4,859 research outputs found

    Complexity challenges in ATM

    Get PDF
    After more than 4 years of activity, the ComplexWorld Network, together with the projects and PhDs covered under the SESAR long-term research umbrella, have developed sound research material contributing to progress beyond the state of the art in fields such as resilience, uncertainty, multi-agent systems, metrics and data science. The achievements made by the ComplexWorld stakeholders have also led to the identification of new challenges that need to be addressed in the future. In order to pave the way for complexity science research in Air Traffic Management (ATM) in the coming years, ComplexWorld requested external assessments on how the challenges have been covered and where there are existing gaps. For that purpose, ComplexWorld, with the support of EUROCONTROL, established an expert panel to review selected documentation developed by the network and provide their assessment on their topic of expertise

    Applications of Trajectory Data From the Perspective of a Road Transportation Agency: Literature Review and Maryland Case Study

    Get PDF
    Transportation agencies have an opportunity to leverage increasingly-available trajectory datasets to improve their analyses and decision-making processes. However, this data is typically purchased from vendors, which means agencies must understand its potential benefits beforehand in order to properly assess its value relative to the cost of acquisition. While the literature concerned with trajectory data is rich, it is naturally fragmented and focused on technical contributions in niche areas, which makes it difficult for government agencies to assess its value across different transportation domains. To overcome this issue, the current paper explores trajectory data from the perspective of a road transportation agency interested in acquiring trajectories to enhance its analyses. The paper provides a literature review illustrating applications of trajectory data in six areas of road transportation systems analysis: demand estimation, modeling human behavior, designing public transit, traffic performance measurement and prediction, environment and safety. In addition, it visually explores 20 million GPS traces in Maryland, illustrating existing and suggesting new applications of trajectory data

    Trajectory and Policy Aware Sender Anonymity in Location Based Services

    Full text link
    We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these logs. Log sharing can be extremely valuable for advertising, data mining research and network management, but it poses a serious threat to the privacy of LBS users. Sender anonymity solutions prevent a malicious attacker from inferring the interests of LBS users by associating them with their service requests after gaining access to the anonymized logs. With the fast-increasing adoption of smartphones and the concern that historic user trajectories are becoming more accessible, it becomes necessary for any sender anonymity solution to protect against attackers that are trajectory-aware (i.e. have access to historic user trajectories) as well as policy-aware (i.e they know the log anonymization policy). We call such attackers TP-aware. This paper introduces a first privacy guarantee against TP-aware attackers, called TP-aware sender k-anonymity. It turns out that there are many possible TP-aware anonymizations for the same LBS log, each with a different utility to the consumer of the anonymized log. The problem of finding the optimal TP-aware anonymization is investigated. We show that trajectory-awareness renders the problem computationally harder than the trajectory-unaware variants found in the literature (NP-complete in the size of the log, versus PTIME). We describe a PTIME l-approximation algorithm for trajectories of length l and empirically show that it scales to large LBS logs (up to 2 million users)

    Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users

    Get PDF

    Location cloaking for location privacy protection and location safety protection

    Get PDF
    Many applications today rely on location information, yet disclosing such information can present heightened privacy and safety risks. A person\u27s whereabouts, for example, may reveal sensitive private information such as health condition and lifestyle. Location information also has the potential to allow an adversary to physically locate and destroy a subject, which is particularly concerned in digital battlefields. This research investigates two problems. The first one is location privacy protection in location-based services. Our goal is to provide a desired level of guarantee that the location data collected by the service providers cannot be correlated with restricted spaces such as home and office to derive who\u27s where at what time. We propose 1) leveraging historical location samples for location depersonalization and 2) allowing a user to express her location privacy requirement by identifying a spatial region. With these two ideas in place, we develop a suite of techniques for location-privacy aware uses of location-based services, which can be either sporadic or continuous. An experimental system has been implemented with these techniques. The second problem investigated in this research is location safety protection in ad hoc networks. Unlike location privacy intrusion, the adversary here is not interested in finding the individual identities of the nodes in a spatial region, but simply wants to locate and destroy them. We define the safety level of a spatial region as the inverse of its node density and develop a suite of techniques for location safety-aware cloaking and routing. These schemes allow nodes to disclose their location as accurately as possible, while preventing such information from being used to identify any region with a safety level lower than a required threshold. The performance of the proposed techniques is evaluated through analysis and simulation

    Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories

    Get PDF
    postprin

    Women and substance use: a qualitative study on sexual and reproductive health of women who use drugs in Delhi, India

    Get PDF
    Objectives: To explore contextual factors that increase vulnerabilities to negative sexual and reproductive health (SRH) outcomes and possible differences in SRH-related behaviours and the needs of women who use drugs (WUD) through non-injecting and injecting routes. Design: Qualitative study design using semi-structured in-depth interviews. Participants: Twenty women who injected drugs in the past 3months and 28 women who reported using drugs through non-injecting routes in the past 1month. Setting: Interviews were conducted at community-based, drop-in centres in Delhi, India. Results: Study findings illustrate that WUD were sexually active and had multiple sex partners including clients of sex work. Transient relationships were reported and many participants engaged in unsafe sex. Factors which affected safe sex behaviours included: gender power imbalance, limited agency for decision-making, lack of accurate information for correct self-risk assessment, and being under the influence of drugs. Despite high awareness, low and inconsistent contraceptive use was reported. Some participants were coerced to conceive while a few others reported their inability to conceive. Violence was a key determinant for SRH outcomes. Perception of certain adverse health outcomes (such as infertility) to be ‘common and expected among WUD’ influenced access to healthcare. Further, healthcare providers’ stigmatising attitudes and lack of women-centric services deterred women from uptake of healthcare services. Conclusion: Findings highlight that SRH-related behaviours and needs of this group are a complex interplay of multiple determinants which need to be addressed at all levels: individual, family, community and institutional. It is imperative to roll out a ‘one-stopshop’ for a comprehensive package of health services. Expansion of existing drop-in-centres could be considered for setting-up community-based women-centric services with appropriate linkage to drug dependence treatment and reproductive health services

    Fearsquare: hacking open crime data to critique, jam and subvert the 'aesthetic of danger'

    Get PDF
    We present a critical evaluation of a locative media application, Fearsquare, which provocatively invites users to engage with personally contextualized risk information drawn from the UK open data crime maps cross-referenced with geo-located user check-ins on Foursquare. Our analysis of user data and a corpus of #Fearsquare discourse on Twitter revealed three cogent appraisals ('Affect', 'Technical' and 'Critical') reflecting the salient associations and aesthetics that were made between different components of the application and interwoven issues of technology, risk, danger, emotion by users. We discuss how the varying strength and cogency of these public responses to Fearsquare call for a broader imagining and analysis of how risk and danger are interpreted; and conclude how our findings reveal important challenges for researchers and designers wishing to engage in projects that involve the computer-mediated communication of risk

    La configuració U-space impacta en la seguretat, capacitat i flexibilitat

    Get PDF
    El present treball de final de grau està enfocat a l'estudi del concepte U-space, els seus actuals i futurs serveis i procediments per a permetre l'accés de UAVs a l'espai aeri de manera segura, eficient i flexible, i l'anàlisi dels resultats de simulacions estudiant com a diferents configuracions de l'espai aeri impacten en la flexibilitat i capacitat del sistemaEl presente trabajo de final de grado está enfocado al estudio del concepto U-space, sus actuales y futuros servicios y procedimientos para permitir el acceso de UAVs al espacio aéreo de forma segura, eficiente y flexible, y el análisis de los resultados de simulaciones estudiando como diferentes configuraciones del espacio aéreo impactan en la flexibilidad y capacidad del sistemaThe present final degree study is focused on the exploration of the U-space concept, its current and future services and procedures to allow the access of UAVs to the airspace in a safe, efficient and flexible way, and the analysis of the results of simulations studying how different airspace configurations impact on the flexibility and capacity of the syste
    corecore