-
Safety-Oriented Calibration and Evaluation of the Intelligent Driver Model
Authors:
Kingsley Adjenughwure,
Arturo Tejada,
Pedro F. V. Oliveira,
Jeroen Hogema,
Gerdien Klunder
Abstract:
Many car-following models like the Intelligent Driver Model (IDM) incorporate important aspects of safety in their definitions, such as collision-free driving and keeping safe distances, implying that drivers are safety conscious when driving. Despite their safety-oriented nature, when calibrating and evaluating these models, the main objective of most studies is to find model parameters that mini…
▽ More
Many car-following models like the Intelligent Driver Model (IDM) incorporate important aspects of safety in their definitions, such as collision-free driving and keeping safe distances, implying that drivers are safety conscious when driving. Despite their safety-oriented nature, when calibrating and evaluating these models, the main objective of most studies is to find model parameters that minimize the error in observed measurements like spacing and speed while studies specifically focused on calibrating and evaluating unobserved safe behavior captured by the parameters of the model are scarce. Most studies on calibration and evaluation of the IDM do not check if the observed driving behavior (i.e. spacing) are within the model estimated unobserved safety thresholds (i.e. desired safety spacing) or what parameters are important for safety. This limits their application for safety driven traffic simulations. To fill this gap, this paper first proposes a simple metric to evaluate driver compliance with the safety thresholds of the IDM model. Specifically, we evaluate driver compliance to their desired safety spacing, speed and safe time gap. Next, a method to enforce compliance to the safety threshold during model calibration is proposed. The proposed compliance metric and the calibration approach is tested using Dutch highway trajectory data obtained from a driving simulator experiment and two drones. The results show that compliance to the IDM safety threshold greatly depends on braking capability with a median compliance between 38% and 90% of driving time, indicating that drivers can only partially follow the IDM safety threshold in reality.
△ Less
Submitted 19 July, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Brazilian COVID-19 data streaming
Authors:
Nívea B. da Silva,
Luis Iván O. Valencia,
Fábio M. H. S. Filho,
Andressa C. S. Ferreira,
Felipe A. C. Pereira,
Guilherme L. de Oliveira,
Paloma F. Oliveira,
Moreno S. Rodrigues,
Pablo I. P. Ramos,
Juliane F. Oliveira
Abstract:
We collected individualized (unidentifiable) and aggregated openly available data from various sources related to suspected/confirmed SARS-CoV-2 infections, vaccinations, non-pharmaceutical government interventions, human mobility, and levels of population inequality in Brazil. In addition, a data structure allowing real-time data collection, curation, integration, and extract-transform-load proce…
▽ More
We collected individualized (unidentifiable) and aggregated openly available data from various sources related to suspected/confirmed SARS-CoV-2 infections, vaccinations, non-pharmaceutical government interventions, human mobility, and levels of population inequality in Brazil. In addition, a data structure allowing real-time data collection, curation, integration, and extract-transform-load processes for different objectives was developed. The granularity of this dataset (state- and municipality-wide) enables its application to individualized and ecological epidemiological studies, statistical, mathematical, and computational modeling, data visualization as well as the scientific dissemination of information on the COVID-19 pandemic in Brazil.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
Network Coding Security: Attacks and Countermeasures
Authors:
Luísa Lima,
João P. Vilela,
Paulo F. Oliveira,
João Barros
Abstract:
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the diffe…
▽ More
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the differences between attack scenarios in which network coding is particularly vulnerable and other relevant cases in which the intrinsic properties of network coding allow for stronger and more efficient security solutions than classical routing. Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution. Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.
△ Less
Submitted 8 September, 2008;
originally announced September 2008.