Spatiotemporal Scenario Generation of Traffic Flow Based on LSTM-GAN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traffic Flow Analysis Based on Queuing Models

One of the most important issues in the plant layout design especially in mass production organizations with high inter-plant logistics is‘material flow and inter-plant traffic analysis and its effects on the production capabilities or pauses in production lines. In this paper the inter-plant traffic analysis issue on the basis of single channel queue model (M/M/1) is analyzed in a carmaker c...

متن کامل

Congestion Scenario-based Vehicle Classification Detection Models Based on Traffic Flow Characteristics and Observed Event Data

While the existing applied length-based vehicle classification model has been to estimate vehicle lengths accurately with dual-loop traffic monitoring station data under free traffic condition, it produces considerable errors against congested traffic. In this study, both ground-truth vehicle trajectory and simultaneous loop event data are used to characterize the impact of congested traffic on...

متن کامل

traffic flow analysis based on queuing models

one of the most important issues in the plant layout design especially in mass production organizations with high inter-plant logistics is‘material flow and inter-plant traffic analysis and its effects on the production capabilities or pauses in production lines. in this paper the inter-plant traffic analysis issue on the basis of single channel queue model (m/m/1) is analyzed in a carmaker c...

متن کامل

adaptive mesh generation for approximation of traffic flow equations

this paper introduces a mesh generating algorithm for solving the traffic flow equation as a conservation law equation. the idea behind the new method is to use the characteristic curves and moving non-oscillatory finite volume method. in addition, when characteristic curves intersect, the proposed scheme uses shock speed equation in order to improve computational efficiency. we also compare...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.3029230