82,009 research outputs found
Methodology to assess safety effects of future Intelligent Transport Systems on railway level crossings
There is consistent evidence showing that driver behaviour contributes to crashes and near miss incidents at railway level crossings (RLXs). The development of emerging Vehicle-to-Vehicle and Vehicle-to-Infrastructure technologies is a highly promising approach to improve RLX safety. To date, research has not evaluated comprehensively the potential effects of such technologies on driving behaviour at RLXs. This paper presents an on-going research programme assessing the impacts of such new technologies on human factors and drivers’ situational awareness at RLX. Additionally, requirements for the design of such promising technologies and ways to display safety information to drivers were systematically reviewed. Finally, a methodology which comprehensively assesses the effects of in-vehicle and road-based interventions warning the driver of incoming trains at RLXs is discussed, with a focus on both benefits and potential negative behavioural adaptations. The methodology is designed for implementation in a driving simulator and covers compliance, control of the vehicle, distraction, mental workload and drivers’ acceptance. This study has the potential to provide a broad understanding of the effects of deploying new in-vehicle and road-based technologies at RLXs and hence inform policy makers on safety improvements planning for RLX
Tribal Corridor Management Planning: Model, Case Study, and Guide for Caltrans District 1, Research Report 10-01
In Northern California, tribal governments and personnel of the California Department of Transportation (Caltrans) District 1, have applied innovative context-sensitive solutions to meet a variety of transportation challenges along state highways that traverse tribal lands. This report describes and discusses the efforts under way and offer suggestions for continuing and extending these initiatives through the development of Tribal Corridor Management Plans (TCMPs). The methods employed in this project are multidisciplinary and include: (1) content analysis of existing corridor management plans; (2) literature review to identify “best practices;” (3) participant observation; (4) interviews with local stakeholders; (5) focus group interviews with Caltrans personnel; and (6) landscape analysis. This study’s authors conclude that Caltrans District 1 staff and tribal governments share common goals for highway operations; however, progress —while significant—has been somewhat hampered by geographic and administrative challenges. It is recommended that Caltrans and the tribes seek early and frequent communication and collaboration to overcome these obstacles. Further, they identify several examples of non-standard design elements that could be incorporated into highway improvements to enhance local sense of place among both residents and travelers. A preliminary TCMP for the segment of State Route 96 that lies within the boundaries of the Hoopa Valley Indian Reservation is presented as an example. Beyond its role as a guide for initiating tribal corridor projects within Caltrans District 1, the report should prove instructive for any efforts to enhance sense of place within transportation byways, particularly in Native communities
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Reaching Out to Tribal Communities: Lessons Learned and Approaches to Consider
When transportation safety decision-making is desired, the involvement and engagement with a community is essential. A streamlined delivery of a project or program is more likely to occur when active dialogue and an exchange of ideas occurs in advance and occurs frequently. This is particularly important in tribal communities, who value sustained relationships and represent the focus population of this study. The research team, on six separate occasions, met with local and regional tribal leaders to explore and discuss transportation safety needs within and outside tribal communities, as well as discern the recommended approaches to foster ongoing dialogue about these needs. In all cases these discussions closely correlated with existing research studies or activities; transportation safety and equity is not seen as separate from other tribal foci and community needs. Specific recommendations to consider, in no particular order, included the following: invest respectfully enough time for people to talk; tribes think long-term and consider the impact of any decision from a long-term viewpoint so an iterative process and re-sharing of ideas is critical; the power of decision is in the hands of the tribe and its members; do not lump tribes together as each tribe is sovereign and unique and every community should be expected to think differently; all tribes are unique as is the environmental and social context; to disseminate information widely and iteratively, do so when there is a large group or event; be sure to understand the Tribal governance, decision making, and organizational structure; know who is the tribal Chairman or Chairwoman; and develop an emic and etic understanding of the community
Assessment of cockpit interface concepts for data link retrofit
The problem is examined of retrofitting older generation aircraft with data link capability. The approach taken analyzes requirements for the cockpit interface, based on review of prior research and opinions obtained from subject matter experts. With this background, essential functions and constraints for a retrofit installation are defined. After an assessment of the technology available to meet the functions and constraints, candidate design concepts are developed. The most promising design concept is described in detail. Finally, needs for further research and development are identified
Recommended from our members
Bolstering Mobility and Enhancing Transportation Options for Low-Income Older Adults
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
- …