MODELING OF PEDESTRIAN BEHAVIOR BASED ON MENTAL STRESS
نویسندگان
چکیده
منابع مشابه
Modeling Pedestrian Behavior on Pedestrian Crosswalks
2007 III DEDICATION To the owners of the glowing hearts and burning vigor.……………. To those who sacrificed their money, souls and blood for their faith..... To those who faced the devil of evil and the devil of craving………. To Al-Aqsa Intifada martyrs and all the martyrs of Palestine………. To the spirit of the struggling martyr, my nephew, Rami Ganim……… To the stubborn heroes and political prisoners...
متن کاملModeling pedestrian switching behavior for attractions
While walking on the streets, pedestrians can aware attractions like shopping windows. Some of them might shift their attention towards the attractions, namely switching behavior. As a first step, this study investigates collective effects of the switching behavior for an attraction by means of numerical simulations. Such switching behavior leads some pedestrians head for the attraction, or eve...
متن کاملModeling pedestrian crowd behavior based on a cognitive model of social comparison theory
Modeling crowd behavior is an important challenge for cognitive modelers. Models of crowd behavior facilitate analysis and prediction of human group behavior, where people are close geographically or logically, and are affected by each other’s presence and actions. Existing models of crowd behavior, in a variety of fields, leave many open challenges. In particular, psychology models often offer...
متن کاملModeling and Prediction of Pedestrian Behavior based on the Sub-goal Concept
This study addresses a method to predict pedestrians' long term behavior in order to enable a robot to provide them services. In order to do that we want to be able to predict their final goal and the trajectory they will follow to reach it. We attain this task borrowing from human science studies the concept of sub-goals, defined as points and landmarks of the environment towards which pedestr...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Architecture and Planning (Transactions of AIJ)
سال: 2003
ISSN: 1340-4210,1881-8161
DOI: 10.3130/aija.68.41_7