traffic flow data 中文意思是什麼

traffic flow data 解釋
交通流量資料
  • traffic : n 1 交通,(人、車、船、飛機的)來往;交通量;運輸;運輸量;運輸業;旅客,貨物。2 交易,貿易 (in...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. Abstract : in this paper, traffic data collection techniques for traffic flow guidance systems are analyzed. a modified licence plate recognition method, which is suitable for travel - time investigation in busy streets, is proposed

    文摘:討論了交通流誘導系統的交通流量、行程時間和行程速度的採集技術,提出了一種改進的牌照識別法,該方法適合於交通流密集路段上的交通數據採集。
  2. On the other hand, by the statistical analysis of historical flow data, the system can model the network traffic flows, and forecast short - term network flows. after that the system can analyse the network traffic abnormity. by use of the netwok management system and network security facility, we can setup a security infrastructure to monitor flows in real time, predicts the future flows, alarm some abnormal flows, respond to the abnormity automatically and immediately

    論文通過定期採集網路關鍵設備,包括匯聚層和核心交換層的流量情況,處理后以結構化、層次型的方式保存起來,一方面提供了圖形化的用戶介面,將收集的各種歷史數據和實時數據在其中以圖形的方式直觀地顯示出來,另一方面通過對歷史流量數據的統計分析,從而對網路流量進行建模,短時間預測網路流量情況,實現對網路流量異常情況的觀察分析,利用有充分響應能力的網路管理系統和網路安全設備,構成響應和預警的綜合安全系統。
  3. In principle, ultrasonic sensors are suspended over a road, which keep emitting pulse signals periodically to nearby and feed back waves to decide existence of any obstacles, thus to detect the speed, height, length, different sizes ( heavy, medium and small ) of moving vehicles and accumulative flow as well as length of motorcade. optionally, it can be applied to multitude driving lanes simultaneously for traffic data. by integrating and analyzing these measured data, the necessary figures concerning traffic flow may be obtained, which are fundamental basis guiding road buildings

    本課題設計的是一種懸掛式超聲波車流多信息檢測器,通過懸掛于路面上方的超聲波探頭向路面周期性地發射脈沖信號,利用地面回波來判斷遮擋物地存在,可用於檢測行駛中的機動車車速、車高、車長、大中小分型以及累計車流量、車隊長度等信息,並可用於多個車道車流信息的同時檢測,綜合這些測量參數可獲得車流量的必要數據,可為公路建設提供必要的基礎依據。
  4. To test the feasibility of loc and fuzzy inference system, a simulation tool is used to collect the data of traffic flow and visually evaluate the traffic congestion by people

    利用軟體獲取的模擬數據,以及人們對模擬實驗所呈現的交通擁擠程度的評價數據,文章對模糊推理系統參數進行了辨識。
  5. The paper involves the research of the application of neural - fuzzy control method to the road tunnel longitudinal ventilation system : by learning the sample data, the neural network automatically produces the membership functions and the control rules, subsequently, the fuzzy control model is easily established ; the distribution of pollutant and the fan operation is simulated under the varies traffic flow circumstances, the simulation results show that the longitudinal jet ventilation in medium - length and long road tunnels can be effectively controlled with the application of above method

    本文提出了建立公路隧道縱向通風神經模糊控制系統的一般方法,利用神經網路學習樣本數據,自動提取建立模糊控制模型的隸屬函數和控制規則,通過模擬模擬各種交通狀況下的污染物分佈和風機運行情況,結果表明此方法對中長隧道全射流縱向通風具有良好的控制效果。
  6. At last, i have also resoved the problem of connector with main program of driving simulator, and done convection of the data of traffic flow

    最後解決了與駕駛模擬器主程序的介面,完成了交通流數據的實時傳送。
  7. Fuzzy - statistic method of data mining and its application to traffic flow

    數據挖掘的模糊統計法及其在交通流中的應用
  8. By the correlative analysis of the crash data, traffic flow and speed data of an area, traffic flow is found to be the most important variable to decide the crash frequence without casualty. but injured and fatal accidents frequency is more influenced by speed and some other factors like psychology of drivers than traffic flow

    本文通過對一個區域內的事故數據和流量、速度數據進行分析,發現區域內輕微事故的發生頻率受交通流量大小的影響較大,而造成人員傷亡的一般事故和重大事故則受流量影響較小,受速度及其它因素影響較多。
  9. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  10. Then after introducing the grammar rule of lk _ yy language, we introduce the data structure and algorithm to implement them in details. among them, we first introduce the realization of basic language, then put emphasis on the translation of simple model object and the implementation of the two other basic features, inheritance and method overriding. last, making use of lk _ yy, we solve the maximum cost minimum flow problem in traffic program of gis

    首先指出了lk _ yy解釋系統是採用面向對象的系統分析與設計方法來實現的;然後在介紹lk _ yy語言語法規則的基礎上詳細介紹了實現它所需的數據結構和演算法描述,其中先介紹lk _ yy語言中基本語言的實現,然後重點講述了簡單模型對象的翻譯以及對象的兩個基本特徵繼承性和方法覆蓋的實現;最後利用lk _ yy解決了實際gis系統中交通規劃的最小費用最大流問題。
  11. Make clear the procedure of sending and receiving packet of kernel and the implementation of traffic control. the special mechanism in linux such as wait queue, task queue, time interrupt is also explained. after analyzing the file system of linux at large, we bring forward the design of modifying of file system. since many little file is created during the service of email and file service, we introduce the non volatile random access ram, by modifying the arithmetic of file system, changing the data flow of file system

    本文詳細介紹了針對網路專用服務器的專用linux系統的設計,對linux文件系統進行了詳盡的解析,包括vfs的實現, buffercache的作用等;並對塊設備驅動程序在內核中各個介面進行了分析;解析了內核接收和發送數據包的全過程以及流量控制在內核中的全過程;並對linux系統的一些特殊的機制如等待隊列,任務隊列,時鐘中斷等進行了詳細的解釋。
  12. The paper firstly combined the aerodynamic model, pollutant model, traffic model and the optimal operating fans selection model and then established the sample data gaining program to produce the optimal sample data ; secondly, the multi - layer forward neural network and the fuzzy control is combined within an equivalent structure, after the learning of sample data, the neural - fuzzy control system for the road tunnel longitudinal ventilation is produced ; thirdly, the optimal operating fans selection model is replaced by the fuzzy control model to make the tunnel ventilation simulation program, and then the control results under different traffic flow circumstances are evaluated in the matlab environment ; finally, the adaptive ability of the neural - fuzzy control system is discussed

    本文首先結合空氣動力學模型、污染模型、交通模型和最優風機開啟臺數選擇模型建立樣本數據獲取程序,利用該程序產生不同交通流下的最優樣本數據;然後,將多層前向神經網路與模糊控制進行結構等價型融合,通過學習最優樣本數據,建立公路隧道縱向通風神經模糊控制系統;之後,用此模糊控制模型替代最優風機開啟臺數選擇模型建立基於模糊控制的隧道通風模擬程序,在matlab下模擬模擬不同交通流下的隧道通風以測評控制效果;最後,對神經模糊控制系統的適應性進行了討論。
  13. Ipsec offers security services including connectionless integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality for ip and upper layer protocols

    Ipsec為ip及上層協議提供了無連接完整性、數據源身份認證、抗重播攻擊、數據內容的機密性和有限的通信流量機密性等安全服務。
  14. The simulation shows that the non - motorized vehicle moves in snake track and stop in insert style. it corresponds with the characteristic of non - motorized vehicle. the highest density of traffic flow from line regression of its statistic data is in the area of factual data

    模擬表明非機動車在運動時橫向移動靈活,停止時呈穿插排列,符合非機動車行駛特點;對統計數據進行線性回歸后得到的最高密度處在實測范圍內。
  15. Netflow is a technology which is used to accelerate data switch in network equipment by cisco system. it has a powerful data collection and analysis capability and is becoming the uppermost criterion for ip / mpls traffic flow. which is applied widely in network management field

    Netflow技術是思科公司用在網路設備上進行數據加速交換的一項技術,它的數據採集和測量功能成為最主要的ip / mpls流量分析和計量標準,廣泛應用於網路管理領域。
  16. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  17. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  18. Through processing and analyzing historical traffic flow data of beijing road network, the paper confirms the typical traffic mode

    本文通過處理和分析北京市路網歷史交通流數據,確定了北京市路網的典型交通模式。
  19. Because of the difficulty to obtain the traffic flow information of lanes at non - detector intersections in most metropolises of the world, based on the relationships between the lanes of signal - controlled intersections, cluster analysis and stepwise regression are integrated to predict the traffic volume of lanes at non - detector isolated controlled intersections. first cluster analysis is used to cluster the lanes of non - detector isolated signal - controlled intersections and the lanes of all signal - controlled intersections with detectors. then, by the results of cluster analysis, the traffic volume samples are selected randomly and stepwise regression is used to predict the traffic volume of lanes at non - detector isolated signal - controlled intersections. the method is tested by the traffic volume data of lanes of the road network of nanjing city. the problem of predicting the traffic volume of lanes at non - detector isolated signal - controlled intersections was resolved and can be widely used in urban traffic flow guidance and urban traffic control in cities without enough intersections equipped with detectors

    針對目前國內外大中城市中普遍存在的無檢測器信號交叉口車道交通流信息難于獲取的情況,基於信號控制交叉口車道之間的相關性,綜合應用聚類分析和逐步回歸法預測單點無檢測器信號控制交叉口車道流量.首先應用聚類分析將單點無檢測器信號控制交叉口的車道與有檢測器信號控制交叉口的車道交通流量進行聚類,然後在聚類分析結果的基礎上隨機選取車道交通流量樣本運用逐步回歸法預測單點無檢測器信號控制交叉口的車道流量,此方法經過南京市的具體車道流量數據驗證.此類問題的解決,可廣泛應用於城市交通流誘導系統以及交通控制系統
  20. In the paper, according to the relation between the regional economy system and traffic system the macrocosmic forecasting model of the yrd regional general traffic flow is built. the flow includes tendency traffic stream and induced traffic stream. according as the above forecasting methods and the regional traffic forecasting model the development of the yrd region economy, population and the tendency traffic flow are quantitatively forecasted by the testing data

    並根據交通系統和社會經濟系統互相影響的關系,構建了長江三角洲區域綜合交通流量宏觀預測模型(趨勢交通流和誘增交通流) ,利用上述預測方法和宏觀預測模型結合調研數據對長江三角洲區域的經濟、人口以及趨勢交通流量進行了宏觀定量預測,隨長江三角洲區域綜合交通網路體系研究后提出了區域間交通流量模擬「四階段」定量預測模型。
分享友人