128 research outputs found

    A review of factors which influence pedestrian use of the streets: Task 1 report for an EPSRC funded project on measuring pedestrian accessibility

    Get PDF
    INTRODUCTION This document was written to report the results from Task 1 of the Measuring Pedestrian Accessibility project funded through the EPSRC Future Integrated Transport programme. The project is being carried out by staff at the Institute for Transport Studies (ITS) at the University of Leeds in collaboration with the Pedestrians Association and City of York Council. The overall aim of this project is to identify ways to encourage and enable more people to make more journeys on foot. The specific objectives are to: • quantify attitudes and perceptions held towards walking and the barriers to walking; • study the feasibility of developing a tool that can be used to evaluate pedestrian routes; • undertake validation of the tool. The achievement of these objectives will represent a thorough investigation into the two sides of providing for walking - the physical environment for pedestrians and people's attitudes to walking. Task 1 of the project is an extended literature review and survey of experts to identify an initial list of features that are thought to influence pedestrian use of the streets. The paper that follows is split into a number of sections which look at the different characteristics of pedestrians, factors which affect route choice, factors which affect mode choice, problems faced by pedestrians on our streets and a short review of recent Government (local and national) policy which has influenced pedestrian provision

    Evaluating Feasibility of APELL in Santo Domingo, Costa Rica

    Get PDF
    This study, prepared for the National Cleaner Production Center, assesses the feasibility of APELL (Awareness and Preparedness for Emergencies at Local Level) in Santo Domingo, Costa Rica. The objective is to organize local authorities, industries, and community to develop a cooperative emergency response protocol to mitigate dangers of technological emergencies. After conducting interviews to identify risks and resources in the canton and an informational forum to promote stakeholder interest, we concluded that APELL is feasible in Santo Domingo

    Cyberattacks and Countermeasures For In-Vehicle Networks

    Full text link
    As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN) and FlexRay. CAN bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN bus not only vulnerable from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication and vehicle Intrusion Detection Systems (IDS), which operate under various constrains such as low bandwidth, small frame size (e.g. in the CAN protocol), limited availability of computational resources and real-time sensitivity. We survey In-Vehicle Network (IVN) attacks which have been grouped under: direct interfaces-initiated attacks, telematics and infotainment-initiated attacks, and sensor-initiated attacks. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real time constrains, types of hardware used, changes in CAN bus behaviour, types of attack mitigation and software/ hardware used to validate these approaches. We conclude with potential mitigation strategies and research challenges for the future

    The Cowl - v.54 - n.1 - Sep 13, 1989

    Get PDF
    The Cowl - student newspaper of Providence College. Vol 54 - No. 1 - September 13, 1989. 16 pages

    Toward a New Erie Boulevard East in Syracuse and Dewitt, New York: Bus Rapid Transit and Urban Forestry in a Time of Climate Challenge

    Get PDF
    Erie Boulevard is a major corridor that runs east-west in the City of Syracuse and Onondaga County. It is a corridor that lacks sufficient multi-modal transportation options and pedestrian infrastructure. This study looked at design and design analysis to test the viability of: bus rapid transit and biophilic urbanism, to identify impacts on ecological systems, economy, and social well-being of communities and residents. The design was evaluated through i-Tree programs, Design, Canopy, and Hydro. The results revealed an increase in ecological and economic benefits. This project is important because it is relevant to many mid-size cities with major streets that are both urban and suburban in nature, have lost their design coherence, and need major revitalization that offers the opportunity for the application of new design concepts

    Securing the in-vehicle network

    Get PDF
    Recent research into automotive security has shown that once a single electronic vehicle component is compromised, it is possible to take control of the vehicle. These components, called Electronic Control Units, are embedded systems which manage a significant part of the functionality of a modern car. They communicate with each other via the in-vehicle network, known as the Controller Area Network, which is the most widely used automotive bus. In this thesis, we introduce a series of novel proposals to improve the security of both the Controller Area Network bus and the Electronic Control Units. The Controller Area Network suffers from a number of shortfalls, one of which is the lack of source authentication. We propose a protocol that mitigates this fundamental shortcoming in the Controller Area Network bus design, and protects against a number of high profile media attacks that have been published. We derive a set of desirable security and compatibility properties which an authentication protocol for the Controller Area Network bus should possess. We evaluate our protocol, along with other proposed protocols in the literature, with respect to the defined properties. Our systematic analysis of the protocols allows the automotive industry to make an informed choice regarding the adoption suitability of these solutions. However, it is not only the communication of Electronic Control Units that needs to be secure, but the firmware running on them as well. The growing number of Electronic Control Units in a vehicle, together with their increasing complexity, prompts the need for automated tools to test their security. Part of the challenge in designing such a tool is the diversity of Electronic Control Unit architectures. To this end, this thesis presents a methodology for extracting the Control Flow Graph from the Electronic Control Unit firmware. The Control Flow Graph is a platform independent representation of the firmware control flow, allowing us to abstract from the underlying architecture. We present a fuzzer for Electronic Control Unit firmware fuzz-testing via Controller Area Network. The extracted Control Flow Graph is tagged with static data used in instructions which influence the control flow of the firmware. It is then used to create a set of input seeds for the fuzzer, and in altering the inputs during the fuzzing process. This approach represents a step towards an efficient fuzzing methodology for Electronic Control Units. To our knowledge, this is the first proposal that uses static analysis to guide the fuzzing of Electronic Control Units

    Gringos in the mist : a naturalist journey through Ecuador

    Get PDF

    The Wooster Voice (Wooster, OH), 1995-09-15

    Get PDF
    Nobel laureate Oscar Arias is the first speaker in the Wooster Forum, speaking on A Latin American Perspective on the New Millenium. Dean Plusquellec is seeking applications and nominations for student representation on the Presidential Search Committee. Limits to campus mass mailings will continue this year. The Student Government Association elections left five at-large seats unfilled.https://openworks.wooster.edu/voice1991-2000/1120/thumbnail.jp

    Understanding and designing technologies for everyday financial collaboration

    Get PDF
    Perhaps enticed by the promise of reduced marginal costs per customer and other “operational efficiencies”, the financial industry seems to take for granted that introducing technology into their services delivers convenience and makes it easier for people to manage their money. The overwhelmingly positive discourse that surrounds financial technologies portrays them as the inevitable next step in the evolution of money, and as driving consumer empowerment by reducing costs and improving quality of service. Research, however, has linked those very same technologies to new and existing forms of financial exclusion. This raises the question of how we can design financial technologies that promote access and fairness. In this thesis, I take on this question by casting a critical lens over the design of financial technologies through experiences of financial difficulty and financial third party access. I conducted qualitative studies with a team inside the banking industry tasked with servicing customers deemed “vulnerable”; and with a group of people who live under the “double trouble” (Topor et al., 2016) of mental illness and financial difficulty. The latter trialled a new financial third party access digital service for 3 months. These varied perspectives on financial difficulty and third party access reveal the unintended consequences of introducing technology into our interactions with money, and the theories and assumptions concealed in the design of existing financial technologies. Based on the insights of these studies, and a synthesis of the literature on the nature of money, this thesis contributes alternative paradigms that may help us design financial technologies differently. Such technologies would reflect an understanding of money as a social relation, and of our finances as a collaborative endeavour. Rather than focusing on efficiency, resource optimisation and asset protection, they would encourage flexibility, complementarity, reflection, appropriation, positive forms of security, collaboration and participation. By designing financial technologies under different theoretical premises and with different priorities, we may promote access, fairness and democratic oversight in financial service provision, particularly for those experiencing financial difficulty

    Smarter choices ?changing the way we travel. Case study reports

    Get PDF
    This report accompanies the following volume:Cairns S, Sloman L, Newson C, Anable J, Kirkbride A and Goodwin P (2004)Smarter Choices ? Changing the Way We Travel. Report published by theDepartment for Transport, London, available via the ?Sustainable Travel? section ofwww.dft.gov.uk, and from http://eprints.ucl.ac.uk/archive/00001224/
    • …
    corecore