Optimisation of Bus Stop Layout Based on Time Distance Trajector
نویسندگان
چکیده
منابع مشابه
Transit Assignment Model Based on Bus Stop
A public transit network differs from a general road network. The passenger flow of bus stops and the limited capacity of buses have a greater effect than road traffic flow on the running time of buses. As a result, conventional public transit assignment models that adopt the econometric road network path concept have numerous limitations. Based on the analysis, the generalized bus trip time ch...
متن کاملOn-chip bus thermal analysis and optimisation
As technology scales, increasing clock rates, decreasing interconnect pitch and the introduction of low-k dielectrics have made self-heating of the global interconnects an important issue in VLSI design. Further, high bus temperatures have had a negative impact on the delay and reliability of on-chip interconnects. Energy and thermal models are used to characterise the effects of self-heating o...
متن کاملBus stop-skipping scheme with random travel time
When a bus is late and behind schedule, the stop-skipping scheme allows the bus vehicle to skip one or more stops to reduce its travel time. The deadheading problem is a special case of the stop-skipping problem, allowing a bus vehicle to skip stops between the dispatching terminal point and a designated stop. At the planning level, the optimal operating plans for these two schemes should be ta...
متن کاملAnalyzing Stop Time Phase Leading to Congestion Based on Drivers’ Behavior Patterns
Traffic oscillation, stop and go traffic, is created by different reasons such as: sudden speed drop of leader vehicle. Stop and go traffic commonly is observed in congested freeways results in traffic oscillation. Many theories had been presented to define congestion traffic based on laws of physics such as: thermodynamics and fluid. But, these theories could not explain the complexity of driv...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Earth and Environmental Science
سال: 2019
ISSN: 1755-1315
DOI: 10.1088/1755-1315/252/5/052075