Transit Traffic Analysis Zone Delineating Method Based on Thiessen Polygon
نویسندگان
چکیده
منابع مشابه
Transit Traffic Analysis Zone Delineating Method Based on Thiessen Polygon
A green transportation system composed of transit, busses and bicycles could be a significant in alleviating traffic congestion. However, the inaccuracy of current transit ridership forecasting methods is imposing a negative impact on the development of urban transit systems. Traffic Analysis Zone (TAZ) delineating is a fundamental and essential step in ridership forecasting, existing delineati...
متن کاملAutomated Thiessen polygon generation
[1] Data uncertainty research of rain gauge network requires generation of large numbers of Thiessen polygons. Despite its importance in hydrology, few studies on computational Thiessen polygons have been carried out, and there is little published information in the hydrological literature. This paper describes two automated approaches and the ways for their implementation in hydrological appli...
متن کاملTraffic Flow Analysis Based on Queuing Models
One of the most important issues in the plant layout design especially in mass production organizations with high inter-plant logistics is‘material flow and inter-plant traffic analysis and its effects on the production capabilities or pauses in production lines. In this paper the inter-plant traffic analysis issue on the basis of single channel queue model (M/M/1) is analyzed in a carmaker c...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainability
سال: 2014
ISSN: 2071-1050
DOI: 10.3390/su6041821