Transit Traffic Analysis Zone Delineating Method Based on Thiessen Polygon

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transit Traffic Analysis Zone Delineating Method Based on Thiessen Polygon

A green transportation system composed of transit, busses and bicycles could be a significant in alleviating traffic congestion. However, the inaccuracy of current transit ridership forecasting methods is imposing a negative impact on the development of urban transit systems. Traffic Analysis Zone (TAZ) delineating is a fundamental and essential step in ridership forecasting, existing delineati...

متن کامل

Automated Thiessen polygon generation

[1] Data uncertainty research of rain gauge network requires generation of large numbers of Thiessen polygons. Despite its importance in hydrology, few studies on computational Thiessen polygons have been carried out, and there is little published information in the hydrological literature. This paper describes two automated approaches and the ways for their implementation in hydrological appli...

متن کامل

Traffic Flow Analysis Based on Queuing Models

One of the most important issues in the plant layout design especially in mass production organizations with high inter-plant logistics is‘material flow and inter-plant traffic analysis and its effects on the production capabilities or pauses in production lines. In this paper the inter-plant traffic analysis issue on the basis of single channel queue model (M/M/1) is analyzed in a carmaker c...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sustainability

سال: 2014

ISSN: 2071-1050

DOI: 10.3390/su6041821