Skip to main content

PTV Group launches global traffic survey

Transport planning software company PTV Group has launched an online survey, 'The Strategy – How Cities Manage Traffic' (link http://vision-traffic.ptvgroup.com/index.php?id=8553), in an effort to discover the strategies used by the world’s cities and local authorities in planning their transport strategy. The survey covers actual requirements and the measures taken to achieve set goals on optimising driving speeds, increasing road capacity and moderating the effects of congestion; changes to mobility pl
February 26, 2014 Read time: 1 min
Transport planning software company 3264 PTV Group has launched an online survey, %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 oLinkExternal 'The Strategy &#8211; How Cities Manage Traffic' Visit http://vision-traffic.ptvgroup.com/index.php?id=8553 false http://vision-traffic.ptvgroup.com/index.php?id=8553 false false%>, in an effort to discover the strategies used by the world’s cities and local authorities in planning their transport strategy.

The survey covers actual requirements and the measures taken to achieve set goals on optimising driving speeds, increasing road capacity and moderating the effects of congestion; changes to mobility planning; strategies used to move people away from cars and promote cycle usage and public transport; and plans for improved traffic management or a new traffic infrastructure.

"As providers of transport planning software, it is exciting for us to see where the trends in the transport planning sector are heading," says Paulo Humanes, business development director of PTV Group. "This gives us important impetus for further development of our software."

The survey is available online until 8 March.

For more information on companies in this article

Related Content

  • Quantum XYZ intends to launch air taxi service in Los Angeles
    December 4, 2018
    Quantum XYZ is seeking to use SureFly’s eight-rotor hybrid ‘octocopters’ to launch an air taxi service in Los Angeles. SureFly, a subsidiary of US technology company Workhorse, is currently pursuing Federal Aviation Administration (FAA) type certification for its electric vertical take-off and landing (eVTOL) aircraft. Quantum intends to submit an application to become a FAA-certified urban VTOL air carrier. The company’s president, Tony Thompson, says: “Once SureFly receives FAA Type certification, we
  • ITS Australia: National Awards 2019 nominees
    October 15, 2019
    An autonomous Mobility as a Service pilot at a retirement village is among the nominees in ITS Australia’s National Awards 2019. Aurrigo is exploring how the technology will be used safely by elderly passengers in an environment where technical systems are not well understood. The Queensland Police Service’s forensic crash unit has also been nominated - for using drones to map crash scenes to help reduce road closure times and traffic congestion. In addition, Cooee Busways was chosen for using vehicl
  • Flir online training in September
    September 12, 2016
    Flir’s traffic webinars during September provide an introduction to the TrafiOne smart city sensor for traffic monitoring and dynamic traffic signal control. TrafiOne uses thermal imaging to detect the presence of pedestrians and cyclists that are approaching and waiting at the kerb or using the crossing. What’s new in FLUX 3.0 looks at the new features of this video management system, which collects traffic data, events, alarms and video images created by a wide variety of video detection modules. Th
  • FASTR consortium releases Automotive Industry Guidelines for Secure Over-the-Air Updates
    November 9, 2017
    A non-profit research consortium dedicated to automotive cyber security, Future of Automotive Security Technology Research (FASTR), has announced the availability of the Automotive Industry Guidelines for Secure Over-the-Air Updates. These guidelines are intended to assist automotive manufacturers and others involved in evaluating platforms for secure updates, describing the threat models, providing recommended cryptographic algorithms and detailing a step-by-step checklist for evaluating state of the art