Skip to main content

White paper - the use of LED lighting strobes within ITS

Specialist in the design and manufacture of LED illumination and control solutions for machine vision and intelligent traffic applications, Gardasoft, has recently published a White Paper which discusses the use of LED strobe vision lighting within intelligent transportation systems (ITS). The successful cost-effective application of an Intelligent Transport System (ITS) is often dependent on the interplay of many individual system elements, although other technology, such as cameras, often gains the majori
March 19, 2013 Read time: 1 min
Specialist in the design and manufacture of LED illumination and control solutions for machine vision and intelligent traffic applications, 6965 Gardasoft Vision, has recently published a White Paper which discusses the use of LED strobe vision lighting within intelligent transportation systems (ITS).

The successful cost-effective application of an Intelligent Transport System (ITS) is often dependent on the interplay of many individual system elements, although other technology, such as cameras, often gains the majority of attention and funding, whilst ancillary systems, though no less important to an overall solution’s effectiveness, are neglected.

The paper deals specifically with the integration and advantages relating to the use of LED lighting within ITS systems; it sets out the kinds of practical considerations which should be considered from the very beginning of systems definition and gives a broad outline of the principle of LED pulsing technology.

Download the full paper at %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 oLinkExternal http://www.gardasoft.com/Downloads/?f=97 www.gardasoft.com/Downloads/?f=97 false http://www.gardasoft.com/Downloads/?f=97 false false%>

Related Content

  • October 18, 2012
    Moxa high performance Ethernet products on show at ITS World Congress
    Moxa, a global provider of industrial automation solutions, will be highlighting a full range of products that allow ITS operators access to high performance wired/wireless Ethernet networks with superb connectivity. The company will also be featuring full Gigabit solutions and wide-temperature HD IP cameras that are available for bandwidth-hungry ITS video surveillance applications. To easily extend data transmission over fibre communications or leverage the existing telephone grade copper wires to transmi
  • November 28, 2018
    CTS extends contactless payments to Sydney's trains
    Cubic Transportation Systems (CTS) is extending Sydney’s contactless payment system beyond light rail and ferries to include the Australian city’s train network. The technology allows commuters to pay for ticketing via credit cards, smart watches and other electronic devices, alongside the Opal card. CTS’s Asia-Pacific team and Transport for New South Wales initially made the contactless system available for the city’s Manly ferry service in 2017. In March this year, the contactless system was ext
  • January 17, 2019
    Car2Go launches e-car rental service in central Paris
    Daimler subsidiary Car2go has made its electric car rental service available to Parisian users in a 77km square area within the city’s Périphérique motorway. Drivers are charged between €0.24 to €0.34 per minute depending on the location and time of the rental, and can charge the vehicles at around 1,100 charging stations in the French capital. The details flesh out Car2go’s announcement last year of plans to deploy 400 electric Smart EQ Fortwo vehicles in the city. The company intends to add more ve
  • November 9, 2017
    FASTR consortium releases Automotive Industry Guidelines for Secure Over-the-Air Updates
    A non-profit research consortium dedicated to automotive cyber security, Future of Automotive Security Technology Research (FASTR), has announced the availability of the Automotive Industry Guidelines for Secure Over-the-Air Updates. These guidelines are intended to assist automotive manufacturers and others involved in evaluating platforms for secure updates, describing the threat models, providing recommended cryptographic algorithms and detailing a step-by-step checklist for evaluating state of the art