You are previewing Transportation Systems and Engineering.
O'Reilly logo
Transportation Systems and Engineering

Book Description

From driverless cars to vehicular networks, recent technological advances are being employed to increase road safety and improve driver satisfaction. As with any newly developed technology, researchers must take care to address all concerns, limitations, and dangers before widespread public adoption. Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications addresses current trends in transportation technologies, such as smart cars, green technologies, and infrastructure development. This multivolume book is a critical reference source for engineers, computer scientists, transportation authorities, students, and practitioners in the field of transportation systems management.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Transportation Risk Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PIPELINES TRANSPORTATION
      5. TRANSPORTATION BY TANKERS
      6. TRANSPORTATION BY GAS CARRIERS
      7. RAILROAD TANK CARS TRANSPORTATION
      8. TANK TRUCKS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. REFERENCES
      12. ADDITIONAL READING
      13. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Petroleum Industry Environmental Performance and Risk
      1. ABSTRACT
      2. INTRODUCTION
      3. OIL SPILL TRENDS
      4. SOURCES AND CAUSES OF POLLUTION IN PETROLEUM INDUSTRY
      5. ENVIRONMENTAL IMPACTS OF PETROLEUM INDUSTRY AND CONSEQUENCES OF OIL SPILL
      6. ENVIRONMENTAL RISK ASSESSMENT OF PETROLEUM INDUSTRYS’ ACTIVITIES
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Risk Due to Wellbore Instability
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CAUSES OF WELLBORE INSTABILITY
      4. WELLBORE INSTABILITY RISK ASSESSMENT
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Risk Reduction in Natural Disaster Management through Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. FRAMING THE DISCUSSION
      4. RESEARCH AGENDA
      5. CONCLUSION
      6. REFERENCES
    5. Chapter 5: Knowledge Management in Support of Enterprise Risk Management
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL BACKGROUND
      4. THE RISK MANAGEMENT INFORMATION SYSTEM (RMIS)
      5. RESEARCH MODEL AND HYPOTHESES
      6. RESEARCH METHODOLOGY
      7. RESULTS
      8. DISCUSSION AND IMPLICATIONS
      9. CONCLUSION
      10. REFERENCES
    6. Chapter 6: Oil and Gas Storage Tank Risk Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STORAGE TANKS
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
    7. Chapter 7: Employing Traffic Lights as Road Side Units for Road Safety Information Broadcast
      1. ABSTRACT
      2. INTRODUCTION
      3. ITS AND VEHICULAR COMMUNICATION
      4. IMPORTANT SERVICES IN VEHICULAR ENVIRONMENT
      5. INTEGRATION OF COMMUNICATION SYSTEMS WITH ITS ARCHITECTURE
      6. VLC IN ITS
      7. EXPLORING A LED-BASED TRAFFIC LIGHT AS ROAD SIDE UNIT
      8. VLC SYSTEM ARCHITECTURE FOR INFORMATION BROADCAST
      9. RECENT DIRECTIONS AND CHALLENGES
      10. CONCLUSION
      11. REFERENCES
      12. ADDITIONAL READING
    8. Chapter 8: Risk Requirement for Multi-Hybrid Renewable Energy for Marine System
      1. ABSTRACT
      2. INTRODUCTION
      3. ENERGY, ENVIRONMENT, AND SUSTAINABLE DEVELOPMENT
      4. ENERGY CONSUMPTION, DEMAND AND SUPPLY
      5. EMERGING RENEWABLE ENERGY SYSTEM
      6. ENERGY SUPPLY AND DEMAND MATCHING
      7. HYBRID SYSTEM
      8. RELIABILITY AND DECISION SUPPORT FRAMEWORK
      9. REFERENCES
    9. Chapter 9: The Impact of Traffic Information Acquisition on the Traffic Conditions of the Athens Greater Area
      1. ABSTRACT
      2. INTRODUCTION
      3. FINDINGS FROM THE LITERATURE
      4. MODELING FRAMEWORK
      5. DATA COLLECTION AND DESCRIPTIVE STATISTICS
      6. MODEL ESTIMATION RESULTS
      7. MODEL APPLICATION
      8. POLICY IMPLICATIONS
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
    10. Chapter 10: Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INTRUSION IN VANETS
      5. INTRUSION DETECTION ON PHY LAYER
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS & DEFINITIONS
      11. APPENDIX: REVIEW QUESTIONS
    11. Chapter 11: Pareto Evolutionary Optimization of Joint Network Design and Pricing Strategies Related to Emissions in Urban Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL FOUNDATIONS
      4. COMPUTATIONAL RESULTS AND DISCUSSION
      5. CONCLUSION AND OUTLOOK
      6. REFERENCES
    12. Chapter 12: Project Risk Management
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHOD
      5. RESULTS AND DISCUSSION
      6. CONCLUSION AND RECOMMENDATIONS
      7. REFERENCES
    13. Chapter 13: Privacy Protection in Vehicular Ad-Hoc Networks
      1. ABSTRACT
      2. 1. INTRODUCTION AND MOTIVATION
      3. 2. STATE OF THE ART
      4. 3. SYSTEM MODEL
      5. 4. THREAT MODEL AND REQUIREMENTS
      6. 5. OUR PRIVACY-PRESERVING SCHEME
      7. 6. PRIVACY ANALYSIS: MODEL 1
      8. 7. PRIVACY ANALYSIS: MODEL 2
      9. 8. SIMULATION RESULTS
      10. 9. CONCLUDING REMARKS AND DIRECTIONS FOR FUTURE WORK
      11. REFERENCES
    14. Chapter 14: Passenger Train Delay Classification
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. PASSENGER TRAIN DELAY
      4. 3. HYBRID CLASSIFICATION METHOD
      5. 4. PREDICTION RESULT
      6. 5. CONCLUSION
      7. REFERENCES
    15. Chapter 15: Managing Information for a Risk Based Approach to Stakeholder Management
      1. ABSTRACT
      2. INTRODUCTION
      3. ESTIMATING STAKEHOLDER SALIENCE
      4. STAKEHOLDER MANAGEMENT STRATEGY
      5. PROCESS INTEGRATION
      6. CONCLUSION
      7. REFERENCES
    16. Chapter 16: Simulation-Based Scheduling of Waterway Projects Using a Parallel Genetic Algorithm
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. PROBLEM STATEMENT
      5. PARALLEL GENETIC ALGORITHM
      6. NUMERICAL EXPERIMENTS
      7. CONCLUSION AND FUTURE STUDIES
      8. ACKNOWLEDGMENT
      9. REFERENCES
  7. Section 2: Frameworks and Methodologies
    1. Chapter 17: Methodology for Risk Assessment and Costs Associated with Risk Occurrence in E-Government Projects
      1. ABSTRACT
      2. INTRODUCTION
      3. STATE OF THE ART
      4. RISK ASSESSMENT METHODOLOGY
      5. CONCLUSION
      6. FURTHER RESEARCH DIRECTIONS
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 18: A Link-Node Nonlinear Complementarity Model for a Multiclass Simultaneous Transportation Dynamic User Equilibria
      1. ABSTRACT
      2. INTRODUCTION
      3. THE NONLINEAR COMPLEMENTARITY FORMULATION FOR DUE
      4. MULTICLASS SIMULTANEOUS TRANSPORTATION EQUILIBRIUM MODEL (MSTEM)
      5. DISCRETE-TIME DOMAIN FINITE- DIMENSIONAL NONLINEAR COMPLEMENTARITY DUE MULTICLASS SIMULTANEOUS TRANSPORTATION EQUILIBRIUM MODEL (DMSTEM)
      6. SOLUTION ALGORITHM
      7. CONCLUSION AND FUTURE RESEARCH
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. APPENDIX
    3. Chapter 19: Proactive Security Protection of Critical Infrastructure
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY, RISK, THREAT AND VULNERABILITY ASSESSMENT (SRTVA) PROCESS
      5. THE ROLE OF INTELLIGENCE
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
    4. Chapter 20: A Real Time Topological Map Matching Methodology for GPS/GIS-Based Travel Behavior Studies
      1. ABSTRACT
      2. INTRODUCTION
      3. USE OF GPS MEASUREMENTS FOR TRAVEL BEHAVIOR
      4. THE MAP MATCHING PROBLEM AND EXISTING METHODOLOGIES
      5. REAL TIME METHODOLOGY
      6. ILLUSTRATIVE EXAMPLE OF A MAP MATCHING PROBLEM AND RESOLUTION
      7. APPLICATION OF REAL TIME MAP MATCHING
      8. CONCLUSION AND FINAL REMARKS
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    5. Chapter 21: STAR-TRANS Modeling Language
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LITERATURE REVIEW ON RISK ASSESSMENT TOOLS AND METHODOLOGIES
      5. THE STAR-TRANS MODELING LANGUAGE
      6. REFERENCE IMPLEMENTATION: STAR-TRANS IMPACT ASSESSMENT TOOL (IAT)
      7. FUTURE WORK
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    6. Chapter 22: Proposed Isomorphic Graph Model for Risk Assessment on a Unix Operating System
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODS
      5. RESULTS AND DISCUSSION
      6. CONCLUSION
      7. REFERENCES
    7. Chapter 23: The Role of a Sustainability Informatics Framework in Transportation Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH BACKGROUND
      4. THE SUSTAINABILITY INFORMATICS FRAMEWORK
      5. THE SUSTAINABILITY INFORMATICS FRAMEWORK IN ACTION: TRANSPORTATION
      6. DISCUSSION AND RESEARCH PROPOSITIONS
      7. RESEARCH LIMITATIONS AND FUTURE DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
    8. Chapter 24: Meta-Modeling Based Secure Software Development Processes
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RELATED WORKS
      4. 3. PROPOSED APPROACH
      5. 4. APPROACH EXPERIMENTATION
      6. 5. CONCLUSION AND FUTURE WORK
      7. REFERENCES
    9. Chapter 25: Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors
      1. ABSTRACT
      2. INTRODUCTION
      3. MATURITY AND PROCESS CAPABILITY MODELS
      4. CIP TOOLS AND FRAMEWORKS AS ENABLERS OF PROCESS CAPABILITY AND RESILIENCE
      5. PROCESS CAPABILITY MODELS FOR THE ELECTRICITY GENERATING SECTOR
      6. RECOMMENDATIONS FOR FUTURE RESEARCH
      7. CONCLUSION
      8. REFERENCES
    10. Chapter 26: ONTO-KMS-TEC
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. ONTOLOGY
      5. EDUCATIONAL ONTOLOGY
      6. ONTOLOGY CONSTRUCTION METHOD
      7. INTELLIGENT E-LEARNING ENVIRONMENT
      8. ROLE OF DECISION TREE
      9. MULTIDIMENSIONAL LEARNING ENVIRONMENT
      10. CONCLUSION
      11. REFERENCES
    11. Chapter 27: Dynamic FCFS ACM Model for Risk Assessment on Real Time Unix File System
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TECHANICAL LITERATURE SURVEY AND REVIEW
      4. 3. PROBLEM STATEMENT: ACTION PLAN
      5. 4. PROPOSED FCFS ACM MODEL
      6. 5. SERVICES
      7. 6. FUTURE WORK
      8. 7. CONCLUSION
      9. REFERENCES
    12. Chapter 28: Critical Risk Path Method
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. PROBLEM STATEMENT
      5. 4. STUDY RATIONALE
      6. 5. COST / BENEFIT ANALYSES FOR MATERIAL AND EQUIPMENT DELIVERY APPROACHES
      7. 6. MATERIAL AND EQUIPMENT DEMAND AND SUPPLY: JUST IN TIME DELIVERY OR LEAN WAREHOUSING
      8. 7. RISK AND DEMAND-DRIVEN CONSTRUCTION PROCUREMENT STRATEGY FORMATION
      9. 8. A STUDY OF CRITICAL RISK PATH SCENARIOS
      10. 9. RECOMMENDATIONS
      11. 10. CONCLUSION
      12. REFERENCES
    13. Chapter 29: An Effective Methodology for Road Accident Data Collection in Developing Countries
      1. ABSTRACT
      2. INTRODUCTION
      3. ACCIDENT DATA COLLECTION MECHANISM IN DEVELOPING NATIONS
      4. NGO BASED DATA COLLECTION: KARACHI CASE STUDY
      5. SUCCESS STORIES
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCEs
      9. KEY TERMS AND DEFINITIONS
    14. Chapter 30: The Challenges of Obtaining Credible Data for Transportation Security Modeling
      1. ABSTRACT
      2. INTRODUCTION
      3. CASE DESCRIPTION
      4. CURRENT CHALLENGES FACING THE ORGANIZATION
      5. SOLUTIONS AND RECOMMENDATIONS
      6. DISCLAIMER
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    15. Chapter 31: Analysis of Risk and Reliability in Project Delivery Methods
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM STATEMENT
      4. ALTERNATIVES AND OBJECTIVES
      5. ANALYSIS METHODS
      6. CASE STUDY
      7. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. APPENDIX
    16. Chapter 32: Rural Intelligent Public Transportation System Design
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. RURAL INTELLIGENT PUBLIC TRANSPORTATION SYSTEM
      5. RURAL PUBLIC TRANSPORTATION IN IRAN: CASE STUDY
      6. EVALUATION AND RESULTS
      7. CONCLUSION
      8. REFERENCES
      9. APPENDIX A: RESOURCE UTILIZATIONS IN VARIOUS SIMULATIONS
      10. APPENDIX B
    17. Chapter 33: GeneticTKM
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE PROPOSED ALGORITHM
      4. 3. EXPERIMENTAL RESULTS
      5. 4. CONCLUSION
      6. REFERENCES
    18. Chapter 34: Agent-Based Modeling for Carpooling
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: LITERATURE OVERVIEW
      4. CO-TRAVELING SERVICES CONTEXT
      5. COOPERATION BY CARPOOLING
      6. AGENT-BASED MODEL TO EXERCISE ADVISOR SOFTWARE
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    19. Chapter 35: On-Board Unit Hardware and Software Design for Vehicular Ad-Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. STATE-OF-THE-ART
      4. ON-BOARD UNIT SYSTEM DESIGN
      5. OBU DEVICE APPLICATIONS AND PERFORMANCE ANALYSIS
      6. OPEN ISSUES FOR FUTURE RESEARCH
      7. CONCLUSION
      8. REFERENCES
  8. Section 3: Tools and Technologies
    1. Chapter 36: Enhancing DotProject to Support Risk Management Aligned with PMBOK in the Context of SMEs
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STATE OF THE ART
      5. ENHANCING DOTPROJECT TO SUPPORT RISK MANAGEMENT
      6. FIRST EVALUATION
      7. DISCUSSION
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    2. Chapter 37: A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. PATTERN-BASED RISK ANALYSIS
      5. 4. LESSONS LEARNED/DISCUSSION
      6. 5. TOOL SUPPORT
      7. 6. RELATED WORK
      8. 7. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    3. Chapter 38: Risk Evaluation in the Insurance Company Using REFII Model
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TOTAL MARKET SHARE GROWTH WITH PROFIT DECLINE
      5. RISK ASSESSMENT BASED ON TIME SERIES
      6. ANALYSIS RESULTS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 39: Seamless Communication to Mobile Devices in Vehicular Wireless Networks
      1. ABSTRACT
      2. VEHICULAR WIRELESS NETWORKS
      3. MOBILITY MODELS FOR VEHICULAR NETWORKS
      4. CLASSIFICATION OF MOBILITY MODELS
      5. MOBILITY MODEL FOR RAILWAY ENVIRONMENT
      6. LOCALIZATION
      7. FRAMEWORK FOR A HYBRID NETWORK FOR COMMUNICATION IN TRANSPORTATION SYSTEMS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    5. Chapter 40: Threatening the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A SECURE CLOUD
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    6. Chapter 41: Communication Networks to Connect Moving Vehicles to Transportation Systems to Infrastructure
      1. ABSTRACT
      2. FUNDAMENTALS OF WIRELESS COMMUNICATION
      3. CANDIDATE NETWORKS FOR CONNECTION OF TRANSPORTATION SYSTEMS
      4. NETWORK CHOICE FOR TRANSPORTATION SYSTEM
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    7. Chapter 42: RETRA
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE SURVEY
      4. SYSTEM ARCHITECTURE
      5. OPTIMIZATION PROBLEM
      6. RETRA CASE STUDY
      7. CONCLUSION AND FUTURE WORK
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. ENDNOTES
    8. Chapter 43: Financial Software as a Service
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND FOR FINANCIAL SOFTWARE AS A SERVICE
      4. 3. DEMONSTRATIONS AND SIMULATIONS FOR FSAAS
      5. 4. DISCUSSION
      6. 5. CONCLUSION AND FUTURE WORK
      7. REFERENCES
    9. Chapter 44: QoS-Aware Chain-Based Data Aggregation in Cooperating Vehicular Communication Networks and Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. STATE OF THE ART
      4. SYSTEM MODEL AND PROBLEM STATEMENT
      5. QUALITY OF SERVICE PARAMETERS
      6. A RELIABILITY-, ENERGY-, AND LATENCY-AWARE AGGREGATION IN LINEAR TOPOLOGY
      7. PERFORMANCE EVALUATION
      8. CONCLUSION AND OPEN ISSUES
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    10. Chapter 45: Cloud Computing for Global Software Development
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. ADVANTAGES AND CHALLENGES OF CLOUD COMPUTING FOR GSD
      5. 4. THE RISKS INVOLVED IN CLOUD COMPUTING
      6. 5. RISK PROCESS MODEL
      7. 6. RISK PROCESS MODEL EVALUATION
      8. 7. LIMITATIONS OF THE RISK PROCESS MODEL
      9. 8. RELATED WORK
      10. 9. CONCLUSION AND FUTURE WORK
      11. REFERENCES
    11. Chapter 46: An 802.11p Compliant System Prototype Supporting Road Safety and Traffic Management Applications
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. NETWORK INFRASTRUCTURE SUPPORTING MOBILE OPPORTUNISTIC COMMUNICATIONS
      4. 3. THE IEEE 802.11P NETWORKING FRAMEWORK AND PROTOCOL STACK
      5. 4. APPLICATIONS ENHANCING SAFETY
      6. 5. BENEFITS, FACTORS AFFECTING PENETRATION AND FUTURE WORK
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
      9. REFERENCES
    12. Chapter 47: Holistic and Law Compatible IT Security Evaluation
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. KORA
      5. COMMON CRITERIA OF PRODUCT SECURITY
      6. ISO 27001/IT-GRUNDSCHUTZ
      7. INTEGRATION OF KORA, COMMON CRITERIA AND ISO 27001/IT-GRUNDSCHUTZ
      8. APPLICATION: BALLOT SECRECY
      9. CONCLUSION AND DISCUSSION
      10. REFERENCES
    13. Chapter 48: Multi-System Integration Scheme for Intelligence Transportation System Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. MAIN DESIGN
      4. SYSTEM VERIFICATION
      5. CONCLUSION
      6. ACKNOWLEDGMENT
      7. REFERENCES
  9. Section 4: Cases and Applications
    1. Chapter 49: A Case Study for Business Integration as a Service
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE PROBLEMS
      4. 3. BUSINESS INTEGRATION AS A SERVICE (BIAAS) OVERVIEW
      5. 4. SYSTEM DESIGN AND ARCHITECTURE FOR BIAAS
      6. 5. CASE STUDY AT THE UNIVERSITY OF SOUTHAMPTON: ROI MEASUREMENT AS A SERVICES (RMAAS), THE FIRST MAJOR SERVICE OF THE BIAAS
      7. 6. CASE STUDY AT THE UNIVERSITY OF SOUTHAMPTON: RISK ANALYSIS AS A SERVICES (RAAAS), THE SECOND MAJOR SERVICE OF THE BIAAS
      8. 7. DISCUSSIONS
      9. 8. CONCLUSION
      10. REFERENCES
    2. Chapter 50: Decision Support Model for Fire Insurance Risk Analysis in a Petrochemical Case Study
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY
      5. RESULTS AND DISCUSSION
      6. CONCLUSION
      7. REFERENCES
    3. Chapter 51: Risk Analysis of Completion and Production Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. SAFETY IN COMPLETION AND PRODUCTION
      4. CONCLUSION
      5. REFERENCES
      6. ADDITIONAL READING
      7. KEY TERMS AND DEFINITIONS
    4. Chapter 52: Teaching Case for Addressing Risks with Strategies in an International Airport Project
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY
      5. DISCUSSION
      6. CONCLUSION
      7. REFERENCES
    5. Chapter 53: A Survey of Visual Traffic Surveillance Using Spatio-Temporal Analysis and Mining
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. TRAFFIC SURVEILLANCE AND RELEVANT SENSOR TECHNOLOGIES
      4. 3. ISSUES, CHALLENGES, AND TRENDS
      5. REFERENCES
    6. Chapter 54: A Sensitivity Analysis of Critical Genetic Algorithm Parameters
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW: GA APPLICATION IN HAO
      4. GA AND OPTIMIZATION PROCESS
      5. EXAMPLE STUDIES
      6. CONCLUSION AND FUTURE WORK
      7. ACKNOWLEDGMENT
      8. REFERENCES
    7. Chapter 55: Traffic Safety Implications of Travel Demand Management Policies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODOLOGY
      5. VALIDATION AND SENSITIVITY ANALYSIS
      6. RESULTS
      7. CONCLUSION AND DISCUSSION
      8. LIST OF ABBREVIATIONS
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    8. Chapter 56: Analysis of Passengers' Perception of Public Transport Quality and Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. THE EXAMINED PUBLIC TRANSPORT SYSTEMS
      4. OUTLINE OF THE QUALITY CONTROL PROGRAMS
      5. METHODOLOGY
      6. ANALYSIS
      7. MARKET SEGMENTATION
      8. CONCLUSION
      9. REFERENCES
    9. Chapter 57: Risk Analysis in the Process of Hydraulic Fracturing
      1. ABSTRACT
      2. INTRODUCTION
      3. HYDRAULIC FRACTURING PROCESS
      4. A FRACTURING RISK ANALYSIS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    10. Chapter 58: Assessing Human Reliability Behaviour from Use of Technology for Ships Navigating within Coastal Water
      1. ABSTRACT
      2. INTRODUCTION
      3. PASS WORK
      4. HUMAN ERROR AND ACCIDENTS IN WATERWAYS
      5. METHODOLOGY
      6. ACCIDENT DATA
      7. RESULTS AND DISCUSSION
      8. CONCLUSION
      9. REFERENCES
    11. Chapter 59: Using AIS Data for Navigational Risk Assessment in Restricted Waters
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODOLOGY
      5. RESULTS AND DISCUSSION
      6. CONCLUSION AND RECOMMENDATIONS
      7. ACKNOWLEDGMENT
      8. REFERENCES
    12. Chapter 60: Analysis of Pedestrian Road Crossing Behaviour in Urban Areas
      1. ABSTRACT
      2. INTRODUCTION
      3. METHODOLOGY AND DATA COLLECTION
      4. RESULTS
      5. CONCLUSION
      6. REFERENCES
    13. Chapter 61: Applying the Safety and Environmental Risk and Reliability Model (SERM) for Malaysian Langat River Collision Aversion
      1. ABSTRACT
      2. INTRODUCTION
      3. SAFETY AND ENVIRONMENTAL RISK FOR IWT
      4. TECHNIQUE OF RISK ANALYSIS
      5. RISK- AND RELIABILITY-MODELLING DATA REQUIREMENT
      6. TRAFFIC FREQUENCY ESTIMATION MODELLING
      7. RESULT PRESENTATION
      8. ALARP PRINCIPAL, RISK-ACCEPTABILITY CRITERIA, AND RISK CONTROL OPTION
      9. ADDITIONAL SYSTEM RISK AND RELIABILITY ANALYSIS
      10. BETWEEN RELIABILITY AND VALIDATION
      11. CONCLUSION
      12. REFERENCES
  10. Section 5: Issues and Challenges
    1. Chapter 62: General Approach to Risk Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. RISK ANALYSIS AND ASSESSMENT TECHNIQUES
      4. RISK ACCEPTANCE CRITERIA
      5. REFERENCES
      6. ADDITIONAL READING
      7. KEY TERMS AND DEFINITIONS
    2. Chapter 63: Genre-Based Approach to Assessing Information and Knowledge Security Risks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INITIAL EXPERIENCES
      5. DISCUSSION
      6. CONCLUSION AND FURTHER RESEARCH
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. ENDNOTES
    3. Chapter 64: A Software Tool to support Risks Analysis about what Should or Should Not go to the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURING SERVICES AND DIGITAL RESOURCES IN THE CLOUD IS MUCH MORE THAT ENCRYPTING AND FILTERING INFORMATION
      4. DIFFERENT MODELS OF CLOUDS PROVIDE DIFFERENT LEVELS OF SECURITY
      5. 2THECLOUD: A SOFTWARE TOOL THAT SUPPORTS THE ANALYSYS FOR CHOSING THE CLOUD TO USE
      6. 2THECLOUD: A SET OF REDUCED FUNCTIONS
      7. 2THECLOUD GENERAL PROCESS
      8. 2THE CLOUD STEP BY STEP
      9. USER’S METACOGNITIVE PROCESS THROUGHOUT 2THECLOUD
      10. STATISTICS AND DATA FILES GENERATED BY 2THECLOUD
      11. WHAT IS OFFERED BY 2THECLOUD
      12. 2THECLOUD RISKS ANALYSIS ATERNATIVES
      13. A PRIORI AND CALCULATED RISK APPROACH
      14. FUTURE RESEARCH DIRECTIONS
      15. CONCLUSION
      16. REFERENCES
      17. ADDITIONAL READING
      18. KEY TERMS AND DEFINITIONS
    4. Chapter 65: The Integrative Time-Dependent Modeling of the Reliability and Failure of the Causes of Drivers' Error Leading to Road Accidents
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CAUSAL REPRESENTATIONAL MODEL AND INSTANTANEOUS OCCURRENCE PATTERNS OF DRIVERS’ ERROR
      4. THE STOCHASTIC PREDICTION MODEL FOR RELIABILITY/UN-RELIABILITY OF TRANSPORTATION SYSTEMS
      5. THE PREDICTION ASSESSMENT METHODOLOGY OF DRIVERS’ FAILURE RATE DUE TO FATIGUE
      6. THE PREDICTION ASSESSMENT METHODOLOGY OF ROADS ENVIRONMENT FAILURE RATE
      7. THE PREDICTION ASSESSMENT METHODOLOGY OF DRIVERS’ FAILURE RATE DUE TO NON-FATIGUE FACTORS
      8. DISCUSSIONS AND CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    5. Chapter 66: Lost Circulation
      1. ABSTRACT
      2. INTRODUCTION
      3. LOST CIRCULATION ZONES AND CAUSES
      4. PREVENTIVE MEASURES
      5. LOCATING LOSS ZONES AND DETERMINING THE SEVERITY OF LOSS
      6. LOST CIRCULATION MATERIALS
      7. REMEDIAL PROCEDURES FOR LOSS CIRCULATION
      8. THE APPLICATION OF RISK ANALYSIS FOR LOST CIRCULATION
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    6. Chapter 67: Large-Scale Agent-Based Models for Transportation Network Management under Unplanned Events
      1. ABSTRACT
      2. INTRODUCTION
      3. AGENT-BASED MODELING IN TRANSPORTATION
      4. THE BUFFALO-NIAGARA TRANSIMS MODEL
      5. CALIBRATING THE MODEL FOR INCELEMENT WEATHER EVENTS
      6. MODEL APPLICATIONS
      7. CONCLUSION
      8. REFERENCES
    7. Chapter 68: Using Indicators to Monitor Security Risk in Systems of Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BASIC TERMINOLOGY AND DEFINITIONS
      4. METHODOLOGICAL APPROACH
      5. DEMONSTRATION OF STEP 1: DOCUMENT SYSTEM OF SYSTEMS
      6. DEMONSTRATION OF STEP 2: ANALYZE THE IMPACT OF SERVICE DEPENDENCIES ON RISK TO SECURITY OF PROVIDED SERVICES
      7. DEMONSTRATION OF STEP 3: IDENTIFY INDICATORS FOR SYSTEM OF SYSTEMS
      8. DEMONSTRATION OF STEP 4: SPECIFY DESIGN AND DEPLOYMENT OF IDENTIFIED INDICATORS FOR SYSTEM OF SYSTEMS
      9. RELATED WORK
      10. CONCLUSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
      14. ENDNOTE
    8. Chapter 69: A Survey of Wireless Backhauling Solutions for ITS
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. WIRELESS BACKHAULING SOLUTIONS
      5. HIPERLAN/2 TESTBED
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    9. Chapter 70: Landslides
      1. ABSTRACT
      2. INTRODUCTION
      3. LANDSLIDE IDENTIFICATION AND MAPPING
      4. LANDSLIDE INVESTIGATION
      5. LANDSLIDE MONITORING
      6. LANDSLIDE HAZARD AND RISK ASSESSMENT
      7. LANDSLIDE STABILIZATION AND REMEDIATION MEASURES
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    10. Chapter 71: WLAN Systems for Communication in Transportation Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. VEHICULAR AD-HOC NETWORKS
      4. PHYSICAL PHENOMENA AFFECTING VANETS’ PERFORMANCE
      5. INTRODUCTION TO THE INCUMBENT VANET SOLUTIONS
      6. CONCLUSION: ASSESSMENT OF VANET STRENGTHS AND WEAKNESSES
      7. REFERENCES
      8. ENDNOTES
    11. Chapter 72: Managing Risk in Small and Medium Enterprises (SMEs) Supply Chains' Using Quality Function Deployment (QFD) Approach
      1. ABSTRACT
      2. INTRODUCTION
      3. SMALL AND MEDIUM ENTERPRISES IN INDIA
      4. SUPPLY CHAIN RISKS: THE TAXONOMY
      5. RISK MITIGATION VARIABLES IN A SUPPLY CHAIN
      6. SUPPLY CHAIN HOUSE OF RISK
      7. CASE STUDY: APPLICATION OF THE PROPOSED METHODOLOGY
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
    12. Chapter 73: Workover Impact on Accidental Risk
      1. ABSTRACT
      2. INTRODUCTION
      3. WELL INTEGRITY
      4. COILED TUBING OPERATIONS
      5. SNUBBING OPERATIONS
      6. WIRELINE OPERATIONS
      7. PRODUCTION STRING CHANGE OPERATIONS
      8. RISK ASSESSMENT
      9. FUTURE RESEARCH DIRECTIONS
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
  11. Section 6: Emerging Trends
    1. Chapter 74: Evolution of Security Engineering Artifacts
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. SECURITY MODEL EVOLUTION
      4. 3. SECURITY REQUIREMENTS EVOLUTION
      5. 4. SECURITY ARCHITECTURE EVOLUTION
      6. 5. SECURE CODE EVOLUTION
      7. 6. SECURITY TEST EVOLUTION
      8. 7. SECURITY MONITORING
      9. 8. SECURITY RISK EVOLUTION
      10. 9. CONCLUSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
    2. Chapter 75: Adding Electric Vehicle Modeling Capability to an Agent-Based Transport Simulation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PRECEDING WORK
      5. THE TRANSPORTATION ENERGY SIMULATION FRAMEWORK
      6. MATSIM
      7. TES INTEGRATION WITH MATSIM
      8. MODULES
      9. CASE STUDY: CITY OF ZURICH
      10. FLEET DYNAMICS
      11. ENERGY CONSUMPTION MODEL
      12. TRAVEL DEMAND AND TRAFFIC SIMULATION MODEL
      13. POWER SYSTEM SIMULATION AND LOAD BALANCING
      14. SCENARIO OVERVIEW
      15. TES INTEGRATION AND SIMULATIONS
      16. RESULTS – ENERGY AND EMISSIONS
      17. RESULTS – DISTRIBUTION NETWORK
      18. DISCUSSION
      19. FUTURE WORK
      20. CONCLUSION
      21. ACKNOWLEDGMENT
      22. REFERENCES
      23. ADDITIONAL READING
    3. Chapter 76: A Threat Table Based Assessment of Information Security in Telemedicine
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. A THREAT TABLE METHOD
      5. 4. ILLUSTRATIVE CASE STUDY
      6. 5. APPLYING THE THREAT TABLE APPROACH
      7. 6. DISCUSSION
      8. 7. CONCLUSION
      9. REFERENCES
    4. Chapter 77: A New Method for Writing Assurance Cases
      1. ABSTRACT
      2. 2. RELATED WORK
      3. 3. A NEW METHOD FOR WRITING ASSURANCE CASES
      4. 4. EXAMPLE OF USING OUR METHOD
      5. 5. CONCLUSION
      6. REFERENCES
    5. Chapter 78: TraffCon
      1. ABSTRACT
      2. INTRODUCTION
      3. SPARSE ROADSIDE-VEHICLE NETWORKS
      4. TRAFFCON SYSTEM
      5. DATA EXCHANGE: TESTING
      6. CONCLUSION AND FUTURE WORKS
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    6. Chapter 79: A Novel Distributed QoS Control Scheme for Multi-Homed Vehicular Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM DESCRIPTION
      4. RELATED WORK
      5. VEHICLE-TO-INFRASTRUCTURE COMMUNICATIONS ARCHITECTURE
      6. PROPOSED E2E QOS SCHEME ARCHITECTURE
      7. LOCAL TRAFFIC LOAD BALANCING
      8. GLOBAL TRAFFIC LOAD BALANCING
      9. SIMULATION AND RESULTS
      10. RESEARCH DIRECTIONS
      11. SUMMARY
      12. REFERENCES
    7. Chapter 80: A New Design of Intelligent Traffic Signal Control
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE FIRST PROPOSED MODEL
      4. 3. THE SECOND PROPOSED MODEL
      5. CONCLUSION
      6. REFERENCES
      7. ENDNOTES