Hasil untuk "Transportation and communication"

Menampilkan 20 dari ~1648458 hasil · dari CrossRef, DOAJ, Semantic Scholar

JSON API
DOAJ Open Access 2026
“The resources are there, it’s just not sufficient:” Primary Care Team Members and Their Experiences with Connecting Patients to Needed Resources

Jasmine Rodriguez, Tharani Ravi, Erika L. Thompson et al.

Background: Non-medical drivers of Health (NMDOH) (e.g., discrimination, income) influence the health status of individuals and their families. In primary care, where clinicians are trained to provide continuous, comprehensive care to patients, there is increasing recognition of the complexity to treat patients impacted by adverse NMDOH. Addressing complex needs requires coordinated support from both healthcare and social systems to overcome socioeconomic barriers and improve outcomes. The purpose of this project was to identify barriers that clinic team members encounter when referring patients to resources. Methods: Focus groups were conducted with Primary Care Providers and staff (e.g., Social Workers) regularly tasked with referring patients to community organizations. Interviews were audio-recorded, transcribed, and analyzed. Results: Participants described 3 themes related to barriers: (1) PCPs Are Unaware of Appropriate Referral Processes and Services/Scope of Services Available Internally , (2) Constant Fluctuation of Community Resources Limit Access , and (3) Cost, Communication, Transportation, and Paperwork Limit Patient Access to Services . A fourth theme included participants’ recommendations for Solutions to Improve the Referral Process and Communication . Conclusion: Understanding the barriers between healthcare providers and community organizations can provide a guide toward improving referral protocols and access to resources, thus ultimately leading toward a more equitable community.

Computer applications to medicine. Medical informatics, Public aspects of medicine
S2 Open Access 2021
Internet of Vehicles: Key Technologies, Network Model, Solutions and Challenges With Future Aspects

K. Qureshi, Sadia Din, Gwanggil Jeon et al.

New integrated technologies have changed various existing fields and converted into new and advanced data communication systems including, smart agriculture, smart homes, smart health, and smart transportation systems. Internet of Things (IoT) has evolved a new theme to vehicular networks field known as the Internet of Vehicles (IoV). This paper presents a comprehensive review and detailed background and motivation to evolve the heterogeneous vehicular networks. Paper also proposed new integrated models and key technologies related to network maintenance, a six-layered architecture model based on protocol stack and network elements, network model based on cloud services, big data analytical model based on data acquisition and analytics, security model based on detection and prevention systems. Paper also envisioned existing challenges and future directions to design the new integrated models.

135 sitasi en Computer Science
DOAJ Open Access 2025
Conjecture Interaction Optimization Model for Intelligent Transportation Systems in Smart Cities Using Reciprocated Multi-Instance Learning for Road Traffic Management

Abdullah Faiz Al Asmari, Ahmed Almutairi, Fayez Alanazi et al.

Intelligent Transportation Systems (ITS) routing in smart cities is planned and maintained based on vehicle communication, demands, and terminal interaction. The influencing factors, such as road and traffic conditions, demand a prior conjecture to improve transportation, navigation comfort, and efficiency. Therefore, a Conjecture Interaction Optimization Model using terminal-communication assistance is introduced in this article. This model accounts for the road’s physical condition and traffic density for setting up routing efficiency. The priorities are dynamic and based on the nearest assisting/ communicating terminal to improve the forecast on dynamic vehicle routing. The routing and traffic avoidance decisions are pursued using reciprocated multi-instance convergence learning (RMICL). RMICL algorithm optimizes real-time vehicle communication to analyze the vehicles’ active and discarded interactions for minimum delay and route refinement. The MIL algorithm integrates multi-instance learning into the interaction labelling process, enhancing the routing prediction by differentiating between reliable and erroneous data. It considers improved traffic avoidance and ensuring convergence robustness in dynamic traffic management for smart cities. The convergence optimization is used to identify the low latency route decision outcomes from the communicating terminal. The routing identifies the possible combination of available interacting terminals with precision traffic forecast; the convergence must be slight between the conjecture and the actual routing traffic. Contrarily, reverse convergence instances identify traffic locations based on discarded interactions. The process is iterated from low traffic to highly interactive route searches based on location. Therefore, the characteristics of conjectures are updated with the forward and reverse reciprocation instances. This model leverages the ITS decision convergence over traffic and routing efficiencies. The results of the proposed model are identified as follows: this model improves traffic detection by 10.76% through 11.67% high interaction throughput to reduce 12.66% travel time for the distance-covered variant.

Electrical engineering. Electronics. Nuclear engineering
DOAJ Open Access 2025
Exploring the relationship between different modes of transportation and levels of physical activity among senior high school students of the University of Santo Tomas: a cross-sectional study protocol

Donald Manlapaz, Zyra Mae Sicat, April Alexandra Engbino et al.

Introduction Rapid changes in technology, communication and transportation prompted challenges in achieving the recommended level of physical activity. Although the students are returning for in-campus classes to promote more interaction and socialisation, the youth still fall short of living up to the desired level of physical activity. The mode of transportation plays a pivotal role in physical activity, yet its relationship is poorly elucidated. The aim of the study is to explore the relationship between the types of transportation and the level of physical activity among senior high school students aged 16–18 from the University of Santo Tomas.Methods and analysis This will be an observational, cross-sectional, analytical study design. Participants’ demographics and anthropometric measurements such as height, weight and hip and waist circumferences will be collected. To measure the variables of interest, the International Physical Activity Questionnaire and Global Physical Activity Questionnaire will be used. Descriptive statistics will be used to characterise the samples using frequency, mean, median and SD, while inferential statistics such as analysis of variance for comparison and Pearson’s and Spearman for correlation will be used. All analysis will be done using IBM Statistical Packages for Social Sciences V.23 with the significant level set at alpha 0.05.Ethics and dissemination Ethical approval was obtained from the University of Santo Tomas—College of Rehabilitation Sciences Ethics Review Committee with the protocol number SI-2023–029. The study will comply with the principles of the Declaration of Helsinki, Ethical Guidelines on Health-Related Social Research of the Philippine Health Research Ethics Board and the Data Privacy Act 2012. All results, regardless of outcome, whether positive or negative, will be accessible through publication and by reporting to the participant through email and other relevant authorities.

DOAJ Open Access 2025
Weathering the Storm: Dynamic Capabilities and Supply Chain Agility in Supply Chain Resilience

Marie Legg, Reginald A. Silver, Sungjune Park

<i>Background</i>: Despite growing interest in supply chain resilience (SCRes), theoretical overlap between dynamic capabilities (DC) and supply chain agility (SCA) has complicated empirical analysis of their distinct roles. Additionally, the contextual role of information asymmetry in shaping resilience remains underexplored. This study addresses both issues by modeling DC hierarchically and examining IA as a moderator. <i>Methods</i>: Data were collected through a cross-sectional survey of 157 U.S.-based supply chain professionals. Partial least squares structural equation modeling (PLS-SEM) was used to examine the relationships among DC, SCA, IA, and SCRes. <i>Results</i>: SCA was a strong, direct predictor of SCRes. In contrast, DC showed no direct effect in the full model; however, in a hierarchical component model (HCM), DC, a higher-order construct, emerged as significant predictor of SCRes. IA exerted a dual negative influence: it directly weakened SCRes and negatively moderated the relationship between DC and SCRes. <i>Conclusions</i>: This study makes two novel contributions. First, it resolves ambiguity between DC and SCA by empirically modeling DC as a higher-order construct that encompasses but remains distinct from SCA. Second, it introduces IA as a multidimensional barrier to resilience, demonstrating its direct and interactive effects. These findings provide new insight into capability design and contextual adaptation for SCRes in uncertain, information-constrained environments.

Transportation and communication, Management. Industrial management
S2 Open Access 2019
Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs

Lixia Xie, Ying Ding, Hongyu Yang et al.

The modern intelligent transportation system brings not only new opportunities for vehicular Internet of Things (IoT) services but also new challenges for vehicular ad-hoc networks (VANETs). Apart from enhanced network performance, a practical and reliable security scheme is needed to handle the trust management while preserving user privacy at the same time. The emerging 5G mobile communication system is viewed as a prominent technology for ultra-reliable, low-latency wireless communication services. Furthermore, incorporating software-defined network (SDN) architecture into the 5G-VANET enables global information gathering and network control. Hence, real-time IoT services on transportation monitoring and reporting can be well supported. Both pave the way for an innovative vehicular security scheme. This paper investigates the security and privacy issue in the transportation system and the vehicular IoT environment in SDN-enabled 5G-VANET. Due to the decentralized and immutable characteristics of blockchain, a blockchain-based security framework is designed to support the vehicular IoT services, i.e., real-time cloud-based video report and trust management on vehicular messages. This paper explicitly illustrates the SDN-enabled 5G-VANET model and the scheduling procedures of the blockchain-based framework. The numerical simulation results also show that malicious vehicular nodes or messages can be well detected while the overhead and impact on the network performance are acceptable for large-scale scenarios. Through case studies and theoretical analysis, we demonstrate our design substantially guarantees a secure and trustworthy vehicular IoT environment with user privacy preserved.

195 sitasi en Computer Science
S2 Open Access 2019
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid, Palak Bagga, A. Das et al.

Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments to the passengers to improve traffic safety and efficiency, and generate a more enjoyable driving and riding environment. Fog cloud-based IoV is another variant of mobile cloud computing where vehicular cloud and Internet can co-operate in more effective way in IoV. However, more increasing dependence on wireless communication, control, and computing technology makes IoV more dangerous to prospective attacks. For secure communication among vehicles, road-side units, fog and cloud servers, we design a secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV. In the designed AKM-IoV, after mutual authentication between communicating entities in IoV they establish session keys for secure communications. AKM-IoV is tested for its security analysis using the formal security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool. The practical demonstration of AKM-IoV is shown using the NS2 simulation. In addition, a detailed comparative study is conducted to show the efficiency and functionality and security features supported by AKM-IoV as compared to other existing recent protocols.

194 sitasi en Computer Science
S2 Open Access 2019
Tree-Based Intelligent Intrusion Detection System in Internet of Vehicles

Li Yang, Abdallah Moubayed, Ismail Hamieh et al.

The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures. However, AVs and Internet of Vehicles (IoV) are vulnerable to different types of cyber-attacks such as denial of service, spoofing, and sniffing attacks. In this paper, an intelligent intrusion detection system (IDS) is proposed based on tree-structure machine learning models. The results from the implementation of the proposed intrusion detection system on standard data sets indicate that the system has the ability to identify various cyber-attacks in the AV networks. Furthermore, the proposed ensemble learning and feature selection approaches enable the proposed system to achieve high detection rate and low computational cost simultaneously.

191 sitasi en Computer Science, Mathematics
S2 Open Access 2022
Designing Low-PAPR Waveform for OFDM-based RadCom Systems

Yixuan Huang, Su Hu, Shiyong Ma et al.

This paper is focused on the fusion of radar and wireless communication, called RadCom, which has been extensively studied in recent years for future intelligent transportation systems. We propose a new waveform design algorithm for reducing peak-to-average power ratio (PAPR) in OFDM-based RadCom systems. We consider a flexible and generic RadCom structure in which a number of non-contiguous sub-bands for data transmission are located within a large contiguous spectrum band for radar detection/sensing. New RadCom waveforms with low PAPR are obtained by carrying out optimization over those subcarriers which are complementary to the communication bands. As an application of the majorization-minimization (MM) optimization method, our major contribution is an l-norm cyclic algorithm which is capable of efficiently reducing the maximum PAPR of RadCom waveforms. We show by numerical simulation results that significant performance enhancements can be achieved compared to OFDM RadCom waveforms from legacy approaches.

88 sitasi en Computer Science
S2 Open Access 2018
Distributed conflict-free cooperation for multiple connected vehicles at unsignalized intersections

Biao Xu, Shen Li, Yougang Bian et al.

Abstract Connected vehicles will change the modes of future transportation management and organization, especially at intersections. In this paper, we propose a distributed conflict-free cooperation method for multiple connected vehicles at unsignalized intersections. We firstly project the approaching vehicles from different traffic movements into a virtual lane and introduce a conflict-free geometry topology considering the conflict relationship of involved vehicles, thus constructing a virtual platoon. Then we present the modeling of communication topology to describe two modes of information transmission between vehicles. Finally, a distributed controller is designed to stabilize the virtual platoon for conflict-free cooperation at intersections. Numerical simulations validate the effectiveness of this method.

211 sitasi en Computer Science
S2 Open Access 2023
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems

Jianfei Sun, Guowen Xu, Tianwei Zhang et al.

As an increasingly prevalent technology in intelligent autonomous transportation systems, autonomous vehicle platoon has been indicated the ability to significantly reduce fuel consumption as well as heighten highway safety and throughput. However, existing efforts rarely focus on protecting data confidentiality and authenticity in autonomous vehicle platoons. How to ensure secure and high-fidelity platoon-level communication is still in its infancy. This paper makes the first attempt for efficient and secure communication across autonomous vehicle platoons. Specifically, we present PDSM-FC, the first privacy-preserving data share mechanism with flexible cross-domain authorization over distinctive platoons. The key insight of PDSM-FC is the design of a new ciphertext conversion technique, which allows a ciphertext to be easily converted into another type of ciphertext, facilitating efficient access by all entities holding the legitimate authorization. As a result, PDSM-FC can achieve high-fidelity data communication between two unique platoons in ciphertext, so as to complete specific tasks including platoon integration. Rigorous security analysis shows that PDSM-FC is secure against various attacks such as collusion, forgery and chosen-plaintext attacks. Moreover, theoretical evaluation and extensive experiments demonstrate the practicability of PDSM-FC in terms of functionality, storage and computation overheads.

43 sitasi en Computer Science
S2 Open Access 2023
IMFOCA-IOV: Intelligent Moth Flame Optimization based Clustering Algorithm for Internet of Vehicle

Preeti Rani, Rohit Sharma

Intelligent transportation systems (ITS) are receiving much attention today because of their significant effect on transportation safety, efficiency, and convenience. The Vehicle ad hoc networks (VANETs) in the ITS network are enhanced through the Internet of Vehicles (IOV), a continuation of the Internet of Things (IoT). In the IOV paradigm, the network's topology is extremely dynamic, and data is transmitted using 5G cellular communication. This work proposes an intelligent moth flame optimization-based clustering algorithm (IMFOCA) for the IOVs (IMFOCA-IOV). The IMFOCA-IOV algorithm provides maximum coverage for the IOV node with minimum cluster heads (CHs) required for routing. Simulation results are delivered to confirm that the IMFOCA-IOV algorithm can decrease the power consumption of IOV. The proposed IMFOCA-IOV algorithm performed better than CACONET, GWOCNET CLPSO, and MOPSO algorithms regarding the number of clusters and transmission range.

43 sitasi en Computer Science
S2 Open Access 2023
An Overview of Current Challenges and Emerging Technologies to Facilitate Increased Energy Efficiency, Safety, and Sustainability of Railway Transport

Z. Kljaic, D. Pavković, Mihael Cipek et al.

This article presents a review of cutting-edge technologies poised to shape the future of railway transportation systems, focusing on enhancing their intelligence, safety, and environmental sustainability. It illustrates key aspects of the energy-transport-information/communication system nexus as a framework for future railway systems development. Initially, we provide a review of the existing challenges within the realm of railway transportation. Subsequently, we delve into the realm of emerging propulsion technologies, which are pivotal for ensuring the sustainability of transportation. These include innovative solutions such as alternative fuel-based systems, hydrogen fuel cells, and energy storage technologies geared towards harnessing kinetic energy and facilitating power transfer. In the following section, we turn our attention to emerging information and telecommunication systems, including Long-Term Evolution (LTE) and fifth generation New Radio (5G NR) networks tailored for railway applications. Additionally, we delve into the integral role played by the Industrial Internet of Things (Industrial IoT) in this evolving landscape. Concluding our analysis, we examine the integration of information and communication technologies and remote sensor networks within the context of Industry 4.0. This leveraging of information pertaining to transportation infrastructure promises to bolster energy efficiency, safety, and resilience in the transportation ecosystem. Furthermore, we examine the significance of the smart grid in the realm of railway transport, along with the indispensable resources required to bring forth the vision of energy-smart railways.

36 sitasi en Computer Science
DOAJ Open Access 2024
Interoperation Plan for City Railway CBTC and CTCS-2

TANG Kailin, JIANG Qingyang, FENG Haonan et al.

Objective The research is specially carried out aiming to meet the operational requirements for interoperability between city railway CBTC (communication-based train control) and railway CTCS-2 (China train control system level 2) signaling systems. Method Based on the existing architectures of CBTC and CTCS-2 signaling systems, a fusion plan for these two is proposed. Two fusion plans are compared in terms of cost investment, impact scope, renovation difficulty, and applicable range. Ultimately, the fusion plan with on-board equipment that accommodates ground equipment of both signaling systems is chosen. The ground equipment design follows the principle of ′minimizing changes to CTCS equipment while adding or modifying CBTC equipment′, and the on-board equipment design follows the principle of ′keeping ATP (automatic train protection) core equipment independent while maximizing the reuse of peripheral components′. Under the premises of ensuring system operational efficiency and compliance with CTCS-2 standards, two conversion plans are proposed, ′train conversion from CTCS-2 line to CBTC line′ and ′train conversion from CBTC line to CTCS-2 line′, aiming to achieve bidirectional interoperability between city railway CBTC and CTCS-2 systems. Result & Conclusion The research results indicate that the implementation of the chosen plan can enhance city railway transportation efficiency, optimize transportation organization and management, improve the network functionality of rail transit, and promote coordinated development between central cities and surrounding areas.

Transportation engineering
DOAJ Open Access 2024
Cellular Network From the Sky: Toward People-Centered Smart Communities

Baha Eddine Youcef Belmekki, Abdulah Jeza Aljohani, Saud A. Althubaity et al.

The concept of the smart city relies on connectivity and is expected to revolutionize urban living and create sustainable cities. However, while smart cities continue to evolve, small towns, suburbs, and villages lack basic communication infrastructure. This phenomenon exacerbates inequality and perpetuates a growing digital divide. Hence, it is imperative to also concentrate on these communities by designing strategies to extend essential services to them and drive the development of smart communities. High-altitude platform stations (HAPS) are a key enabling technology for such a concept. They fly in the stratosphere and offer extensive connectivity coverage, are cost-effective, and powered by solar energy and hydrogen. To demonstrate the potential of HAPS in enabling smart communities, the world&#x2019;s first-ever fifth-generation (5G) trial using HAPS was conducted. The experiment showed that HAPS provided high data rates and ubiquitous 5G coverage from the stratosphere in different scenarios. The main requirements of smart communities, such as ensuring equity and inclusion, intelligent transportation systems, and a blue economy were successfully addressed. We also highlight the main benefits of HAPS in enabling smart communities, as well as the involvement of communities in the co-design of such solutions. Finally, additional applications are presented, along with the main key enabling technologies.

Telecommunication, Transportation and communications
DOAJ Open Access 2024
Fusing Type -2 Neutrosophic in Decision-Making Methodology for Appreciation Blockchain Capabilities in Securing Environment of Vehicles Fog: Practice Realistic Scenarios

Alaa Salem, Mona Mohamed

Right now, Contemporary technologies have become imperative in many domains to achieve societal safety. As is practiced in transportation systems through merging information and communication technologies (ICTs) in transportation to be an intelligent sector. As well Internet of Vehicles (IoVs) for facilitating communication between vehicles for safe driving. Similarly, fog computing in Vehicular Ad Hoc Networking (VANET) contributes significantly to addressing timing and latency issues by enabling cloud services for nearby vehicles. Nonetheless, there are hazards of cyber-attacks on vehicles in VFN, which makes it uneasy to disclose personal information to unidentified fog devices. Consequently, an online criminal might target vehicles with counterfeit attacks. Herein, blockchain technology (BCT) is another technology of ICTs and is provided in this study as a handler for the problem of cyber-attacks. Due to BCT’s characteristics of permanent, or immutable, peer-to-peer, decentralized, and distributed ledger technology. Thereby, this study contributes to constructing an appraiser model for appraising BCT as the secured methodology in VFN. Multi-criteria decision-making (MCDM) techniques such as entropy and weighted sum method (WSM) have been harnessed in the appraising process motivated by the uncertainty theory of Type-2 neutrosophic sets (T2NSs). The appraiser model’s findings indicated that BCT 5(A5) was the optimal candidate based on its ranking. In contrast, BCT 4 (A4) is the worst one.

Mathematics, Electronic computers. Computer science
DOAJ Open Access 2024
System architecture and key technologies of intelligent, safe and efficient mining for rockburst coal seams

Zhigang DENG, Yunpeng LI, Shankun ZHAO et al.

At present, the prevention and control of rock burst in coal mines relies on the monitoring and manual analysis of stress, energy, displacement and other data, and implements targeted prevention measures accordingly. After nearly 100 years of unremitting research and practice, remarkable progress has been made in this field in terms of theoretical depth, technological innovation and equipment upgrading. However, in the field of source control and intelligent prevention and control, there are still many challenges and problems. In the selection of the top ten industrial and technological issues by the China Association for Science and Technology in 2023, the expert group unanimously selected “how to achieve intelligent, safe, and efficient mining of coal seams under rock pressure” as a key topic. It points out the direction for the future development of mine burst disaster prevention and control. The intelligent mining of rock burst coal seam is not only a technical problem, but also a complex system engineering problem. Based on more than 40 years of theoretical accumulation and engineering practice, the framework and key technologies of intelligent, safe and efficient coal seam mining system are proposed. First of all, digital twin technology is used to build a fine digital model, deeply detect and analyze the geological structure of the area where the mine is located, accurately measure the characteristics of the regional geostress field and the physical and mechanical properties of coal and rock, and rely on advanced algorithms to carry out engineering distribution of formation change information to achieve “transparency” of geological information. Secondly, in the digital model, the excavation process of shaft, roadway and working face is simulated according to the mine mining design scheme. At the same time, the real-time data of various monitoring systems in the well and underground are combined with the dynamic update and calculation of the mine digital model, which can not only review and analyze the historical engineering effects, but also predict and deduce the impact of future engineering activities. Thirdly, with the help of deep learning and AI technology, the computer can independently learn the holographic data of the mine, make independent decisions on mining and prevention engineering measures according to the real-time changes of monitoring data and engineering activities, and build a standardized communication technology system to realize the interconnection of various equipment in the mine and create an intelligent mine ecosystem. Finally, the intelligent mining equipment control module is developed. Under the guidance of computer intelligent decision, the intelligent control of all kinds of equipment in the whole mine is realized. By independently adjusting the timing of coal mining and pressure relief, optimizing the running speed of coal mining, transportation, lifting and other equipment, fully realizing the intelligent mining of rock burst coal seams, all these provide strong guarantee for the safe production and efficient operation of coal mines.

Mining engineering. Metallurgy
S2 Open Access 2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks

Mimi Ma, De-biao He, Huaqun Wang et al.

The maturity of cloud computing, the Internet of Things technology, and intelligent transportation system has promoted the rapid development of vehicular ad-hoc networks (VANETs). To keep pace with real-world demands (mobility, low latency, etc.) in a practical VANETs deployment, there have been attempts to integrate fog computing with VANETs. To facilitate secure interaction in fog-based VANETs, we design a new authenticated key agreement protocol without bilinear pairing. This protocol achieves mutual authentication, generates a securely agreed session key for secret communication, and supports privacy protection. We also give a strict formal security proof and demonstrate how the proposed protocol meets the security requirements in the fog-based VANETs. We then evaluate the efficiency of the proposed protocol, and it shows the practicality of the protocol.

161 sitasi en Computer Science

Halaman 25 dari 82423