• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 24
  • 24
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A STUDY OF SAFETY IMPACTS OF DIFFERENT TYPES OF DRIVEWAYS AND THEIR PROXIMITY

Williamson, Michael R. 01 May 2014 (has links)
The newly published Highway Safety Manual (HSM) has defined six different driveway types based on land use and parking lot size, including major commercial, minor commercial, major industrial/institutional, minor industrial/institutional, major residential, and minor residential. Major driveways are defined as having more than 50 parking spaces, while minor driveways are defined as those having less than 50 parking spaces. The HSM crash prediction models require the inputs of driveway type and density. However, the actual impacts of different types of driveways on the number of crashes are not clear. The crash modification factors were provided based on few past studies, with high standards of error. The purpose of this research is to develop a method to quantify the impact of driveway types and density on traffic crash frequencies, types, and severities. The different driveway types were collected in the State of Illinois and crashes occurring in the function area of each driveway were identified from the IDOT crash database (from 2005 to 2009). A cross section comparison was conducted to compare the mean crash frequency among different driveways. A further statistical analysis was used to develop a relationship between the density of each driveway type and crash frequency and rates.
2

Centralizovaná správa rolí / Centralized management of user roles

Kotora, Ondřej January 2008 (has links)
Správa rolí a identit se stává elementární součástí podnikových informačních systémů. Je součástí oboru Identity a Access managementu, který je velmi mladou a dynamicky se rozvíjející tržní oblastí. Tato diplomová práce poskytuje základní přehled o členění této tržní oblasti a zároveň charakterizuje tuto oblast z pohledu obecného přístupu a přístupu na úrovni odvětví. Je zde popsána nabídka několika hlavních hráčů na trhu s důrazem na vhodnost nasazení v českém prostředí. Konkrétně je vybírán vhodný produkt pro nasazení v České správě sociálního zabezpečení, největší finančně správní institucí státní správy ČR. Je zde také popsáno několik faktorů na které by měl být při podobném výběru kladen důraz. Samotný výběr je pouze informativní s účelem dodat aktuální přehled o možnostech řešení, které trh pro danou oblast nabízí. Identity a Access management totiž v České správě sociálního zabezpečení již zaveden byl. O tomto řešení se zmiňuje předposlední kapitola.
3

Ecological indicators of access and access management : a wildlife perspective

Harding, Brandie L. 19 April 2013 (has links)
There is growing concern that human access into areas of wildlife habitat and the management of that access has become one of the most significant issues in sustaining wildlife populations worldwide. Although access management is recommended throughout primary wildlife research and provincial land management plans as a means of wildlife management, limited research has been conducted on measuring the status of access or on access management strategies. Based on a review of the literature on resource management plans and provincial management strategies, this thesis identifies and describes fifteen potential ecological indicators for measuring and monitoring access and access management. Five key findings are summarized from this review. (1) Meaning and implementation of the term `access management' remains vague and ambiguous. (2) Measures of human access are often tied to large mammal management and studies. (3) Access management is a big question, encompassing cumulative impacts, and when viewed from a systems approach should consider ecological indicators across multiple levels of biological organization. (4) Attention is brought to two sub-types of indicators to monitor access management, land use indicators and wildlife use indicators. (5) Ecological indicators of access and access management share one similar data layer, GIS access infrastructure data.
4

A Prioritization Process for Access Management Implementation in Utah

Braley, Kordel T. 04 May 2007 (has links) (PDF)
Appropriate access management techniques can improve the safety and efficiency of arterial roads. In order to determine which roads can most benefit by the implementation of access management techniques, a prioritization process was developed to recommend various access management treatments such as limiting access points, installing raised medians, and ensuring adequate signal spacing along corridors. To serve as the basis for the performance index, a database was created including identifying features, characteristics, and crash history for 175 arterial road segments on Utah state routes. Stepwise linear regression was applied to the data collected to determine which characteristics of the roads were correlated with crash rate, crash severity, and specific collision types. Signal spacing, access density, and median type were all determined to be correlated with crash rates and crash severity. Specifically, signals per mile, access density, and two-way left-turn lanes were all positively correlated with crashes. Other characteristics such as adjacent land use and volume were also analyzed. Finally, recommendations for access management treatments were given in the form of a decision tree. The decision tree may be used to classify existing or future road segments into subcategories based on volume, signal spacing, land use, and other criteria, with recommendations provided for each subcategory.
5

Enforcement of Entailment Constraints in Distributed Service-Based Business Processes

Hummer, Waldemar, Gaubatz, Patrick, Strembeck, Mark, Zdun, Uwe, Dustdar, Schahram 10 May 2013 (has links) (PDF)
A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bound task(s). (authors' abstract)
6

Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

Elhindi, Mohamed A. 01 January 2010 (has links)
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the Council on Higher Education Accreditation. At Minnesota State Colleges and Universities (MnSCU), the approach to identity management (IdM) required the distribution of a username and password to authenticate MnSCU employees and students. Authentication enables authorized users to access campus-supported ISs and Office of the Chancellor (OOC) supported ISs such as the Integrated Statewide Record System (ISRS). In some cases, an MnSCU employee or student will receive as many as 7 usernames and passwords. When a new employee or student joins MnSCU, the campus IT group creates a general log-on to campus-supported ISs. This log-on consists of a username and password and provides the new employee or student with access to a local area network (LAN) hosted application such as e-mail and campus directory services. The author used Minnesota State College-Southeast Technical (MSC-ST) as the unit of analysis. In this inquiry, the following propositions guided and shaped the case study data collection: (a) system development processes (SDPs), (b) single access sign-on credentials through all MSC-ST ISs, (c) electronic data assurances, and (d) implementation across public and private security zones. The findings from this case study were used to develop a paradigm supporting the design and development of an IdM system model at MSC-ST. This model contributed to the establishment of a uniform IdM system for use by MSC-ST students, staff, and faculty regardless of time and location. Based on findings from this case study, key processes involved in establishing this IdM system based on uniform identities and authentication processes were documented. Key steps involved in facilitating secure IS access to MSC-ST resources by students, staff, and faculty accessing OOC-supported ISs as well as MSC-ST campus-specific applications were described. The author contributed to advancements in the IS space through the use of a replicable approach for implementing an IdM paradigm at MSC-ST.
7

Analysis of Safety Impacts of Access Management Alternatives Using the Surrogate Safety Assessment Model

Kim, Kyung Min 01 December 2017 (has links)
In a traditional safety impact analysis, it is necessary to have crash data on existing roadway conditions in the field and a few years must pass before accumulating reliable crash data. This is a time-consuming approach and there remains uncertainty in the crash data due to the random nature of crash occurrences. The Surrogate Safety Assessment Model (SSAM) was developed for resolving these issues. With SSAM, a conflict analysis is performed in a simulated environment. A planned improvement alternative under study is modeled and no physical installation of the alternative is needed. Hence, the method using a simulation software along with SSAM consumes less time compared to other traditional safety analysis methods that may require a physical installation of the new alternative and a long wait time for data collection. The purpose of this study is to evaluate if SSAM can be used to assess the safety of a highway segment or an intersection in term of the number and type of conflicts and to compare the safety effects of multiple access management alternatives with less time, less cost and less uncertainty than the traditional safety analysis methods. To meet the purpose of the study, two study sections, one on University Parkway in Orem and Provo and the other on Main Street in American Fork were selected and analyzed in this research. Based on the findings from the calibration of SSAM on the University Parkway study section, an evaluation of the effect of converting a TWLTL median into a raised median on a section of Main Street (US-89) from 300 West to 500 East in American Fork was performed using SSAM working on VISSIM simulation's trajectory files of the study section. This evaluation study was conducted to show how SSAM could be used to evaluate the effect of access management alternatives using surrogate safety measures. The analysis showed that a raised median would be much safer than a TWLTL median for the same level of traffic volume. Approximately a 32 to 50 percent reduction in the number of crossing conflicts was achieved when a raised median was used in lieu of a TWLTL median at the Main Street study section.
8

Safety impacts of right turns followed by U-turns

Pirinccioglu, Fatih 01 June 2007 (has links)
The objective of this study was to determine the safety impacts of right turn followed by U-turn movements (RTUT) at signalized intersections as well as median openings. RTUT movements are the most common alternatives to direct DLT movements(DLT). In order to achieve such data in a shorter amount of time, conflict analysis was chosen to be useful in this study as opposed to crash analysis. Additionally, data collection sites were divided dependent on certain geometric criterion and conflict data was recorded by the use of video recording equipment. Seven out the eleven conflict types used during the study were related to RTUT movements while the remaining observed conflicts were related to DLT movements. The safety comparison of right turns followed by U-turns to direct left turns at traffic signal sites indicated that DLT movements generated two times more conflicts per hour than RTUT movements. When the effects of traffic volumes have been taken into consideration, RTUT movements had a 5 percent higher conflict rate than DLT movements. At median opening sites, DLT movements generated 10 percent more conflicts per hour than RTUT movements. Furthermore, the other conflict rate, which takes the effect of traffic volumes into consideration, was 62 percent higher for DLT movements as compared to RTUT movements.Impacts of separation distance on safety of RTUT movements were investigated by a regression model. The model investigated impacts of U-turn bay locations and the number of lanes on major arterial on separation distance requirements. The model results indicated that U-turn bays located at signalized intersections and greater number of lanes on major arterials increases the minimum separation distance requirements. Finally, on four lane arterials U-turn distributions at median openings were analyzed to investigate how U-turns are accommodated at such locations. A u-turn regression model was developed to investigate impacts of median modifications on signalized intersection safety. The model results indicated that median modifications across the high volume driveways may cause safety problems at downstream signalized intersection.
9

Grizzly bears, roads, and human-bear conflicts in southwestern Alberta

Joseph, Northrup Unknown Date
No description available.
10

Grizzly bears, roads, and human-bear conflicts in southwestern Alberta

Joseph, Northrup 11 1900 (has links)
Because most grizzly bear mortalities occur near roads, the Province of Alberta plans to implement gated access management. Little is known about how grizzly bears will respond to road closures because the effects of roads are confounded by habitat and human use. I examined mechanisms underlying grizzly bear habitat selection near roads on private and public lands of southwestern Alberta. I incorporated habitat selection models into an analysis of conflict risk. Grizzly bears selected areas near roads with low traffic and were most active at night on private lands, where human use was low. However, habitat selection varied among individuals, and roads were not a consistent predictor of overall habitat selection across individual bears. Patterns of habitat selection led to the emergence of ecological traps on private land. Access and attractant management should be implemented to reduce bear-human conflicts, and decrease displacement of bears from high-quality habitats. / Ecology

Page generated in 0.0689 seconds