69-80 WEB Features Chien Hadi.indd

ثبت نشده
چکیده

by sTeven chien, Keir oPie and Kaan ozbay inTroducTion Disaster response in areas of high population density is centered on evacuating people quickly and efficiently. Because the state of New Jersey, USA, is densely populated it faces considerable challenges in effectively coordinating responses to emergencies, such as serious storm events, particularly nor’easters. New Jersey experiences on average three nor’easters per year, any of which can strike at Class 2 or higher on the Dolan-Davis scale. In a previous study (1992) conducted by the U.S. Army Corps of Engineers (USACE) in conjunction with the New Jersey Office of Emergency Management (NJOEM), the Federal Emergency Management Agency (FEMA) and the National Weather Service (NWS), the extent and severity of potential flooding, vulnerable population, public shelter locations and evacuation times were determined, and a traffic assignment model was developed to estimate evacuation times during a nor’easter.6 While the model considered the effect of different population scenarios and included roadway link volumes under the various scenarios, it did not consider the impact of implementing selected evacuation strategies or plans. The objective of this study was to develop a microscopic traffic simulation model to assess the effectiveness of the existing New Jersey State Police (NJSP) “Routes 47/347 Reverse Lane Plan” for Cape May County. Lane reversal, also known as contraflow strategy, was modeled to study the enhancement of roadway capacity during a hurricane event. The simulation conducted in this study was applied to estimate evacuation times under various conditions, including different levels of traffic operations, seasonal area population, hurricane intensities and behavior responses. This study showcases the application of microscopic traffic simulation for emergency-preparedness planning. Moreover, the findings of this study can provide guidance to transportation officials and public safety agencies toward implementing effective traffic management strategies during a hurricane.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Representing a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking

With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...

متن کامل

Analyzing new features of infected web content in detection of malicious web pages

Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...

متن کامل

On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools

Development and usage of online social networking web sites are growing rapidly. Millions members of these web sites publicly articulate mutual "friendship" relations and share user-created contents, such as photos, videos, files, and blogs. The advances in web designing technology and fast growing usage of online resources prompted web designers to improve features and architectures of social ...

متن کامل

On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools

Development and usage of online social networking web sites are growing rapidly. Millions members of these web sites publicly articulate mutual "friendship" relations and share user-created contents, such as photos, videos, files, and blogs. The advances in web designing technology and fast growing usage of online resources prompted web designers to improve features and architectures of social ...

متن کامل

Deploying Access Control using Extended XACML in Open Web Service Environment

Now a days web services have a greater role in development of software systems. Generally, web server wants to determine which access can be granted and communicate with requesterfor open web service environment. These systems are designed to be open and web servers does not have determined conditions for communicate to the access requester. Such consideration makes traditional access control n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009