8,578 research outputs found
The Evaluation of Route Guidance Systems
BACKGROUND
We were commissioned by the Transport and Road Research Laboratory to:
"collaborate with the German government and their representatives who are responsible for conducting the LISB trial in Berlin in order to produce an agreed methodology, which is acceptable in both Germany and the UK, for assessing the automatic route guidance systems which will be provided in Berlin and London." The brief suggested a number of aspects to be included, and required detailed proposals, timescales and costs for implementation in London.
1.1.2 The background to the brief lies in decisions to introduce pilot automatic route guidance systems in the two cities. The principles of the systems are similar, and have been described in detail elsewhere (Jeffery, 1987). In brief, they involve :
(i) a central computer which retains information on a specified road network, which is updated using real time information from the equipment users;
(ii) infra red beacons at selected junctions which transmit information to equipped vehicles and receive information from those vehicles;
(iii) in-vehicle equipment which includes a dead-reckoning system for position finding, a device for requesting guidance and specifying the destination, a micro-computer which selects the optimal route, and a display which indicates when a turn is required on the main network, and the compass direction and distance to the final destination;
iv) transmission from the equipped vehicles of origin, requested destination, links used since passing the last beacon and, for each link, the time of entry and departure and time spent delayed.
It is this travel time information which is used to update the central computer's knowledge of the best routes.
(Continues..
The use of simulation in the design of a road transport incident detection algorithm
Automatic incident detection is becoming one of the core tools of urban traffic management, enabling more rapid identification and response to traffic incidents and congestion. Existing traffic detection infrastructure within urban areas (often installed for traffic signal optimization) provides urban traffic control systems with a near continuous stream of data on the state of traffic within the network. The creation of a simulation to replicate such a data stream therefore provides a facility for the development of accurate congestion detection and warning algorithms. This paper describes firstly the augmentation of a commercial traffic model to provide an urban traffic control simulation platform and secondly the development of a new incident detection system (RAID-Remote Automatic Incident Detection), with the facility to use the simulation platform as an integral part of the design and calibration process. A brief description of a practical implementation of RAID is included along with summary evaluation results
Cyber-security internals of a Skoda Octavia vRS:a hands on approach
The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrustâa hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Technical Specifications for Navigation Systems in Long Journeys Animal Transports
This document defines the technical specifications for navigation systems as referred to in Article 6(9) of Regulation (EC) 1/2005 to the aim
- To provide users, developers and manufacturers of navigation and communication systems a description of necessary components and to which requirements such systems shall conform;
- To ensure that devices of different manufacturers are compatible and interoperable;
- To allow users, such as transport companies and competent authorities to plan for the integration of such systems in the daily routines.JRC.G.7-Traceability and vulnerability assessmen
GEARS: Group Employee Automatic Rideshare System
This project involves the system analysis and design of a ridesharing application aimed to reduce driving costs and offer a green alternative to the traditional workweek commute. GEARS (Group Employee Automatic Rideshare System) is an incentivized carpool solution for employees. In partnering with a companyâs Human Resource Department, GEARS generates rideshare matching opportunities between coworkers. GEARS includes a reward system for employee participation, which leads to the broader benefits of reducing traffic, of decreasing fuel consumption, and of fostering stronger working relationships. This analysis includes an investigation of current carpooling options, a cost analysis of building the GEARS system, the systemâs technical specifications as well as system design/diagramming techniques using UML (Unified Modeling Language). Construction and implementation of this project is to be completed in June 2022
Recommended from our members
Techno-surveillance of the roads: High impact and low interest
Copyright Š 2010 Palgrave Macmillan. This is a post-peer-review, pre-copyedit version of an article published in Crime Prevention and Community Safety. The definitive publisher-authenticated version Crime Prevention and Community Safety 10(1): 1-18 is available online at the link below.Road crashes and road crime are huge international problems produced by global societyâs increasing dependence on motorised transport. To help reduce these crash and crime statistics, roads technology is rapidly developing to prevent the former and deter the latter. This technology largely works by vehicle surveillance, and as with surveillance technology used in other arenas of crime prevention, drawbacks and dangers go along with the safety and security enhancing aspects.
This paper reviews some key emerging roads technologies, the theoretical concerns raised by them and how, through various theoretical frameworks, they could be explored by the discipline of criminology. It urges that the surveillance aspects of road crime prevention and the study of vehicle-related crime more generally would benefit from criminological consideration and be theoretically rewarding. Moreover, in view of the centrality of the roads in contemporary life and the extent of global harm caused there, it contends that criminology should engage with this terrain
- âŚ