GIS Business ◽  
2016 ◽  
Vol 10 (5) ◽  
pp. 8-13
Author(s):  
Eicher, A
Keyword(s):  

Next exit: Intelligent traffic systems Nächste Ausfahrt: Intelligente Verkehrssysteme


Author(s):  
Shuai Ling ◽  
Shoufeng Ma ◽  
Ning Jia

AbstractThe rapid development of economics requires highly efficient and environment-friendly urban transportation systems. Such requirement presents challenges in sustainable urban transportation. The analysis and understanding of transportation-related behaviors provide one approach to dealing with complicated transportation activities. In this study, the management of traffic systems is divided into four levels with a structural and systematic perspective. Then, several special cases from the perspective of behavior, including purchasing behaviors toward new energy vehicles, choice behaviors toward green travel, and behavioral reactions toward transportation demand management policies, are investigated. Several management suggestions are proposed for transportation authorities to improve sustainable traffic management.


2021 ◽  
Author(s):  
Amin Ghadami ◽  
Charles R. Doering ◽  
Bogdan Epureanu

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 47273-47287 ◽  
Author(s):  
Massimo Ficco ◽  
Roberto Pietrantuono ◽  
Stefano Russo

2012 ◽  
Vol 19 (2) ◽  
pp. 5-17
Author(s):  
Bartosz Czaplewski ◽  
Krzysztof Czaplewski

Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.


Sign in / Sign up

Export Citation Format

Share Document