نتایج جستجو برای: overtaking maneuver

تعداد نتایج: 7024  

1993
M Mittler N Gerlich

In a queueing network with overtaking, the probabilistic eeects entailed by a customer propagate in such a manner that the sojourn time of the same customer in a node visited later is aaected. The main eeect of overtaking is the dependency of node sojourn times on non-overtake-free paths: the sojourn time distribution of a non-overtake-free path is not simply the convolution of the sojourn time...

1993
M Mittler N Gerlich

In a queueing network with overtaking, the probabilistic eeects entailed by a customer propagate in such a manner that the sojourn time of the same customer in a node visited later is aaected. The main eeect of overtaking is the dependency of node sojourn times on non-overtake-free paths: the sojourn time distribution of a non-overtake-free path is not simply the convolution of the sojourn time...

2003
Nedal T. RATROUT

Illegal overtaking is a major contributor to traffic accidents in the Kingdom of Saudi Arabia. It is the second most frequent cause of traffic accidents after speeding, and responsible for 10% of all traffic accidents in the year 2001. This paper evaluates the extent of illegal overtaking in the study area and examines the effect of time and alignment on its frequency. The study took place in t...

Journal: :Expert Syst. Appl. 2016
Sergio Martín Manuel G. Romana Matilde Santos Peñas

The level of service (LOS) on two-lane highways and, therefore, the quality of traffic flow, is currently estimated based on the delay of the vehicles and, in certain types of roads, the average travel speed. Speed is relatively easy to measure. However, it is important, and not so simple, to determine whether a vehicle is delayed. Traditional methods, generally based on quantitative measuremen...

Journal: :Journal of experimental psychology. Human perception and performance 2000
R Gray D Regan

The authors examined the effect of adaptation to expansion on overtaking maneuvers in a driving simulator. Following driving on a straight empty road for 5 min, drivers initiated overtaking substantially later (220-510 ms) than comparable maneuvers made following viewing a static scene or following 5 min of curve driving. Following adaptation to contraction (produced by driving backward), obser...

Journal: :I. J. Robotics and Automation 2004
Sonia Mota Eduardo Ros Vidal Eva M. Ortigosa Francisco J. Pelayo

The rear-view mirror is unhelpful when an overtaking car is in the blind quadrants (blind spot). In this contribution we describe the software implementation of an algorithm to monitor vehicle overtaking processes. This algorithm detects the vehicle to the rear, and discriminates whether it is approaching or not, and if approaching, it alerts us of its presence. The proposed system is based on ...

Journal: :JNW 2014
Xiaohong Chen Xueli Fang

In order to understand the overtaking behavior of, overtaking physical separation events between bicycles and mopeds was taken out. According to the analytical model of road bicycle passing events vehicle spatial features, the bicycle passing events into free events overtaking, adjacent events and blocked events, and based on the bicycle traffic flow velocity distribution characteristics and bi...

2003
Yoshiaki Sugimoto Gareth Lee Fumiko Tamura Kenichi Ueda

This research develops a theory about the role of inequality in the overtaking of growth performance across countries. The theory captures two opposing effects of inequality on factor accumulation and suggests that the qualitative change in their combined effect is a prime cause of overtaking. Due to the initial dominance of the positive effect of inequality, a less egalitarian economy undergoe...

Journal: :Scientific reports 2016
Heng Zhang Wen-Shan Duan Xin Qi Lei Yang

Head-on collision and overtaking collision between a KdV solitary wave and an envelope solitary wave are first studied in present paper by using Particle-in-cell (PIC) method in a dusty plasma. There are phase shifts of the KdV solitary wave in both head-on collision and the overtaking collision, while no phase shift is found for the envelop solitary wave in any cases. The remarkable difference...

2007
Antoine Joux Jean-René Reinhard

VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The state of any family member is made of three components: a counter, a counter diffusor and a core accumulator. We show that collisions can be found in the counter during the IV Setup. Moreover they can be combined with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید