SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Transportation research record

Journal Volume: 2672
Journal Issue: 1
Journal Year: 2018
Articles in SafetyLit: 18

Application of novel recovery techniques to enhance the resilience of transportation networks

Assessing transportation assets for vulnerability to extreme weather and other natural hazards

Crisis communication patterns in social media during Hurricane Sandy

Crowdsourcing incident information for emergency response using open data sources in smart cities

Developing priority index for managing utility disruptions in urban areas with focus on cascading and interdependent effects

Estimating choice models to quantify the effect of herding on the decision to evacuate: application of a serious gaming experimental setup

Evaluation of the traffic impacts of mass evacuation of Halifax: flood risk and dynamic traffic microsimulation modeling

Exit choice behavior of pedestrians involving individuals with disabilities during building evacuations

Fear in humans: a glimpse into the crowd-modeling perspective

Learning to build resilience into transportation systems

Modeling cyber attacks at intelligent traffic signals

Modeling the effectiveness of infrastructure and travel demand management measures to improve traffic congestion during typhoons

Road network resilience: how to identify critical links subject to day-to-day disruptions

Simulating indoor evacuation of pedestrians: the sensitivity of predictions to directional-choice calibration parameters

Spatially clustered autonomous vehicle malware: producing new urban geographies of inequity

Telecom, traffic cones, and the big one: identifying transportation and communications emergency support workforces and calculating their exposure to seismic peak ground accelerations

Transit information utilization during an extreme weather event: an analysis of smartphone app data

Vulnerability of traffic control system under cyberattacks with falsified data