Redirigiendo al acceso original de articulo en 24 segundos...
ARTÍCULO
TITULO

Classification Investigations of Traffic Management Schemes Having Conflict Loading at the Signal-controlled Road Junctions

Anatoliy Plotnikov    
Pavel Kravchenko    
Jurij Kotikov    

Resumen

The results of classification investigations of the efficiency of the traffic management schemes (TMS) are provided according to the criterion of their conflict loading (CL). The latter is determined by types and number of conflict points and maneuvers allowed by the Road traffic regulations in traffic and pedestrian streams. X- and T-shaped one-level signal-controlled junctions (SJ) of streets and roads have been examined in megapolises having various methods of traffic management. Among them there are single-phase management, management in separate directions and combined traffic management in regulatory restrictions of levels of requirements to traffic safety. TMS classification is developed for a complete group of options to formulate and solve the management problems.

 Artículos similares

       
 
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça    
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m... ver más
Revista: Information

 
Tori Tomiczek, Elizabeth J. Sciaudone, Liliana Velásquez-Montoya, Elizabeth Smyre, Anna Wargula, Kelly Fawcett and Joshua Torres    
Coastal highways along narrow barrier islands are vulnerable to flooding due to ocean and bay-side events, which create hazardous travel conditions and may restrict access to surrounding communities. This study investigates the vulnerability of a segment... ver más

 
Nikola Andelic, Sandi Baressi ?egota, Ivan Lorencin and Matko Glucina    
Malicious websites are web locations that attempt to install malware, which is the general term for anything that will cause problems in computer operation, gather confidential information, or gain total control over the computer. In this paper, a novel ... ver más
Revista: Future Internet

 
Hammad Tariq Janjuhah, George Kontakiotis, Abdul Wahid, Dost Muhammad Khan, Stergios D. Zarkogiannis and Assimina Antonarakou    
The pore system in carbonates is complicated because of the associated biological and chemical activity. Secondary porosity, on the other hand, is the result of chemical reactions that occur during diagenetic processes. A thorough understanding of the ca... ver más

 
Alessandro Crivellari and Alina Ristea    
The traditional categorization of crime types relies on a hierarchical structure, from high-level categories to lower-level subtypes. This tree-based classification treats crime types as mutually independent when they do not branch from the same higher-l... ver más