نتایج جستجو برای: railroad traffic control
تعداد نتایج: 1406921 فیلتر نتایج به سال:
Influencing long-term route choice by traffic control measures, a basic model study, " Pro
Threats to the security and availability of the network have contributed to the use of Real-time Blackhole Lists (RBLs) as an attractive method for implementing dynamic filtering and blocking. While RBLs have received considerable study, little is known about the impact of these lists in practice. In this paper, we use nine different RBLs from three different categories to perform the evaluatio...
We study the sawtooth lattice of a coupled spin 1/2 Heisenberg system, a variant of the railroad-trestle lattice. The ground state of this system is twofold degenerate with periodic boundary conditions and supports kink-antikink excitations, which are distinct in this case, unlike the railroad-trestle lattice. The resulting lowtemperature thermodynamics is compared with the recently discovered ...
Problem of traffic jams is common in large cities. Urban traffic control systems aim to solve this problem. The major difficulty in urban traffic is large number of variables for representing the state of traffc, such as traffic flow,speed, and density. Lack of precise relations between these variables is another problem. In this paper, we present a new model for traffic flow and introduce a tr...
This paper presents an attack that circumvents anonymization of IP addresses in IP network traffic data in O(n) time, or O(n) time under certain circumstances. The attack is based on packet injection, and circumvents all anonymization techniques that assign a static and unique pseudonym to an IP address. It turns out that the packet injection itself, as well as the extraction of the correspondi...
Associate to each sequence A of integers (intending to represent packet IDs) a sequence of positive integers of the same length M(A). The i’th entry of M(A) is the size (at time i) of the smallest buffer needed to hold out-of-order packets, where space is accounted for unreceived packets as well. Call two sequences A, B equivalent (written A ≡FB B) if M(A) = M(B). We prove the following result:...
Experiments involving evaluation of new network technologies require realistic network environments. Network traffic is one of the important elements in these environments and many products and approaches are available to generate realistic traffic. However, for efficient evaluation, users should be able to configure their traffic to possess the requisite userdefined characteristics. The existi...
Dense human flow has been a concern for the safety of public events for a long time. Macroscopic pedestrian models, which are mainly based on fluid dynamics, are often used to simulate huge crowds due to their low computational costs (COLOMBO and ROSINI, 2005). Similar approaches are used in the field of traffic simulations (LIGHTHILL and WHITHAM, 1955). A combined macroscopic simulation of veh...
Proteins of the p120 family have been implicated in the regulation of cadherin-based cell adhesion, but their relative importance in this process and their mechanism of action have remained less clear. Three papers in this issue suggest that p120 plays a key role in maintaining normal levels of cadherin in mammalian cells, and that it may do so by regulating cadherin trafficking (Chen et al., 2...
Diesel exhaust has been suspected to be a lung carcinogen. The assessment of this lung cancer risk has been limited by lack of studies of exposed workers followed for many years. In this study, we assessed lung cancer mortality in 54,973 U.S. railroad workers between 1959 and 1996 (38 years). By 1959, the U.S. railroad industry had largely converted from coal-fired to diesel-powered locomotives...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید