Search results for "Computer security"

showing 3 items of 433 documents

Safety Evaluation of Turbo-Roundabouts with and without Internal Traffic Separations Considering Autonomous Vehicles Operation

2021

The paper presents a microsimulation approach for assessing the safety performance of turbo-roundabouts where Cooperative Autonomous Vehicles “CAVs” have been introduced into the traffic mix alongside conventional vehicles “CVs”. Based on the analysis of vehicle trajectories from VISSIM and subsequent analysis of traffic conflicts through the Surrogate Safety Assessment Model (SSAM), the research aims to evaluate the safety benefits of turbo-roundabouts where the lanes are physically separated by raised curbs, compared to roundabouts without such curbs. The paper will then describe the methodological path followed to build VISSIM models of turbo-roundabouts with and without raised curbs in …

turbo-roundaboutsComputer scienceTurboGeography Planning and DevelopmentMicrosimulationTJ807-830Traffic mixManagement Monitoring Policy and LawTD194-195Renewable energy sourcesTransport engineeringtraffic conflictssurrogate measuresSettore ICAR/04 - Strade Ferrovie Ed AeroportiGE1-350Crash datacomputer.programming_languagebiologyEnvironmental effects of industries and plantsRenewable Energy Sustainability and the EnvironmentPrincipal (computer security)biology.organism_classificationSSAMVisSimEnvironmental sciencesRoundaboutautonomous vehiclescomputerSustainability
researchProduct

Masquerader detection in mobile context based on behaviour and environment monitoring

2007

Mobiilipäätelaitteiden, matkapuhelimien ja kämmentietokoneiden yleistymisen myötä riski näiden laitteiden väärinkäytölle on kasvanut. Matkapuhelimia ja kämmentietokoneita varastetaan ja hukataan koko ajan. Tällöin on mahdollista laitteen päätyminen henkilölle, joka voi käyttää laitetta luvattomasti. Luvattoman käytön estämiseksi on syntynyt tarve turvajärjestelmälle, jonka avulla voidaan varmistaa, että mobiilipäätelaitetta käyttävällä henkilöllä on oikeus laitteen käyttöön.Mazhelis kehitti väitöskirjassaan menetelmää, jonka avulla mobiilipäätelaitteen laillinen käyttäjä erotetaan muista henkilöistä. Tähän pyritään käytön aikaista toimintaa ja toimintaympäristön informaatiota analysoimalla.…

turvajärjestelmätmobiililaitteetComputer securityväärinkäyttömatkapuhelimet
researchProduct

The Commented Walk Method as a Way of Highlighting Precise Daily Mobility Difficulties – A Case Study Focusing on Cognitive or Mental Diseases

2016

Abstract The French Act of 11 February 2005 on equal rights and opportunities, participation and citizenship of people with disabilities highlights the need “for people with disabilities or reduced mobility” to have access to the complete mobility chain of the transport system. This law was initially planned to apply from 2015. Many efforts have been made to improve life for those with physical, visual and, to a lesser extent, hearing impairments. But there is a lot of room for improvement in situations regarding psychological, cognitive and mental impairment. This is largely due to a lack of knowledge on the difficulties experienced by the above when they travel. The national quantitative …

‘commented walk’ methodEngineering[SHS.SOCIO] Humanities and Social Sciences/SociologyUniversal designmedia_common.quotation_subjectApplied psychologyPoison control[SHS.DEMO]Humanities and Social Sciences/DemographyComputer securitycomputer.software_genreuniversal design0502 economics and business0501 psychology and cognitive sciencesQuality (business)AffordanceDaily mobility050107 human factorsComputingMilieux_MISCELLANEOUSmedia_common050210 logistics & transportation[SHS.SOCIO]Humanities and Social Sciences/Sociology[SHS.DEMO] Humanities and Social Sciences/Demographybusiness.industry05 social sciencesHuman factors and ergonomicsCognitive complexityCognition[ SHS.SOCIO ] Humanities and Social Sciences/Sociologycognitive and mental diseasesqualitative sociology'commented walk' methodbusiness[ SHS.DEMO ] Humanities and Social Sciences/DemographycomputerQualitative research
researchProduct