9 resultados para Chaining

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to examine time allocation patterns within household-level trip-chaining, simultaneous doubly-censored Tobit models are applied to model time-use behavior within the context of household activity participation. Using the entire sample and a sub-sample of worker households from Tucson's Household Travel Survey, two sets of models are developed to better understand the phenomena of trip-chaining behavior among five types of households: single non-worker households, single worker households, couple non-worker households, couple one-worker households, and couple two-worker households. Durations of out-of-home subsistence, maintenance, and discretionary activities within trip chains are examined. Factors found to be associated with trip-chaining behavior include intra-household interactions with the household types and their structure and household head attributes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Findings from an online survey conducted by Queensland University of Technology (QUT) shows that Australia is suffering from a lack of data reflecting trip generation for use in Traffic Impact Assessments (TIAs). Current independent variables for trip generation estimation are not able to create robust outcomes as well. It is also challenging to account for the impact of the new development on public and active transport as well as the effect of trip chaining behaviour in Australian TIA studies. With this background in mind, research is being implemented by QUT to find a new approach developing a combined model of trip generation and mode choice with consideration of trip chaining effects. It is expected that the model will provide transferable outcomes as it is developed based on socio-demographic parameters. Child Care Centres within the Brisbane area have been nominated for model development. At the time, the project is in the data collection phase. Findings from the pilot survey associated with capturing trip chaining and mode choice information reveal that applying questionnaire is able to capture required information in an acceptable level. The result also reveals that several centres within an area should be surveyed in order to provide sufficient data for trip chaining and modal split analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Transport Impact Assessment (TIA) -Generally a short range transport planning activity -Assess transport impacts of new developments or expansions -Present solutions to mitigate impacts Problems with TIA Process -Private vehicles focus (i.e. Veh Trip Ends) -Proxy variables (e.g. 100sqm GFA) -Trip generation rates (e.g. VTE/proxy) -Little info/guidance on trip chaining effects -Little info/guidance on non-PV modes Requires significant professional judgment

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An online survey was conducted to investigate the views and experiences of Australian traffic and transport professionals about practical problems and issues in terms of trip generation and trip chaining for use in Transport Impact Assessment (TIA). Findings from this survey revealed that there is a shortage of appropriate data related to trip generation estimation for use in TIAs in Australia. Establishing a National Trip Generation Database (NTGD) with a centralised responsible organisation for collecting and publishing trip generation data based on federal and state governments’ contribution was found the most accepted solution for resolving this shortage as well as providing national standards and guidelines associated with trip generation definitions, data collection methodology, and TIA preparation process based on updated research. Finally, the study recognised the importance of the trip chaining effects on trip generation estimation and identified most prevalent land uses subject to trip chaining in terms of TIA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rationale for providing state subsidised public transport has changed over time from a social obligation to provide transport options for those without access to private transport to an environmental and economic imperative to minimize congestion and greenhouse gas emissions. In many jurisdictions this shift has seen a greater focus on the provision of peak hour commuter services and a shift in the demographic profile of the riding public and a significant increase in the number of commuter passengers relative to others. The scheduling of commuter services is not geared to meet the needs of children and their generally female carers who often need to engage in trip chaining and travel outside peak commuting periods and on weekends. In addition to service scheduling difficulties, transport infrastructure, both on-board and supporting infrastructure such as bus stops, train stations and connecting footpaths often do not support children and their carers to use public transport services. Combined with a negative attitude by passengers and service providers, such as bus drivers, which may see children, babies and young people as out of place and unwelcome on commuter services, these issues conspire to hinder the use of public transport by children and their carers. Overlaying feminist geography analysis and insights and child-friendly cities objectives, this paper proposes some basic criteria for the provision of public transport services and supporting infrastructure which meets the needs of children, babies and their carers and juxtaposes the achievement of these in South East Queensland, Australia and Stockholm, Sweden.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Efficient error-Propagating Block Chaining (EPBC) is a block cipher mode intended to simultaneously provide both confidentiality and integrity protection for messages. Mitchell’s analysis pointed out a weakness in the EPBC integrity mechanism that can be used in a forgery attack. This paper identifies and corrects a flaw in Mitchell’s analysis of EPBC, and presents other attacks on the EPBC integrity mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.