rendering (DVR) using Volumetric Path Tracing (VPT) is a scientific visualization technique that simulates light transport with objects' matter using physically-based lighting models. Monte Carlo (MC) path tracing is often used with surface models, yet its application for volumetric models is difficult due to the complexity of integrating MC light-paths in volumetric media with none…
▽ More
Direct Volume Rendering (DVR) using Volumetric Path Tracing (VPT) is a scientific visualization technique that simulates light transport with objects' matter using physically-based lighting models. Monte Carlo (MC) path tracing is often used with surface models, yet its application for volumetric models is difficult due to the complexity of integrating MC light-paths in volumetric media with none or smooth material boundaries. Moreover, auxiliary geometry-buffers (G-buffers) produced for volumes are typically very noisy, failing to guide image denoisers relying on that information to preserve image details. This makes existing real-time denoisers, which take noise-free G-buffers as their input, less effective when denoising VPT images. We propose the necessary modifications to an image-based denoiser previously used when rendering surface models, and demonstrate effective denoising of VPT images. In particular, our denoising exploits temporal coherence between frames, without relying on noise-free G-buffers, which has been a common assumption of existing denoisers for surface-models. Our technique preserves high-frequency details through a weighted recursive least squares that handles heterogeneous noise for volumetric models. We show for various real data sets that our method improves the visual fidelity and temporal stability of VPT during classic DVR operations such as camera movements, modifications of the light sources, and editions to the volume transfer function.
△ Less
Submitted 15 June, 2021;
originally announced June 2021.
-
A Critical Note on Social Cloud
Authors:
Pramod C. Mane,
Kapil Ahuja,
Pradeep Singh
Abstract:
The idea of a social cloud has emerged as a resource sharing paradigm in a social network context. Undoubtedly, state-of-the-art social cloud systems demonstrate the potential of the social cloud acting as complementary to other computing paradigms such as the cloud, grid, peer-to-peer and volunteer computing. However, in this note, we have done a critical survey of the social cloud literature and…
▽ More
The idea of a social cloud has emerged as a resource sharing paradigm in a social network context. Undoubtedly, state-of-the-art social cloud systems demonstrate the potential of the social cloud acting as complementary to other computing paradigms such as the cloud, grid, peer-to-peer and volunteer computing. However, in this note, we have done a critical survey of the social cloud literature and come to the conclusion that these initial efforts fail to offer a general framework of the social cloud, also, to show the uniqueness of the social cloud. This short note reveals that there are significant differences regarding the concept of social cloud, resource definition, resource sharing and allocation mechanism, and its application and stakeholders. This study is an attempt to express a need for a general framework of the social cloud, which can incorporate various views and resource sharing setups discussed in the literature.
△ Less
Submitted 29 January, 2021;
originally announced March 2021.
-
Resource Availability in the Social Cloud: An Economics Perspective
Authors:
Pramod C. Mane,
Nagarajan Krishnamurthy,
Kapil Ahuja
Abstract:
This paper focuses on social cloud formation, where agents are involved in a closeness-based conditional resource sharing and build their resource sharing network themselves. The objectives of this paper are: (1) to investigate the impact of agents' decisions of link addition and deletion on their local and global resource availability, (2) to analyze spillover effects in terms of the impact of li…
▽ More
This paper focuses on social cloud formation, where agents are involved in a closeness-based conditional resource sharing and build their resource sharing network themselves. The objectives of this paper are: (1) to investigate the impact of agents' decisions of link addition and deletion on their local and global resource availability, (2) to analyze spillover effects in terms of the impact of link addition between a pair of agents on others' utility, (3) to study the role of agents' closeness in determining what type of spillover effects these agents experience in the network, and (4) to model the choices of agents that suggest with whom they want to add links in the social cloud. The findings include the following. Firstly, agents' decision of link addition (deletion) increases (decreases) their local resource availability. However, these observations do not hold in the case of global resource availability. Secondly, in a connected network, agents experience either positive or negative spillover effect and there is no case with no spillover effects. Agents observe no spillover effects if and only if the network is disconnected and consists of more than two components (sub-networks). Furthermore, if there is no change in the closeness of an agent (not involved in link addition) due to a newly added link, then the agent experiences negative spillover effect. Although an increase in the closeness of agents is necessary in order to experience positive spillover effects, the condition is not sufficient. By focusing on parameters such as closeness and shortest distances, we provide conditions under which agents choose to add links so as to maximise their resource availability.
△ Less
Submitted 30 January, 2021;
originally announced February 2021.
-
Computer- und Netzwerksicherheit
Authors:
Jaydip Sen,
Sidra Mehtab,
Michael Ekonde Sone,
Veeramreddy Jyothsna,
Koneti Munivara Prasad,
Rajeev Singh,
Teek Parval Sharma,
Anton Noskov,
Ignacio Velasquez,
Angelica Caro,
Alfonco Rodriguez,
Tamer S. A. Fatayer,
Altaf O. Mulani,
Pradeep B. Mane,
Roshan Chitrakar,
Roshan Bhusal,
Prajwol Maharjan
Abstract:
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightwei…
▽ More
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working in the field of cryptography, network security and security and privacy issues in the Internet of Things (IoT), and machine learning application in security. It will also be useful for faculty members of graduate schools and universities.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
Small Bodies Tell the Story of the Solar System: A Scientific Rationale for a Multi-Target Small Body Sample Return Program including the Earth-based Laboratory Analysis of Returned Samples
Authors:
Seth A. Jacobson,
Maitrayee Bose,
Dennis Bodewits,
Marc Fries,
Devanshu Jha,
Prajkta Mane,
Larry Nittler,
Scott Sandford,
Michelle Thompson
Abstract:
Small bodies are time-capsules of different eras of solar system history from the most primitive materials within the solar system to evolved pieces of larger bodies. A small body sample return program is an essential component of small body exploration, and such a program should include opportunities for both missions and laboratory analysis.
Small bodies are time-capsules of different eras of solar system history from the most primitive materials within the solar system to evolved pieces of larger bodies. A small body sample return program is an essential component of small body exploration, and such a program should include opportunities for both missions and laboratory analysis.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Externalities in Endogenous Sharing Economy Networks
Authors:
Pramod C. Mane,
Kapil Ahuja,
Nagarajan Krishnamurthy
Abstract:
This paper investigates the impact of link formation between a pair of agents on the resource availability of other agents (that is, externalities) in a social cloud network, a special case of endogenous sharing economy networks. Specifically, we study how the closeness between agents and the network size affect externalities.
We conjecture, and experimentally support, that for an agent to exper…
▽ More
This paper investigates the impact of link formation between a pair of agents on the resource availability of other agents (that is, externalities) in a social cloud network, a special case of endogenous sharing economy networks. Specifically, we study how the closeness between agents and the network size affect externalities.
We conjecture, and experimentally support, that for an agent to experience positive externalities, an increase in its closeness is necessary. The condition is not sufficient though. We, then, show that for populated ring networks, one or more agents experience positive externalities due to an increase in the closeness of agents. Further, the initial distance between agents forming a link has a direct bearing on the number of beneficiaries, and the number of beneficiaries is always less than that of non-beneficiaries.
△ Less
Submitted 18 October, 2019; v1 submitted 25 November, 2018;
originally announced November 2018.
-
Data Backup Network Formation with Heterogeneous Agents
Authors:
Harshit Jain,
Guduru Sai Teja,
Pramod Mane,
Kapil Ahuja,
Nagarajan Krishnamurthy
Abstract:
Social storage systems are becoming increasingly popular compared to the existing data backup systems like local, centralized and P2P systems. An endogenously built symmetric social storage model and its aspects like the utility of each agent, bilateral stability, contentment, and efficiency have been extensively discussed in Mane et. al. (2017). We include heterogeneity in this model by using the…
▽ More
Social storage systems are becoming increasingly popular compared to the existing data backup systems like local, centralized and P2P systems. An endogenously built symmetric social storage model and its aspects like the utility of each agent, bilateral stability, contentment, and efficiency have been extensively discussed in Mane et. al. (2017). We include heterogeneity in this model by using the concept of Social Range Matrix from Kuznetsov et. al (2010).
Now, each agent is concerned about its perceived utility, which is a linear combination of its utility as well as others utilities (depending upon whether the pair are friends, enemies or do not care about each other). We derive conditions when two agents may want to add or delete a link, and provide an algorithm that checks if a bilaterally stable network is possible or not. Finally, we take some special Social Range Matrices and prove that under certain conditions on network parameters, a bilaterally stable network is unique.
△ Less
Submitted 28 November, 2017;
originally announced November 2017.
-
Stability, Efficiency, and Contentedness of Social Storage Networks
Authors:
Pramod Mane,
Kapil Ahuja,
Nagarajan Krishnamurthy
Abstract:
Social storage systems are a good alternative to existing data backup systems of local, centralized, and P2P backup. In this paper, we look at two untouched aspects of social storage systems. One aspect involves modelling social storage as an endogenous social network, where agents themselves decide with whom they want to build data backup relation. The second aspect involves studying the stabilit…
▽ More
Social storage systems are a good alternative to existing data backup systems of local, centralized, and P2P backup. In this paper, we look at two untouched aspects of social storage systems. One aspect involves modelling social storage as an endogenous social network, where agents themselves decide with whom they want to build data backup relation. The second aspect involves studying the stability of social storage systems, which would help reduce maintenance costs and further, help build efficient as well as contented networks.
We have a four fold contribution that covers the above two aspects. We, first, model the social storage system as a strategic network formation game. We define the utility of each agent in the network under two different frameworks. Second, we propose the concept of bilateral stability which refines the pairwise stability concept defined by Jackson et. al. 1996, by requiring mutual consent for both addition and deletion of links, as compared to mutual consent just for link addition. Mutual consent for link deletion is especially important in the social storage setting. Third, we prove necessary and the sufficient conditions for bilateral stability of social storage networks. For symmetric social storage networks, we prove that there exists a unique neighborhood size, independent of the number of agents (for all non-trivial cases), where no pair of agents has any incentive to increase or decrease their neighborhood size. We call this neighborhood size as the stability point. Fourth, given the number of agents and other parameters, we discuss which bilaterally stable networks would evolve and also discuss which of these stable networks are efficient --- that is, stable networks with maximum sum of utilities of all agents. We also discuss ways to build contented networks, where each agent achieves the maximum possible utility.
△ Less
Submitted 10 April, 2018; v1 submitted 24 March, 2016;
originally announced March 2016.
-
Social Cloud: Concept, Current Trends and Future Scope
Authors:
Pramod Mane,
Monalisa Sarma,
Debasis Samanta,
Kapil Ahuja
Abstract:
In recent years, various kinds of distributed resource sharing setups have been proposed by taking social relationships into consideration. These dissimilar resource sharing setups are tagged as Social Cloud. These setups have appeared in various distributed computing forms such as community cloud, grid, volunteer computing and network services. Such setups are discrete in nature, and hence, do no…
▽ More
In recent years, various kinds of distributed resource sharing setups have been proposed by taking social relationships into consideration. These dissimilar resource sharing setups are tagged as Social Cloud. These setups have appeared in various distributed computing forms such as community cloud, grid, volunteer computing and network services. Such setups are discrete in nature, and hence, do not conceptualize the totality of the Social Cloud concept. In fact, it is difficult to conceptualize Social Cloud without a general framework. There are three main objectives of this work. First, to present a general framework of Social Cloud. Second, to report various Social Cloud setups with corresponding architectural prototypes and current trends. Third, to discuss research challenges.
△ Less
Submitted 30 August, 2015; v1 submitted 11 November, 2014;
originally announced November 2014.
-
Analysis of Bus Tracking System Using GPS on Smartphones
Authors:
Mr. Pradip Suresh Mane,
Vaishali D. Khairnar
Abstract:
Public transport networks(PTNs)are difficult to use when the user is unfamiliar with the area they are traveling to.This is true for both infrequent users(including visitors)and regular users who need to travel to areas with which they are not acquainted.In these situations,adequate on-trip navigation information can substantially ease the use of public transportation and be the driving factor in…
▽ More
Public transport networks(PTNs)are difficult to use when the user is unfamiliar with the area they are traveling to.This is true for both infrequent users(including visitors)and regular users who need to travel to areas with which they are not acquainted.In these situations,adequate on-trip navigation information can substantially ease the use of public transportation and be the driving factor in motivating travelers to prefer it over other modes of transportation.However,estimating the localization of a user is not trivial,although it is critical for providing relevant information.I assess relevant design issues for a modular cost-efficient user-friendly on-trip Navigation service that uses position sensors.By helping travelers move from single-occupancy vehicles to public transportation systems, communities can reduce traffic congestion as well as its environmental impact.Here,I describe our efforts to increase the satisfaction of current public transportation users and help motivate more people to ride.
△ Less
Submitted 30 June, 2014;
originally announced July 2014.