Search results

1 – 8 of 8
Book part
Publication date: 4 June 2024

Michail A. Makridis, Konstantinos Mattas, Biagio Ciuffo and Anastasios Kouvelas

Road transport networks might face the most significant transformation in the following decades, mostly due to the anticipated introduction of Connected and Automated Vehicles…

Abstract

Road transport networks might face the most significant transformation in the following decades, mostly due to the anticipated introduction of Connected and Automated Vehicles (CAVs). The introduction of connectivity and automation will be realised gradually. There are distinctive levels of automation starting from single-dimension automated functionalities, such as regulating the vehicle’s longitudinal behaviour via Adaptive Cruise Control (ACC) systems. Although the technological readiness level is undeniably far from full vehicle automation, there are already commercially available lower-level automated vehicles. The penetration rate of vehicles equipped with Advanced Driver Assistance Systems (ADAS) such as ACC or Cooperative-ACC is constantly increasing bringing new driving behaviours into existing infrastructure, especially on motorways. Lately, several experiments have been conducted with platoons of ACC and CACC-equipped vehicles aiming to study the characteristics and properties of the traffic flow composed by them. This chapter aims to gather the most significant efforts on the topic and present the recent status of research and policy. The impact analysis presented within this chapter is multi-dimensional spanning from traffic flow oscillations and string stability, traffic safety to driving behaviour, energy consumption, and policy, all factors where automation has the potential to contribute to a more sustainable transport system. Investigations through analytical approaches and simulation studies are discussed as well, in comparison to empirical insights, attempting to generalise experimental conclusions. At the end of this chapter, the reader should have a clear view of the existing and potential benefits of CAVs but also the existing and future challenges they can bring.

Article
Publication date: 19 January 2024

Ping Huang, Haitao Ding, Hong Chen, Jianwei Zhang and Zhenjia Sun

The growing availability of naturalistic driving datasets (NDDs) presents a valuable opportunity to develop various models for autonomous driving. However, while current NDDs…

Abstract

Purpose

The growing availability of naturalistic driving datasets (NDDs) presents a valuable opportunity to develop various models for autonomous driving. However, while current NDDs include data on vehicles with and without intended driving behavior changes, they do not explicitly demonstrate a type of data on vehicles that intend to change their driving behavior but do not execute the behaviors because of safety, efficiency, or other factors. This missing data is essential for autonomous driving decisions. This study aims to extract the driving data with implicit intentions to support the development of decision-making models.

Design/methodology/approach

According to Bayesian inference, drivers who have the same intended changes likely share similar influencing factors and states. Building on this principle, this study proposes an approach to extract data on vehicles that intended to execute specific behaviors but failed to do so. This is achieved by computing driving similarities between the candidate vehicles and benchmark vehicles with incorporation of the standard similarity metrics, which takes into account information on the surrounding vehicles' location topology and individual vehicle motion states. By doing so, the method enables a more comprehensive analysis of driving behavior and intention.

Findings

The proposed method is verified on the Next Generation SIMulation dataset (NGSim), which confirms its ability to reveal similarities between vehicles executing similar behaviors during the decision-making process in nature. The approach is also validated using simulated data, achieving an accuracy of 96.3 per cent in recognizing vehicles with specific driving behavior intentions that are not executed.

Originality/value

This study provides an innovative approach to extract driving data with implicit intentions and offers strong support to develop data-driven decision-making models for autonomous driving. With the support of this approach, the development of autonomous vehicles can capture more real driving experience from human drivers moving towards a safer and more efficient future.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 2 January 2024

Emma Mihocic, Koorosh Gharehbaghi, Per Hilletofth, Kong Fah Tee and Matt Myers

In successfully meeting city and metropolitan growth, sustainable development is compulsory. Sustainability is a must-focus for any project, particularly for large and mega rail…

Abstract

Purpose

In successfully meeting city and metropolitan growth, sustainable development is compulsory. Sustainability is a must-focus for any project, particularly for large and mega rail infrastructure. This paper aims to investigate to what degree social, environmental and economic factors influence the government when planning sustainable rail infrastructure projects. To respond to such a matter, this paper focuses on two Australian mega-rail projects: the South West Rail Link (SWRL) and the Mernda Rail Extension (MRE).

Design/methodology/approach

As the basis of an experimental evaluation framework strengths, weaknesses, opportunities and threats (SWOT) and factor analysis were used. These two methods were specifically selected as comparative tools for SWRL and SWRL projects, to measure their overall sustainability effect.

Findings

Using factor analysis, in the MRE, the factors of network capacity, accessibility, employment and urban planning were seen frequently throughout the case study. However, politics and economic growth had lower frequencies throughout this case study. This difference between the high-weighted factors is likely a key element that determined the SWRL to be more sustainable than the MRE. The SWOT analysis showed the strengths the MRE had over the SWRL such as resource use and waste management, and natural habitat preservation. These two analyses have shown that overall, calculating the sustainability levels of a project can be subjective, based on the conditions surrounding various analysis techniques.

Originality/value

This paper first introduces SWRL and MRE projects followed by a discussion about their overall sustainable development. Both projects go beyond the traditional megaprojects' goal of improving economic growth by developing and enhancing infrastructure. Globally, for such projects, sustainability measures are now considered alongside the goal of economic growth. Second, SWOT and factor analysis are undertaken to further evaluate the complexity of such projects. This includes their overall sustainable development vision alignment with environmental, economic and social factors.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Book part
Publication date: 21 May 2024

Muhammad Shujaat Mubarik and Sharfuddin Ahmed Khan

Digital technologies (DTs) have emerged as a major driving force, transmuting the ways Supply Chains (SCs) are managed. The integration of DTs in supply chain management (SCM)…

Abstract

Digital technologies (DTs) have emerged as a major driving force, transmuting the ways Supply Chains (SCs) are managed. The integration of DTs in supply chain management (SCM), Digital Supply Chain Management (DSCM), has fundamentally reshaped the SCM landscape, offering new opportunities and challenges for organizations. This chapter provides a comprehensive overview of modern DTs and the way they impact modern SCM. This chapter has twofold objectives. First, it illustrates the major changes that DTs have brought to the supply chain landscape, unraveling their multifaceted implications. Second, it offers readers a deeper and comprehensive understanding of the challenges and opportunities arising from the incorporation of DTs into supply chains. By going through the chapter, readers will be able to have a comprehensive grasp of how DTs are reshaping SCM and how organizations can survive and thrive in the digital age. This chapter commences by shedding light on how DTs have and continue to redefine SCM, improving supply chain resilience, visibility, and sustainability in an increasingly complex and interconnected world. It also highlights the role of DTs in enhancing SC visibility, agility, and customer-centricity. Furthermore, this chapter briefly highlights the challenges related to the adoption (pre and post) of DTs in SCM, elucidating on issues related to talent acquisition, data security, and regulatory compliance. It also highlights the ethical and societal implications of this digital transformation, emphasizing the significance of responsible and sustainable practices. This chapter, with the help of three cases, illustrates how the adoption of DTs in SC can impact the various SC performance indicators.

Details

The Theory, Methods and Application of Managing Digital Supply Chains
Type: Book
ISBN: 978-1-80455-968-0

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 12 April 2024

Youwei Li and Jian Qu

The purpose of this research is to achieve multi-task autonomous driving by adjusting the network architecture of the model. Meanwhile, after achieving multi-task autonomous…

Abstract

Purpose

The purpose of this research is to achieve multi-task autonomous driving by adjusting the network architecture of the model. Meanwhile, after achieving multi-task autonomous driving, the authors found that the trained neural network model performs poorly in untrained scenarios. Therefore, the authors proposed to improve the transfer efficiency of the model for new scenarios through transfer learning.

Design/methodology/approach

First, the authors achieved multi-task autonomous driving by training a model combining convolutional neural network and different structured long short-term memory (LSTM) layers. Second, the authors achieved fast transfer of neural network models in new scenarios by cross-model transfer learning. Finally, the authors combined data collection and data labeling to improve the efficiency of deep learning. Furthermore, the authors verified that the model has good robustness through light and shadow test.

Findings

This research achieved road tracking, real-time acceleration–deceleration, obstacle avoidance and left/right sign recognition. The model proposed by the authors (UniBiCLSTM) outperforms the existing models tested with model cars in terms of autonomous driving performance. Furthermore, the CMTL-UniBiCL-RL model trained by the authors through cross-model transfer learning improves the efficiency of model adaptation to new scenarios. Meanwhile, this research proposed an automatic data annotation method, which can save 1/4 of the time for deep learning.

Originality/value

This research provided novel solutions in the achievement of multi-task autonomous driving and neural network model scenario for transfer learning. The experiment was achieved on a single camera with an embedded chip and a scale model car, which is expected to simplify the hardware for autonomous driving.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 9 September 2022

Siavash Ghorbany, Saied Yousefi and Esmatullah Noorzai

Being an efficient mechanism for the value of money, public–private partnership (PPP) is one of the most prominent approaches for infrastructure construction. Hence, many…

350

Abstract

Purpose

Being an efficient mechanism for the value of money, public–private partnership (PPP) is one of the most prominent approaches for infrastructure construction. Hence, many controversies about the performance effectiveness of these delivery systems have been debated. This research aims to develop a novel performance management perspective by revealing the causal effect of key performance indicators (KPIs) on PPP infrastructures.

Design/methodology/approach

The literature review was used in this study to extract the PPPs KPIs. Experts’ judgment and interviews, as well as questionnaires, were designed to obtain data. Copula Bayesian network (CBN) has been selected to achieve the research purpose. CBN is one of the most potent tools in statistics for analyzing the causal relationship of different elements and considering their quantitive impact on each other. By utilizing this technique and using Python as one of the best programming languages, this research used machine learning methods, SHAP and XGBoost, to optimize the network.

Findings

The sensitivity analysis of the KPIs verified the causation importance in PPPs performance management. This study determined the causal structure of KPIs in PPP projects, assessed each indicator’s priority to performance, and found 7 of them as a critical cluster to optimize the network. These KPIs include innovation for financing, feasibility study, macro-environment impact, appropriate financing option, risk identification, allocation, sharing, and transfer, finance infrastructure, and compliance with the legal and regulatory framework.

Practical implications

Identifying the most scenic indicators helps the private sector to allocate the limited resources more rationally and concentrate on the most influential parts of the project. It also provides the KPIs’ critical cluster that should be controlled and monitored closely by PPP project managers. Additionally, the public sector can evaluate the performance of the private sector more accurately. Finally, this research provides a comprehensive causal insight into the PPPs’ performance management that can be used to develop management systems in future research.

Originality/value

For the first time, this research proposes a model to determine the causal structure of KPIs in PPPs and indicate the importance of this insight. The developed innovative model identifies the KPIs’ behavior and takes a non-linear approach based on CBN and machine learning methods while providing valuable information for construction and performance managers to allocate resources more efficiently.

Details

Engineering, Construction and Architectural Management, vol. 31 no. 1
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 23 December 2022

Yu Song, Bingrui Liu, Lejia Li and Jia Liu

In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and…

Abstract

Purpose

In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and principles which can be utilized to make effective evacuation plans to reduce casualties in terrorist attacks.

Design/methodology/approach

By analyzing the statistical data of terrorist attack videos, this paper proposes an extended cellular automaton (CA) model and simulates the panic evacuation of the pedestrians in the terrorist attack.

Findings

The main findings are as follows. (1) The panic movement of pedestrians leads to the dispersal of the crowd and the increase in evacuation time. (2) Most deaths occur in the early stage of crowd evacuation while pedestrians gather without perceiving the risk. (3) There is a trade-off between escaping from the room and avoidance of attackers for pedestrians. Appropriate panic contagion enables pedestrians to respond more quickly to risks. (4) Casualties are mainly concentrated in complex terrains, e.g. walls, corners, obstacles, exits, etc. (5) The initial position of the attackers has a significant effect on the crowd evacuation. The evacuation efficiency should be reduced if the attacker starts the attack from the exit or corners.

Originality/value

In this research, the concept of “focus region” is proposed to depict the different reactions of pedestrians to danger and the effects of the attacker’s motion (especially the attack strategies of attackers) are classified. Additionally, the influences on pedestrians by direct and indirect panic sources are studied.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 8 of 8