-
A New Safety Objective for the Calibration of the Intelligent Driver Model
Authors:
Kingsley Adjenughwure,
Arturo Tejada,
Pedro F. V. Oliveira,
Jeroen Hogema,
Gerdien Klunder
Abstract:
The intelligent driver model (IDM) is one of the most widely used car-following (CF) models in recent years. The parameters of this model have been calibrated using real trajectories obtained from naturalistic driving ,driving simulator experiment and drone data. An important aspect of the model calibration process is defining the main objective of the calibration. This objective, influences the o…
▽ More
The intelligent driver model (IDM) is one of the most widely used car-following (CF) models in recent years. The parameters of this model have been calibrated using real trajectories obtained from naturalistic driving ,driving simulator experiment and drone data. An important aspect of the model calibration process is defining the main objective of the calibration. This objective, influences the objective function and the performance measure for the calibration. For example, to calibrate CF models, the objective is usually to minimize the error in measured spacing or speed while important safety aspects of the models such as the collision avoidance mechanisms are ignored. For such models, there is no guarantee that the calibrated parameters will preserve the safety properties of the model since they are not explicitly taken into account. To explicitly account for the safety properties during calibration, this paper proposes a simple objective function which minimizes both the error in the actual measured spacing (as it is currently done) and the error in the dynamic safety spacing (desired minimum gap) derived from the collision free property of the IDM model. The proposed objective function is used to calibrate two variants of the IDM using vehicle trajectories obtained with drone from a Dutch highway. The calibration performance is then compared in terms of the error in actual spacing and time gap. The results show that the proposed safety objective 15 function leads to lower errors in spacing and time gap compared to when minimizing for only spacing and preserves collision property of the IDM.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Brazilian COVID-19 data streaming
Authors:
Nívea B. da Silva,
Luis Iván O. Valencia,
Fábio M. H. S. Filho,
Andressa C. S. Ferreira,
Felipe A. C. Pereira,
Guilherme L. de Oliveira,
Paloma F. Oliveira,
Moreno S. Rodrigues,
Pablo I. P. Ramos,
Juliane F. Oliveira
Abstract:
We collected individualized (unidentifiable) and aggregated openly available data from various sources related to suspected/confirmed SARS-CoV-2 infections, vaccinations, non-pharmaceutical government interventions, human mobility, and levels of population inequality in Brazil. In addition, a data structure allowing real-time data collection, curation, integration, and extract-transform-load proce…
▽ More
We collected individualized (unidentifiable) and aggregated openly available data from various sources related to suspected/confirmed SARS-CoV-2 infections, vaccinations, non-pharmaceutical government interventions, human mobility, and levels of population inequality in Brazil. In addition, a data structure allowing real-time data collection, curation, integration, and extract-transform-load processes for different objectives was developed. The granularity of this dataset (state- and municipality-wide) enables its application to individualized and ecological epidemiological studies, statistical, mathematical, and computational modeling, data visualization as well as the scientific dissemination of information on the COVID-19 pandemic in Brazil.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
Network Coding Security: Attacks and Countermeasures
Authors:
Luísa Lima,
João P. Vilela,
Paulo F. Oliveira,
João Barros
Abstract:
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diffe…
▽ More
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the differences between attack scenarios in which network coding is particularly vulnerable and other relevant cases in which the intrinsic properties of network coding allow for stronger and more efficient security solutions than classical routing. Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution. Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.
△ Less
Submitted 8 September, 2008;
originally announced September 2008.