Pedestrian modelling is frequently used for making decisions regarding the planning, design, and management of pedestrian areas. For example, the designer of a new shopping mall would be interested in what locations p...
详细信息
ISBN:
(纸本)0975840002
Pedestrian modelling is frequently used for making decisions regarding the planning, design, and management of pedestrian areas. For example, the designer of a new shopping mall would be interested in what locations people are likely to be attracted to, or the operators of a large-scale event might like to know where congested areas are likely to occur so they can develop management plans. The outputs of thesemodels can include flows on certain routes, entry and exit counts, and level-of-service graphs. Computational modelling of pedestrians is sometimes difficult due to the complex and random nature of pedestrian movement. Pedestrians often make unconscious decisions that are difficult to explain or measure. They move at a much smaller scale and in a less constrained manner than other vehicles, meaning techniques developed for modelling other modes of transport cannot be translated to pedestrians easily. Pedestrians interact with many different kinds of environments. Enclosed spaces can consist of rooms connected by corridors leading to and from exits (eg. office buildings, shopping centres) or can be more open-plan (eg. sports arenas, train stations). Mixed mode environments consist of areas, possibly shared with cars or public transport, which connect the pedestrian to building entrances and other streets. Open areas consist of open areas and/or designated pathways where pedestrians wander and sightsee. Some environments are a hybrid of the above, for example sports precincts or universities, and generally include pedestrian areas or low vehicle traffic areas containing several attractions. There are also several different types of behaviour exhibited by pedestrians in these environments. Some pedestrians know where they are going, how to get there, and has a very low probability of being distracted on the way (purposeful and familiar). Some know where they want to go, but is not sure how to get there and as a result may get distracted or lost on the way (purpose
SuperParent-One-Dependence Estimators (SPODEs) loosen Naive-Bayes' attribute independence assumption by allowing each attribute to depend on a common single attribute (superparent) in addition to the class. An ens...
详细信息
Windows operating systems (NT, 2000, XP, 2003) were not designed for real-time and time-critical applications. But, due to the market requirements, many of the monitoring and control applications are to use Windows NT...
详细信息
A Printed Circuit Board (PCB) testing method using infrared thermal signatures is presented. The concept of thermal signature for PCBs is introduced. Based on this concept, the testing method is able to classify the i...
详细信息
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac...
详细信息
ISBN:
(纸本)9781604235531
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspaces are set up anew for each new instance of collaboration. We propose that much of the ad-hoc collaboration can be captured and transformed into patterns for reuse in future collaboration. This paper presents the results of the past five years of our work in this area. We introduce the notion of patterns of virtual collaboration;present a framework for extracting patterns of work in virtual workspace systems;and introduce an information model of virtual collaboration. We then present an overview of our data and process mining methods and reverse engineering techniques for discerning work processes carried out through virtual workspace systems. Finally we present our visual mining techniques that we use to discern aspects of work processes in virtual workspaces.
Inoue et al. introduced an automaton on a two-dimensional tape, which decides acceptance or rejection of an input tape by scanning the tape from various sides by various automata which move one way, and investigated t...
详细信息
Fault Tree Analyses (FTA) are embedded into UML component models. The UML component models are constructed by employing UML's extension mechanisms in conjunction with component-based software techniques. Taking an...
详细信息
Testing plays an important role in the maintenance of Component Based software Development. Test adequacy for component testing is one of the hardest issues for component testing. To tackle this problem, it is a natur...
详细信息
We present a unique Geographical Information System (GIS) that seamlessly integrates 2D and 3D views of the same spatial and aspatial data. Multiple layers of information are continuously transformed between the 2D an...
详细信息
AS Encryption / Decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add...
详细信息
ISBN:
(纸本)3905673207
AS Encryption / Decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add non-linearity, while A5-2 uses four LFSRs. In this paper a new multi-configurable LFSR design variant of the A5 algorithm is proposed, in which the inverse taps of the LFSR are used to generate the output key-stream bits. The new LFSR design, called a Complex LFSR, techniques can be effectively applied in software or hardware to a communications stream to provide a low cost and high speed encryption capability.
暂无评论