Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566234
M. Pivec, Anika Kronberger
With the intention of identifying competencies needed in the Industry 4.0 companies today and related training need in the field of mechatronics, a Europe-wide survey was launched and accompanied by industry consultations. Aiming for innovation and optimisation of learning 4.0 and adaptation of the teaching format offered and the learning content, extensive research work and consultations with a variety of stakeholders was completed. Moreover, how SMEs, educational providers, and policy makers see the need for innovation development and lifelong learning was elaborated with the help of thirty-seven interviews and two focus groups. Training expectations of the employers as well as the selection of innovative and flexible learning delivery models and innovations for life-long learning are presented in this paper.
{"title":"Learning 4.0: Innovation Directions driven by Employers Perspective","authors":"M. Pivec, Anika Kronberger","doi":"10.1109/SEEDA-CECNSM53056.2021.9566234","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566234","url":null,"abstract":"With the intention of identifying competencies needed in the Industry 4.0 companies today and related training need in the field of mechatronics, a Europe-wide survey was launched and accompanied by industry consultations. Aiming for innovation and optimisation of learning 4.0 and adaptation of the teaching format offered and the learning content, extensive research work and consultations with a variety of stakeholders was completed. Moreover, how SMEs, educational providers, and policy makers see the need for innovation development and lifelong learning was elaborated with the help of thirty-seven interviews and two focus groups. Training expectations of the employers as well as the selection of innovative and flexible learning delivery models and innovations for life-long learning are presented in this paper.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"51 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78604676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566251
Michael F. Dossis
Recent advances in silicon chip technology have facilitated the development of very dense Systems-on-Chip (SoC) and Application-Specific Integrated Circuits (ASIC). However this density has made the products often, to fail in the market window. It is widely accepted amongst the engineering community that a large proportion of development effort and delays is due to very extended, detailed, prone to bugs and repetitive low level simulations generated by attempts to cover most corner cases. This paper discusses a Formal High-level Synthesis - based verification method, that is based on high-level compile and execute of program code, and produce simulation engines from various levels in the design flow. Eventually the produced “simulators” execute and converge to the same results, since the Synthesis process is formal. The complete, and rapidimplementation flow is formal becaue the automated cycle-accurate simulator is generated from the the same formal optimized model used by the completed High-level Synthesis flow. A huge number of benchmarks from real-life applications, a few of which are discussed here, were developed and validated with the method presented in this paper and always the formal nature of the tools helped to catch all of the bugs as early as possible in the implementation flow.
{"title":"Converging Formal Verification in a High-Level Synthesis Environment","authors":"Michael F. Dossis","doi":"10.1109/SEEDA-CECNSM53056.2021.9566251","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566251","url":null,"abstract":"Recent advances in silicon chip technology have facilitated the development of very dense Systems-on-Chip (SoC) and Application-Specific Integrated Circuits (ASIC). However this density has made the products often, to fail in the market window. It is widely accepted amongst the engineering community that a large proportion of development effort and delays is due to very extended, detailed, prone to bugs and repetitive low level simulations generated by attempts to cover most corner cases. This paper discusses a Formal High-level Synthesis - based verification method, that is based on high-level compile and execute of program code, and produce simulation engines from various levels in the design flow. Eventually the produced “simulators” execute and converge to the same results, since the Synthesis process is formal. The complete, and rapidimplementation flow is formal becaue the automated cycle-accurate simulator is generated from the the same formal optimized model used by the completed High-level Synthesis flow. A huge number of benchmarks from real-life applications, a few of which are discussed here, were developed and validated with the method presented in this paper and always the formal nature of the tools helped to catch all of the bugs as early as possible in the implementation flow.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"197 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75009878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566244
M. S. Alexiou, Iosif Papadakis Ktistakis, Garrett Goodman
The recent SARS-CoV-2 virus global spread and the Covid-19 pandemic that resulted from that has increased the focus on hygienic and contactless safety measures. The wide use of masks, that are essential for the reduction of the spread of the virus, has been declared mandatory by several institutions and countries. Given the circumstances, masked facial recognition has gained an increased attention by the research community. Mask identification for healthcare reasons, face recognition and identification for public safety in a smart city environment and security reasons proved to be a challenging problem with most algorithms having limitations. The vast amount of data, of people with masks, that has been generated in the recent months will be helpful in tackling some of the major issues. The main issues most methodologies face are occlusion, illumination, non-frontal characteristics and pose variation. This paper focuses on the preliminary results of a novel rule based hybrid masked face recognition algorithm. We use the MaskedFace-net dataset and we detect the covered face using the Viola-Jones algorithm. Through the use of Statistical Region Merging (SRM) we detect the ocular region in the cropped face image, and we achieve eye detection for our preprocessing. Through this process we manage to get a clearer and sharper version of the original input eye image. Finally, we generate the attributed graph of the detected facial features, whose labeled arcs represent the computed distance rations between them. This algorithm will act as input into a machine learning prediction model moving forward.
{"title":"Towards a Masked Face Recognition Algorithm: A Novel Rule Based Hybrid Algorithm","authors":"M. S. Alexiou, Iosif Papadakis Ktistakis, Garrett Goodman","doi":"10.1109/SEEDA-CECNSM53056.2021.9566244","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566244","url":null,"abstract":"The recent SARS-CoV-2 virus global spread and the Covid-19 pandemic that resulted from that has increased the focus on hygienic and contactless safety measures. The wide use of masks, that are essential for the reduction of the spread of the virus, has been declared mandatory by several institutions and countries. Given the circumstances, masked facial recognition has gained an increased attention by the research community. Mask identification for healthcare reasons, face recognition and identification for public safety in a smart city environment and security reasons proved to be a challenging problem with most algorithms having limitations. The vast amount of data, of people with masks, that has been generated in the recent months will be helpful in tackling some of the major issues. The main issues most methodologies face are occlusion, illumination, non-frontal characteristics and pose variation. This paper focuses on the preliminary results of a novel rule based hybrid masked face recognition algorithm. We use the MaskedFace-net dataset and we detect the covered face using the Viola-Jones algorithm. Through the use of Statistical Region Merging (SRM) we detect the ocular region in the cropped face image, and we achieve eye detection for our preprocessing. Through this process we manage to get a clearer and sharper version of the original input eye image. Finally, we generate the attributed graph of the detected facial features, whose labeled arcs represent the computed distance rations between them. This algorithm will act as input into a machine learning prediction model moving forward.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75015997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566213
Nikolaos V. Oikonomou, S. Margariti, E. Stergiou, D. Liarokapis
This work demonstrates performance results of Software-Defined Networking (SDN) testing that were carried out on typical network topologies by using simulation. Specifically, the performance metrics that were examined included: the topology setup and tear down time, the CPU and RAM usage of the system and the latency of packet transfer between nodes. The entire investigation was conducted on a Windows PC using a Virtual Machine for running a Mininet emulator. From the meticulous analysis of the results, it is worth mentioning the following: (i) the total number of switches in a SDN architecture has a significant influence on CPU load. (ii) The RAM (Random Access Memory) consumption dependents on the number of hosts and in circumstances of excessive load it shows much higher increase compared to the usage of the CPU. (iii) The overall performance depends significantly on the type of topology and its properties.
{"title":"Performance Evaluation of Software-Defined Networking Implemented on Various Network Topologies","authors":"Nikolaos V. Oikonomou, S. Margariti, E. Stergiou, D. Liarokapis","doi":"10.1109/SEEDA-CECNSM53056.2021.9566213","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566213","url":null,"abstract":"This work demonstrates performance results of Software-Defined Networking (SDN) testing that were carried out on typical network topologies by using simulation. Specifically, the performance metrics that were examined included: the topology setup and tear down time, the CPU and RAM usage of the system and the latency of packet transfer between nodes. The entire investigation was conducted on a Windows PC using a Virtual Machine for running a Mininet emulator. From the meticulous analysis of the results, it is worth mentioning the following: (i) the total number of switches in a SDN architecture has a significant influence on CPU load. (ii) The RAM (Random Access Memory) consumption dependents on the number of hosts and in circumstances of excessive load it shows much higher increase compared to the usage of the CPU. (iii) The overall performance depends significantly on the type of topology and its properties.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75127259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566269
Ekaterina Mpantola, J. Vardakas, M. Louta
With the introduction of 5G technology, telecommunications industry enters a stage where remarkable changes occur. The rapid increase of traffic load combined with the emergence of new network requirements has led to the need of developing a network architecture capable of supporting a network of high efficiency, improved transmission rates and low latency. C-RAN architecture is able to meet all these challenges, while focuses on the innovation of a functional split in the Base Station (BS) where the Baseband Units - BBU is detached from the Remote Radio Heads - RRH. Its successful implementation is able to bring significant benefits where among them cost reduction, the entrance of new network requirements and services as well as enhanced network flexibility, are the ones that dominate. In this paper, we perform the analysis of this type of network through the application of specific Teletraffic Models: the Multi-rate Loss Model and the Retry Models. The Multi-rate Loss Model refers to systems that serve different types of services, whose calls are accepted by the system if only there are service units available. The Retry Models allows rejected calls to retry their connection to the system, offering a lower chance of losing calls and thus reduced network performance. The comparison of the blocking probabilities can lead us to conclusions about the efficiency of these models in a C-RAN network and then in the evaluation of the overall network performance.
{"title":"Performance evaluation of Cloud Radio Access Networks by jointly considering communicational and computational network resources","authors":"Ekaterina Mpantola, J. Vardakas, M. Louta","doi":"10.1109/SEEDA-CECNSM53056.2021.9566269","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566269","url":null,"abstract":"With the introduction of 5G technology, telecommunications industry enters a stage where remarkable changes occur. The rapid increase of traffic load combined with the emergence of new network requirements has led to the need of developing a network architecture capable of supporting a network of high efficiency, improved transmission rates and low latency. C-RAN architecture is able to meet all these challenges, while focuses on the innovation of a functional split in the Base Station (BS) where the Baseband Units - BBU is detached from the Remote Radio Heads - RRH. Its successful implementation is able to bring significant benefits where among them cost reduction, the entrance of new network requirements and services as well as enhanced network flexibility, are the ones that dominate. In this paper, we perform the analysis of this type of network through the application of specific Teletraffic Models: the Multi-rate Loss Model and the Retry Models. The Multi-rate Loss Model refers to systems that serve different types of services, whose calls are accepted by the system if only there are service units available. The Retry Models allows rejected calls to retry their connection to the system, offering a lower chance of losing calls and thus reduced network performance. The comparison of the blocking probabilities can lead us to conclusions about the efficiency of these models in a C-RAN network and then in the evaluation of the overall network performance.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81002692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566256
Vasileios Tsoukas, Anargyros Gkogkidis, Aikaterini Kampa, G. Spathoulas, A. Kakarountas
The food industry is highly dependent upon food supply chains. It is highly critical for the quality of the food product that reaches the consumer, that all actors that interact with the corresponding supply chains act responsibly and according to the appropriate regulations. Because of that, monitoring of food supply chains is a necessity nowadays. The main problem of current food supply chain systems is the lack of transparency, traceability, and sustainability as those are required to operate in a complex ecosystem, involving multiple stakeholders across different countries. Blockchain technology has been proposed as the means to enhance existing systems by increasing transparency and traceability, and thus regain customer's trust. This paper aims at providing a state of the art with regards to the use of blockchain technology in the food industry and food supply chains in particular. The survey summarizes all relevant research efforts and concludes with the main findings, while it also identifies existing challenges and limitations.
{"title":"Blockchain technology in food supply chain: A state of the art","authors":"Vasileios Tsoukas, Anargyros Gkogkidis, Aikaterini Kampa, G. Spathoulas, A. Kakarountas","doi":"10.1109/SEEDA-CECNSM53056.2021.9566256","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566256","url":null,"abstract":"The food industry is highly dependent upon food supply chains. It is highly critical for the quality of the food product that reaches the consumer, that all actors that interact with the corresponding supply chains act responsibly and according to the appropriate regulations. Because of that, monitoring of food supply chains is a necessity nowadays. The main problem of current food supply chain systems is the lack of transparency, traceability, and sustainability as those are required to operate in a complex ecosystem, involving multiple stakeholders across different countries. Blockchain technology has been proposed as the means to enhance existing systems by increasing transparency and traceability, and thus regain customer's trust. This paper aims at providing a state of the art with regards to the use of blockchain technology in the food industry and food supply chains in particular. The survey summarizes all relevant research efforts and concludes with the main findings, while it also identifies existing challenges and limitations.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"197 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79958723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566268
Dimitris Ziouzios, Antonios Chatzisavvas, Nikolaos Baras, Georgios Kapris, M. Dasygenis
In the past few years, one of the essential elements of most formal and informal education practices is Information & Communications Technology (ICT). Teachers are implementing new technologies in the education process to make learning more fun and fruitful. Educational Robotics, an ICT sub field is one of these technologies and it has triggered many studies regarding its effectiveness. This paper presents our design process of a unique educational humanoid robot that can be used as a teaching aid for wide variety of subjects to children at primary schools.
{"title":"An Emotional Intelligent Robot for primary education: The software development","authors":"Dimitris Ziouzios, Antonios Chatzisavvas, Nikolaos Baras, Georgios Kapris, M. Dasygenis","doi":"10.1109/SEEDA-CECNSM53056.2021.9566268","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566268","url":null,"abstract":"In the past few years, one of the essential elements of most formal and informal education practices is Information & Communications Technology (ICT). Teachers are implementing new technologies in the education process to make learning more fun and fruitful. Educational Robotics, an ICT sub field is one of these technologies and it has triggered many studies regarding its effectiveness. This paper presents our design process of a unique educational humanoid robot that can be used as a teaching aid for wide variety of subjects to children at primary schools.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"11 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86242742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566272
P. Kitsos
Given the tremendous increase of activity in the digital domain, whether government related activity or digital economy activity, it was important that this sphere would be regulated and that stakeholders were subjected to regulation that would allow democratic the democratic principles to prevail. The paper presents the policy steps taken by the EU in relation to the Data-based Economy, mainly exploring the five projects led by the EU and that are related to Cloud Computing as a new space for solidifying the single market. It also discusses the challenges that EU-based business enterprises experience when they use facilities and cloud computing storage services situated outside the EU, thus challenging the efficacy of the related existing sets of EU rules. It also analyses the effectiveness of specific sets of rules that have been proposed in respect to the five strategies that are currently in the focus.
{"title":"Cloud Computing as a Strategic Asset: European Union Regulatory Inititatives","authors":"P. Kitsos","doi":"10.1109/SEEDA-CECNSM53056.2021.9566272","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566272","url":null,"abstract":"Given the tremendous increase of activity in the digital domain, whether government related activity or digital economy activity, it was important that this sphere would be regulated and that stakeholders were subjected to regulation that would allow democratic the democratic principles to prevail. The paper presents the policy steps taken by the EU in relation to the Data-based Economy, mainly exploring the five projects led by the EU and that are related to Cloud Computing as a new space for solidifying the single market. It also discusses the challenges that EU-based business enterprises experience when they use facilities and cloud computing storage services situated outside the EU, thus challenging the efficacy of the related existing sets of EU rules. It also analyses the effectiveness of specific sets of rules that have been proposed in respect to the five strategies that are currently in the focus.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"60 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89328483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566247
G. Ntritsos, E. Evangelou
The occurrence of melanoma is a composite process that implicates the interaction of phenotypic, environmental, and genetic risk factors. We constructed genetic risk models, with the aim to assess their predictive performance on melanoma risk. Summary level data from the largest meta-analysis of genome-wide association studies for melanoma, up to date, were used for the construction of weighted genetic risk scores. We used six different p-value thresholds for genetic variants inclusion. We evaluated our genetic risk scores in 2,862 events of incident melanoma and 321,789 cancer-free controls from the UK Biobank, a prospective cohort study of 500,000 participants. Using AUCs, we compared the predictive ability of the different genetic risk scores. Genetic risk scores were strongly associated melanoma risk. Odds Ratios ranged from 1.478 to 1.528. The predictive ability of the genetic risk scores ranged from 0.6234 to 0.6328 showing a moderate performance. Our study suggests that when the p-value threshold for genetic variants inclusion become more tolerant, the prediction performance of the model improved. Validation of the results in larger populations, as well as Southern European populations is needed.
{"title":"Prediction of melanoma incidence based on combination of genetic variants","authors":"G. Ntritsos, E. Evangelou","doi":"10.1109/SEEDA-CECNSM53056.2021.9566247","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566247","url":null,"abstract":"The occurrence of melanoma is a composite process that implicates the interaction of phenotypic, environmental, and genetic risk factors. We constructed genetic risk models, with the aim to assess their predictive performance on melanoma risk. Summary level data from the largest meta-analysis of genome-wide association studies for melanoma, up to date, were used for the construction of weighted genetic risk scores. We used six different p-value thresholds for genetic variants inclusion. We evaluated our genetic risk scores in 2,862 events of incident melanoma and 321,789 cancer-free controls from the UK Biobank, a prospective cohort study of 500,000 participants. Using AUCs, we compared the predictive ability of the different genetic risk scores. Genetic risk scores were strongly associated melanoma risk. Odds Ratios ranged from 1.478 to 1.528. The predictive ability of the genetic risk scores ranged from 0.6234 to 0.6328 showing a moderate performance. Our study suggests that when the p-value threshold for genetic variants inclusion become more tolerant, the prediction performance of the model improved. Validation of the results in larger populations, as well as Southern European populations is needed.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"79 2 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90962619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-24DOI: 10.1109/SEEDA-CECNSM53056.2021.9566253
Petros Laskas, Stamatis Dimitriadis, Alexandros Koritsoglou, Kyriakos Koritsoglou, I. Fudos
Digital geographic platforms like Google Maps or Bing Maps provide user-friendly interfaces for navigating through cities. Although, these apps are used daily for shortest paths calculation within the urban centers, they were designed with an emphasis on the needs of motor vehicles and therefore pedestrian routes have only been considered as an add-on option. For that reason, current pedestrian navigation services provide routes based on road networks as they are well defined due to the popularity of car navigation systems on one hand and the lack of pedestrian data (including streets, sidewalks, curb ramps, elevation data, and construction permit information) on the other hand. However, road networks do not adequately represent the paths that pedestrians use. Furthermore, for people with limited mobility, planning a route using a wheelchair in urban centers is very difficult due to lack of information regarding accessibility along the route. To this end, better data on pedestrian sections are needed to improve safety, comfort, and convenience of pedestrian movement. This process requires a carefully developed methodology for modeling pedestrian routes. This paper introduces a structured approach to develop a simple model of pedestrian data that captures all required information and facilitates the design of user-friendly interactive navigation systems. A pilot case is presented for the historical center of Thessaloniki city.
{"title":"A data model for pedestrian routes","authors":"Petros Laskas, Stamatis Dimitriadis, Alexandros Koritsoglou, Kyriakos Koritsoglou, I. Fudos","doi":"10.1109/SEEDA-CECNSM53056.2021.9566253","DOIUrl":"https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566253","url":null,"abstract":"Digital geographic platforms like Google Maps or Bing Maps provide user-friendly interfaces for navigating through cities. Although, these apps are used daily for shortest paths calculation within the urban centers, they were designed with an emphasis on the needs of motor vehicles and therefore pedestrian routes have only been considered as an add-on option. For that reason, current pedestrian navigation services provide routes based on road networks as they are well defined due to the popularity of car navigation systems on one hand and the lack of pedestrian data (including streets, sidewalks, curb ramps, elevation data, and construction permit information) on the other hand. However, road networks do not adequately represent the paths that pedestrians use. Furthermore, for people with limited mobility, planning a route using a wheelchair in urban centers is very difficult due to lack of information regarding accessibility along the route. To this end, better data on pedestrian sections are needed to improve safety, comfort, and convenience of pedestrian movement. This process requires a carefully developed methodology for modeling pedestrian routes. This paper introduces a structured approach to develop a simple model of pedestrian data that captures all required information and facilitates the design of user-friendly interactive navigation systems. A pilot case is presented for the historical center of Thessaloniki city.","PeriodicalId":68279,"journal":{"name":"计算机工程与设计","volume":"39 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75358228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}