Skip to main content

Release 2.2 of USDOT RDE and new connected vehicle data sets now available

The Research Data Exchange (RDE), a web-based data resource provided by the US Department of Transportation's Intelligent Transportation Systems (ITS) Program, collects, manages, and provides access to archived and real-time multi-source and multi-modal data to support the development and testing of ITS applications. The RDE now contains two new data environments associated with intersection queues and weather sensing applications, which were demonstrated during the 2014 ITS World Congress in Detroit an
July 21, 2015 Read time: 1 min
The Research Data Exchange (RDE), a web-based data resource provided by the 324 US Department of Transportation's Intelligent Transportation Systems (ITS) Program, collects, manages, and provides access to archived and real-time multi-source and multi-modal data to support the development and testing of ITS applications.
 
The RDE now contains two new data environments associated with intersection queues and weather sensing applications, which were demonstrated during the 2014 6456 ITS World Congress in Detroit and are available for download: Intersection queuing data and situation data based on J2735 messages: Data from a weather sensing and alert demonstrations.

Release 2.2 also includes new features: Version control to track updated versions of data; a link to the Weather Data Environment containing road weather data; a graphical and text-based search capability across all data environments; the ability to "like" or promote files with social media.

More information is available on the %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 oLinkExternal RDE website Visit www.its-rde.net website false https://www.its-rde.net/ false false%>.

For more information on companies in this article

Related Content

  • Vision Show and Conference 2016
    March 9, 2016
    The Vision Show, North America’s largest vision and imaging trade show and conference, will be held in Boston, Massachusetts at the Hynes Convention Center, 3-5 May 2016. Founded by AIA in 1996, The Vision Show provides vision users, system integrators, machine builders and OEMs with access to the latest vision and imaging technologies and applications from nearly over 100 leading manufacturers, distributors and suppliers from around the world. The accompanying conference features in-depth tutorials
  • FASTR consortium releases Automotive Industry Guidelines for Secure Over-the-Air Updates
    November 9, 2017
    A non-profit research consortium dedicated to automotive cyber security, Future of Automotive Security Technology Research (FASTR), has announced the availability of the Automotive Industry Guidelines for Secure Over-the-Air Updates. These guidelines are intended to assist automotive manufacturers and others involved in evaluating platforms for secure updates, describing the threat models, providing recommended cryptographic algorithms and detailing a step-by-step checklist for evaluating state of the art
  • Wireless dynamic charging for fully electric vehicles: challenges and concepts
    January 15, 2016
    The 25 partners of the FABRIC project have organised a one-day conference highlighting the different aspects of FEV (fully electric vehicle) dynamic charging. Taking place at the Ertico offices in Brussels, the conference will discuss the concept of wireless charging technology for road vehicles and its potential to facilitate a shift from petrol and diesel to electric vehicles.
  • Companies depend on automation, AI and machine learning for cyber security
    February 23, 2018
    To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication