Despite requiring less space than most other modes of transport, bicycle traffic will also be prone to congestion when the traffic volume is sufficiently large. Such congestion can eventually influence the route choic...
详细信息
Despite requiring less space than most other modes of transport, bicycle traffic will also be prone to congestion when the traffic volume is sufficiently large. Such congestion can eventually influence the route choices of cyclists using the network. In this study we model bicycle congestion on a detailed network of the greater Copenhagen area by assigning an entire day of bicycle traffic using a recently developed method for dynamic network loading of speed heterogeneous multi-lane bicycle traffic. The model iteratively assigns appropriate routes for more than a million bicycle trips in the demand sensitive network, and with computation times of less than 15 minutes per iteration the proposed model proves to be large-scale applicable. This makes it the first dedicated bicycle traffic assignment model to account for congestion. The results indicate that the solid bicycle infrastructure of Copenhagen and cyclists' willingness to change routes are key to keeping travel times low for cyclists. (C) 2019 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-nd (http://***/licenses/by-nc-nd/4.0/) Peer-review under responsibility of the conference Program Chairs.
A four-dimensional (4D) guidance and communication handover between unmanned aerial vehicles (UAVs) using multiple-input-multiple-output ultrawideband (MIMO-UWB) network system in a region of interest (ROI) is propose...
详细信息
In order to accurately calculate the effective value of voltage and current, it is necessary to filter out the harmonics in voltage and current signals in the process of developing power RTU with Zynq-7000 series FPGA...
详细信息
In order to accurately calculate the effective value of voltage and current, it is necessary to filter out the harmonics in voltage and current signals in the process of developing power RTU with Zynq-7000 series FPGA. This paper discusses the use of the Xilinx FIR IP core to achieve this filtering function. Firstly, we use FDAtool to design a 50 Hz band-pass filter, analyze the frequency characteristics of the filter, and then quantize the FIR filter coefficients generated by Matlab tool by calculating the quantization word length, and then import the quantized filter coefficients into the FIR IP core. Finally, the realization and optimization of the IP core are completed by setting the relevant parameters. This method simplifies the design process and makes the realization of the filter easier. The simulation results of MATLAB and FPGA show that the filtering effect is consistent, and the FIR filter consumes fewer resources than the Fourier Algorithm.
Most travel demand models simplify the representation of trips from/to external zones. Despite the higher frequency of internal daily travel, long-distance travel cannot be neglected due to its high contribution to th...
详细信息
Most travel demand models simplify the representation of trips from/to external zones. Despite the higher frequency of internal daily travel, long-distance travel cannot be neglected due to its high contribution to the travelled distance. In this paper we integrate two different models that represent those two travel segments. MITO is an agent-based model for travel demand implemented in the metropolitan area of Munich. DEMO is a macroscopic model that generates travel demand in Germany. DEMO is used to represent the external, long-distance travel from, to or through the MITO study area. DEMO demand is disaggregated and is jointly assigned with MITO trips using the transport model MATSim. The integration significantly improves the validation of the model against traffic counts and facilitates the simulation capabilities when the scenarios affect major roads. (C) 2019 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-nd (http://***/licenses/by-nc-nd/4.0/) Peer-review under responsibility of the conference Program Chairs.
A novel energy efficient opportunistic spectrum access strategy was proposed to solve the energy constrain issue of a secondary user in non-slots cognitive radio network, in which a secondary user sensed the channels ...
详细信息
A novel energy efficient opportunistic spectrum access strategy was proposed to solve the energy constrain issue of a secondary user in non-slots cognitive radio network, in which a secondary user sensed the channels licensed to some primary users sequentially before it decided to transmit. To maximize energy efficiency the algorithm can make the secondary user specify the optimal channel sensing time and transmission power to be used upon transmission. During power control process, packet length to be transmitted of the secondary use was considered to regulate the transmission power adaptively. Nonlinear fractional programming problem can be converted into a linear programming problem, thus obtaining the maximum energy efficiency by Binary Search algorithm. simulation results indicate that the proposed strategy can achieve the tradeoff between the sensing performance and sensing overhead and efficiently improve the energy efficiency of the secondary user.
Instead of building more traffic infrastructures, developing a better solution for traffic light scheduling is probably the fastest and most money-saving way for improving the traffic condition or solving the traffic ...
详细信息
Due to limited energy on sensor nodes, how to achieve a longer lifetime for the WSN has become an essential issue in recent years. Among them, an effective scheduling algorithm can also be regarded as an essential str...
详细信息
This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algori...
详细信息
This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.
With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite ne...
详细信息
With the increasing application of micro-nano satellite network, it is extremely vulnerable to the influence of internal malicious nodes in the practical application process. However, currently micro-nano satellite network still lacks effective means of routing security protection. In order to solve this problem, combining with the characteristics of limited energy and computing capacity of micro-nano satellite nodes, this research proposes a secure routing algorithm based on trust value. First, the trust value of the computing node is synthesized, and then the routing path is generated by combining the trust value of the node with the AODV routing algorithm. simulation results show that the proposed MNS-AODV routing algorithm can effectively resist the influence of internal malicious nodes on data transmission, and it can reduce the packet loss rate and average energy consumption.
As compared to traditional networks, software-defined networks (SDNs) have made the communication process more flexible, dynamic, and agile employing its unique features such as centralized control, direct programmabi...
详细信息
暂无评论