Manned security services. Cash-in-transit services (collection and delivery). Code of practice

2002 ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Bowen Hou ◽  
Shuzhi Zhao ◽  
Huasheng Liu ◽  
Jin Li

Traditional transit systems are susceptible to unexpected costs and delays due to unforeseen events, such as vehicle breakdowns. The randomness of these events gives the appearance of an imbalance in the number of operating vehicles and of unreliable transit services. Therefore, this paper proposes the queueing theory as a means to characterize the state of any given transit system considering the risk of vehicle breakdowns. In addition, the proposed method is used to create an optimized model for reserve fleet sizes in transit systems, in order to ensure the reliability of the transit system and minimize the total cost of any transit system exposed to the risks of vehicle breakdowns. The optimization is conducted based on the two main characteristics of all bus systems, namely, operator costs and user costs, in both normal and disruptive situations. In addition, the situations in our optimization are generated in scenarios that have a certain degree of probability of experiencing delays. This paper formulates such an optimization model, presents the formulation solution method, and proves the validity of the proposed method.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xiongfei Lai ◽  
Jing Teng ◽  
Paul Schonfeld ◽  
Lu Ling

Providing convenient transit services at reasonable cost is important for transit agencies. Timed transfers that schedule vehicles from various routes to arrive at some transfer stations simultaneously (or nearly so) can significantly reduce wait times in transit networks, while stochastic passenger flows and complex operating environments may reduce this improvement. Although transit priority methods have been applied in some high-density cities, operating delays may cause priority failures. This paper proposes a resilient schedule coordination method for a bus transit corridor, which analyzes link travel time, passenger loading delay, and priority signal intersection delay. It maximizes resilience based on realistic passenger flow volume, whether or not transit priority is provided. The data accuracy and result validity are improved with automatically collected data from multiple bus routes in a corridor. The Yan’an Road transit corridor in Shanghai is used as a case study. The results show that the proposed method can increase the system resilience by balancing operation cost and passenger-based cost. It also provides a guideline for realistic bus schedule coordination.


Author(s):  
Zhong-Ren Peng ◽  
Sarah Hawks ◽  
Kate West

Many U.S. transit agencies have been using planning support software to assist in daily planning, operation, and customer services. However, the literature is not clear about the extent to which transit agencies are using planning support software programs for daily activities. To determine the state of the practice in the use of planning support software in the U.S. transit agencies, a survey was conducted. The survey found that the use of planning support software confirms the general trend in the use of information technology: that is, its use is directly related to the size of the transit agencies. Larger transit agencies tend to use more planning support software, while small agencies do not use that much. Probably one of the most important findings is that many smaller transit agencies consider the purchase and use of planning support software in transit planning, operation, and marketing as unnecessary, especially given the difficulties in obtaining funding, training staff, and hiring and retaining technical support personnel. However, those difficulties are mainly caused by constraints in budgeting and technical staffing issues rather than the undesirability of or the unproved or unrealized benefits related to the use of planning support.


Author(s):  
Manuel Mogollon

In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement, insertion, or deletion; (2) the message is coming from the source from which it claims to come; (3) the message is protected against unauthorized individuals reading information that is supposed to be kept private; and (4) there is protection against an individual denying that the individual sent or received a message. These assurances are provided through the use of security mechanisms. Chapters IV, V, VI, and VII discuss security mechanisms such as confidentiality, integrity, and access authentication that are used to implement the security services listed above. This chapter covers two types of symmetric encryption: stream ciphers and block ciphers. The theory behind using shift registers as stream ciphers, as well as the DES and the Advanced Encryption Standard (AES), are also covered in this chapter.


2019 ◽  
Vol 130 ◽  
pp. 752-769 ◽  
Author(s):  
Eneko Echaniz ◽  
Chinh Q. Ho ◽  
Andres Rodriguez ◽  
Luigi dell'Olio

Sign in / Sign up

Export Citation Format

Share Document