Abstract-Intelligent vehicle cooperation based on reliable communication systems contributes not only to reducing traffic accidents, but also to improving traffic flow. Adaptive Cruise Control (ACC) systems can gain enhanced performance by adding vehicle-vehicle wireless communication to provide additional information to augment range sensor data, leading to Cooperative ACC (CACC). This paper presents the design, development, implementation and testing of a CACC system. It consists of two controllers, one to manage the approaching maneuver to the leading vehicle and the other to regulate car-following once the vehicle joins the platoon. The system has been implemented on four production Infiniti M56s vehicles, and this paper details the results of experiments to validate the performance of the controller and its improvements with respect to the commercially available ACC system.
The laminar steady flow of non-Newtonian fluid (biviscosity fluid) through an axisymmetric stenosis is calculated using the finite element methods. The flow pattern, the separation and reattachment points, and the distributions of pressure and shear stress at the wall are obtained. Then, the axial force acting on the stenosis is evaluated. It is suggested by the authors that this force can become one of the causes of post-stenotic dilatation. Calculated results show that the non-Newtonian property of blood weakens the distortion of flow pattern, pressure and shear stress at the wall associated with the stenosis and that the non-Newtonian property of blood decreases the axial force acting on the stenosis.
This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment to measure and record the eye movements of the code reviewers. Based on the fixation data, the environment computes the line number of the source code that the reviewer is currently looking at. The environment can also record and play back how the eyes moved during the review process. We conducted an experiment to analyze 30 review processes (6 programs, 5 subjects) using the environment. As a result, we have identified a particular pattern, called scan, in the subjects' eye movements. Quantitative analysis showed that reviewers who did not spend enough time for the scan tend to take more time for finding defects.
In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.