Zeitschriften und Ausgaben

Volumen 23 (2022): Heft 3 (June 2022)

Volumen 23 (2022): Heft 2 (April 2022)

Volumen 23 (2022): Heft 1 (February 2022)

Volumen 22 (2021): Heft 4 (November 2021)

Volumen 22 (2021): Heft 3 (June 2021)

Volumen 22 (2021): Heft 2 (April 2021)

Volumen 22 (2021): Heft 1 (February 2021)

Volumen 21 (2020): Heft 4 (December 2020)

Volumen 21 (2020): Heft 3 (June 2020)

Volumen 21 (2020): Heft 2 (April 2020)

Volumen 21 (2020): Heft 1 (February 2020)

Volumen 20 (2019): Heft 4 (December 2019)

Volumen 20 (2019): Heft 3 (June 2019)

Volumen 20 (2019): Heft 2 (April 2019)

Volumen 20 (2019): Heft 1 (February 2019)

Volumen 19 (2018): Heft 4 (December 2018)

Volumen 19 (2018): Heft 3 (September 2018)

Volumen 19 (2018): Heft 2 (June 2018)

Volumen 19 (2018): Heft 1 (March 2018)

Volumen 18 (2017): Heft 4 (December 2017)

Volumen 18 (2017): Heft 3 (September 2017)

Volumen 18 (2017): Heft 2 (June 2017)

Volumen 18 (2017): Heft 1 (March 2017)

Volumen 17 (2016): Heft 4 (December 2016)

Volumen 17 (2016): Heft 3 (September 2016)

Volumen 17 (2016): Heft 2 (June 2016)

Volumen 17 (2016): Heft 1 (March 2016)

Volumen 16 (2015): Heft 4 (December 2015)

Volumen 16 (2015): Heft 3 (September 2015)

Volumen 16 (2015): Heft 2 (June 2015)

Volumen 16 (2015): Heft 1 (March 2015)

Volumen 15 (2014): Heft 4 (December 2014)

Volumen 15 (2014): Heft 3 (September 2014)

Volumen 15 (2014): Heft 2 (June 2014)

Volumen 15 (2014): Heft 1 (March 2014)

Volumen 14 (2013): Heft 4 (December 2013)

Volumen 14 (2013): Heft 3 (September 2013)

Volumen 14 (2013): Heft 2 (June 2013)

Volumen 14 (2013): Heft 1 (March 2013)

Volumen 13 (2012): Heft 4 (December 2012)

Volumen 13 (2012): Heft 3 (September 2012)

Volumen 13 (2012): Heft 2 (June 2012)

Volumen 13 (2012): Heft 1 (March 2012)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1407-6179
Erstveröffentlichung
20 Mar 2000
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

Volumen 19 (2018): Heft 4 (December 2018)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1407-6179
Erstveröffentlichung
20 Mar 2000
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

10 Artikel
access type Uneingeschränkter Zugang

A Priority-Based Multichannel Mac to Support the Non-Safety Applications in SCH Interval at RSU in V2I Communication

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 269 - 283

Zusammenfassung

Abstract

The transmission of safety applications in VANET is clearly the top concern. However, the non-safety applications, which improve the quality of experience, as well as the efficiency of the traffic, also need to be paid more attention. In VANET, the safety applications are transmitted in control channel interval and the non-safety applications can be transmitted only in service channel interval. In this paper, we propose a priority-based multichannel MAC to support the non-safety applications in service channel interval in Vehicle-to-Infrastructure communication with the presence of roadside unit. The novel MAC also allocates service channel according to the priority and divides the vehicles, which have the same required service channel, into four priority groups to enhance the EDCA mechanism. We use the mathematical model and the simulation for evaluating the performance under the influence of velocity with a different number of vehicles in the network.

Schlüsselwörter

  • non-safety applications
  • MAC
  • RSU
  • SCH
  • V2I
  • VANET
access type Uneingeschränkter Zugang

The Lz-Transform Method for the Reliability and Fault Tolerance Assessment of Norilsk-Type Ship’s Diesel-Geared Traction Drives

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 284 - 293

Zusammenfassung

Abstract

This paper focuses on a comparative analysis of the most important parameters of an icebreaker ship’s sustainable operations: the operational availability, power performance and power performance deficiency of the multi-state Multi-Power Source Traction Drives of Norilsk-type Arctic icebreaker ships. These parameters have a significant impact on the correct choice of the propulsive system of icebreaking vessels. The parameters’ evaluation was based on statistical operational data on Arctic icebreaker ships with diesel-geared traction drive. The Lz-transform approach was used to arrive at a solution of that problem. This approach drastically simplifies the solution compared with the straightforward Markov method.

Schlüsselwörter

  • Multi-Power Source Traction Drive
  • icebreaker ship
  • multi-state systems reliability
  • -transform method
  • availability
  • power performance
  • power performance deficiency
access type Uneingeschränkter Zugang

Spatial Distribution of Oil Spills at the Sea Surface in the Southeastern Baltic Sea According to Satellite Sar Data

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 294 - 300

Zusammenfassung

Abstract

Statistical analysis of the spatial distribution of oil spills detected using Synthetic Aperture Radars (SAR) in 2004-2015 at the sea surface in the Southeastern Baltic Sea was conducted. Number, area, and shape of oil pollution division between Exclusive Economic Zones (EEZ) of Poland, Russia, and Lithuania were estimated for the first time. The most polluted area of the Southeastern Baltic Sea is Russian EEZ, where 55% of the total amount of detected oil spills, and 52% of the total area of oil pollution were located. The average area of an oil spill detected within Territorial Sea (TS) and EEZ was estimated. Tail-shaped spills associated with oil discharge from the moving vessels are prevailed, and their amount and area within TS and EEZ were estimated.

Schlüsselwörter

  • Oil spills
  • synthetic aperture radar (SAR)
  • Southeastern Baltic
  • tail-shaped spill
  • Territorial Sea (TS)
  • Exclusive Economic Zone (EEZ)
access type Uneingeschränkter Zugang

The Air Cargo Carrying Potential of The Airbus A350-900XWB and Boeing 787-9 Aircraft on Their Ultra-Long-Haul Flights: A Case Study for Flights from San Francisco to Singapore

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 301 - 314

Zusammenfassung

Abstract

The introduction of the Airbus A350-900 (A359) and the Boeing B787-9 (B789) have enabled airlines to operate ultra-long-range services. Using a mixed methods research design, this study has examined the air cargo-carrying potential of Singapore Airlines Airbus A350-900XWB (A359) and United Airlines Boeing B787-9 (789) aircraft on their ultra-long-haul San Francisco to Singapore and the Singapore to San Francisco air routes. The qualitative data was analysed using document analysis, and the air cargo payload was modelled by simulation. The air cargo-carrying potential of the two aircraft types was significantly influenced by enroute weather. In the event of eastbound winds, the Singapore Airlines Airbus A350-900XWB air cargo payload was 16.9 tonnes and the United Airlines Boeing 787-9 was 11.5 tonnes, when these flights had a full passenger payload. In the case of westbound winds with a full passenger payload, the Singapore Airlines Airbus A350-900XWB air cargo payload was 13.1 tonnes and the United Airlines Boeing 787-9 was 7.9 tonnes. When there were no winds on the air routes, the Singapore Airlines Airbus A350-900XWB offered 15.0 tonnes and the United Airline Boeing 787-9 offered 9.7 tonnes of air cargo payload, respectively.

Schlüsselwörter

  • air cargo
  • air cargo capacity
  • airlines
  • ultra-long-range flights
  • payload-range envelopes
  • passenger transportation
  • simulation
access type Uneingeschränkter Zugang

Priority Transfer Management Algorithm, Based on Interaction of the Public Transport Dispatch Systems Information and Traffic Lights Control

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 315 - 324

Zusammenfassung

Abstract

The article is dedicated to the multi agent approach for urban public transport dispatch system to organize priority transfer management, based on interaction with traffic lights control system. The article deals with the issue of urban passenger transport priority transfer of signalized intersections. Priority transfer management algorithm developed by the authors based on interaction of traffic lights control and public transport dispatch systems. The authors considered the role of agents in interaction process of traffic lights control and public transport dispatch systems for implementation of the buses priority passage. Criterion for decision making taking into account savings and loses of time of all participants of traffic at the intersection. The results of simulation modelling of priority public transport passage a signalized intersection are presented

Schlüsselwörter

  • urban passenger transport
  • signalized intersections
  • priority transfer management algorithm
  • transport dispatch system
  • passenger vehicle
  • GPSS
access type Uneingeschränkter Zugang

Data and Cyber Security in Autonomous Vehicle Networks

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 325 - 334

Zusammenfassung

Abstract

An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.

Schlüsselwörter

  • autonomous vehicle
  • cyber attack
  • road safety
access type Uneingeschränkter Zugang

Analysis of Crowd Flow Parameters Using Artificial Neural Network

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 335 - 345

Zusammenfassung

Abstract

Research scientists have been developing mathematical tools to detect objects, recognize objects and actions, and discover behaviours and events to human abilities. In all these efforts, the understanding of human actions is of a special interest for both application and research purposes. In this study, crowd flow parameters are analysed by considering linear and non linear relationships between stream flow parameters using conventional and soft computing approach. Deterministics models like Greenshield and Underwood were applied in the study to describe flow characteristics. A non-linear model based on Artificial Neural Network (ANN) approach is also used to build a relationship between different crowd flow parameters and compared with the other deterministic models. ANN model gave good results based on accuracy measurement to deterministic models because of their self-processing and intelligent behaviour. Mean absolute error (MAE) and root mean square error (RMSE) values for the best fitted ANN model are less than those for the other models. ANN model gives better performance in fitness of model and future prediction of flow parameters.

Schlüsselwörter

  • ANN
  • deterministic models
  • Greenshield
  • Macroscopic flow diagram
  • MAE
  • RMSE
access type Uneingeschränkter Zugang

Designing the Analytical Base for Optimal Allocation of Stocks in Supply Chains

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 346 - 355

Zusammenfassung

Abstract

The carried out studies show that from the point of view of the issue of efficiency increase of logistical systems, there are several key aspects. Firstly, choice of methods for managing the triad of logistics functions ‘inventory management - warehousing – transportation’, where the inventory management issues are considered as the most relevant ones. Secondly, there is recognized the need to move the studies of multi-level systems within the framework of the concept of supply chain management.

Nowadays, supply chains, which are represented by the distribution system, are widespread in practice. The most common of them are two-level ones with a central supplier at the second level and a certain number of companies at the first level; and multi-level systems of the distribution configuration network in which multi-nomenclature stocks are located. The article is devoted to the design and enhancement of analytical platform for inventory management in such distribution systems.

Schlüsselwörter

  • inventory management
  • multi-level distribution systems
  • integrated models
access type Uneingeschränkter Zugang

Risk and Damage Assessment for Transportation of Dangerous Freight

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 356 - 363

Zusammenfassung

Abstract

The article provides information on transportation of dangerous freight. Legal acts regulating transportation of Dangerous freight are discussed. Major problems and non-compliances with The European Agreement concerning International Carriage of Dangerous Goods by Road (ADR) are distinguished. The type of risk that one encounters is analysed, as well as who is to take responsibility for transportation of dangerous freight. Transport accidents of dangerous substances are increasingly frequent and can cause serious injuries in inhabited areas or pollution of the environment. For quantitative risk assessment and mitigation planning, consequence calculations are necessary. The aim of this article is to present methods of the first approach for calculating costs and overall expenses of an accident and to demonstrate the main recommendations for the next development stage in the area of transport accident modelling. By the means of risk assessment models, it is possible to calculate the extent of the consequences and reduce the risks during the process of transportation. Based on Technology of Dangerous Freight Transportation, the accident calculation principles are suggested, which enables to assess the costs and to find a generalized accident rate. The calculation results are provided.

Schlüsselwörter

  • dangerous freight
  • transportation
  • safety
  • road transport
  • risk
access type Uneingeschränkter Zugang

Demand Data Modelling for Microscopic Traffic Simulation

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 364 - 371

Zusammenfassung

Abstract

The current paper aim is to present the technique of demand data modelling for microscopic simulation of the traffic flows. Traffic microscopic simulation is a powerful decision supporting tool, which could be applied for a wide range of tasks. In a past microscopic traffic simulation was used to test local changes in transport infrastructure, but the growth of computers performance allows now to simulate wide-scale fragments of the traffic network and to apply more advanced traffic flow simulation approaches, like an example dynamic assignment (DA). The results, obtained in the frame of this research are part of the project completed for one of the shopping malls (Riga, Latvia). The goal of the project was to evaluate different development scenarios of the transport network to raise the accessibility of the shopping mall. The number of practical issues in the frame of this project pushed to develop a new technique to model the demand data for the simulation model. As a traffic flow simulation tool, the PTV VISSIM simulation software was applied. The developed model was based on dynamic assignment approach. To complete the simulation the demand data was represented in two forms: 1) OD matrix for regular traffic in the transport network; 2) trip-chain file for a description of the pass-by and targeted trips.

Schlüsselwörter

  • Demand modelling
  • OD matrix
  • Trip chain file
10 Artikel
access type Uneingeschränkter Zugang

A Priority-Based Multichannel Mac to Support the Non-Safety Applications in SCH Interval at RSU in V2I Communication

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 269 - 283

Zusammenfassung

Abstract

The transmission of safety applications in VANET is clearly the top concern. However, the non-safety applications, which improve the quality of experience, as well as the efficiency of the traffic, also need to be paid more attention. In VANET, the safety applications are transmitted in control channel interval and the non-safety applications can be transmitted only in service channel interval. In this paper, we propose a priority-based multichannel MAC to support the non-safety applications in service channel interval in Vehicle-to-Infrastructure communication with the presence of roadside unit. The novel MAC also allocates service channel according to the priority and divides the vehicles, which have the same required service channel, into four priority groups to enhance the EDCA mechanism. We use the mathematical model and the simulation for evaluating the performance under the influence of velocity with a different number of vehicles in the network.

Schlüsselwörter

  • non-safety applications
  • MAC
  • RSU
  • SCH
  • V2I
  • VANET
access type Uneingeschränkter Zugang

The Lz-Transform Method for the Reliability and Fault Tolerance Assessment of Norilsk-Type Ship’s Diesel-Geared Traction Drives

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 284 - 293

Zusammenfassung

Abstract

This paper focuses on a comparative analysis of the most important parameters of an icebreaker ship’s sustainable operations: the operational availability, power performance and power performance deficiency of the multi-state Multi-Power Source Traction Drives of Norilsk-type Arctic icebreaker ships. These parameters have a significant impact on the correct choice of the propulsive system of icebreaking vessels. The parameters’ evaluation was based on statistical operational data on Arctic icebreaker ships with diesel-geared traction drive. The Lz-transform approach was used to arrive at a solution of that problem. This approach drastically simplifies the solution compared with the straightforward Markov method.

Schlüsselwörter

  • Multi-Power Source Traction Drive
  • icebreaker ship
  • multi-state systems reliability
  • -transform method
  • availability
  • power performance
  • power performance deficiency
access type Uneingeschränkter Zugang

Spatial Distribution of Oil Spills at the Sea Surface in the Southeastern Baltic Sea According to Satellite Sar Data

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 294 - 300

Zusammenfassung

Abstract

Statistical analysis of the spatial distribution of oil spills detected using Synthetic Aperture Radars (SAR) in 2004-2015 at the sea surface in the Southeastern Baltic Sea was conducted. Number, area, and shape of oil pollution division between Exclusive Economic Zones (EEZ) of Poland, Russia, and Lithuania were estimated for the first time. The most polluted area of the Southeastern Baltic Sea is Russian EEZ, where 55% of the total amount of detected oil spills, and 52% of the total area of oil pollution were located. The average area of an oil spill detected within Territorial Sea (TS) and EEZ was estimated. Tail-shaped spills associated with oil discharge from the moving vessels are prevailed, and their amount and area within TS and EEZ were estimated.

Schlüsselwörter

  • Oil spills
  • synthetic aperture radar (SAR)
  • Southeastern Baltic
  • tail-shaped spill
  • Territorial Sea (TS)
  • Exclusive Economic Zone (EEZ)
access type Uneingeschränkter Zugang

The Air Cargo Carrying Potential of The Airbus A350-900XWB and Boeing 787-9 Aircraft on Their Ultra-Long-Haul Flights: A Case Study for Flights from San Francisco to Singapore

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 301 - 314

Zusammenfassung

Abstract

The introduction of the Airbus A350-900 (A359) and the Boeing B787-9 (B789) have enabled airlines to operate ultra-long-range services. Using a mixed methods research design, this study has examined the air cargo-carrying potential of Singapore Airlines Airbus A350-900XWB (A359) and United Airlines Boeing B787-9 (789) aircraft on their ultra-long-haul San Francisco to Singapore and the Singapore to San Francisco air routes. The qualitative data was analysed using document analysis, and the air cargo payload was modelled by simulation. The air cargo-carrying potential of the two aircraft types was significantly influenced by enroute weather. In the event of eastbound winds, the Singapore Airlines Airbus A350-900XWB air cargo payload was 16.9 tonnes and the United Airlines Boeing 787-9 was 11.5 tonnes, when these flights had a full passenger payload. In the case of westbound winds with a full passenger payload, the Singapore Airlines Airbus A350-900XWB air cargo payload was 13.1 tonnes and the United Airlines Boeing 787-9 was 7.9 tonnes. When there were no winds on the air routes, the Singapore Airlines Airbus A350-900XWB offered 15.0 tonnes and the United Airline Boeing 787-9 offered 9.7 tonnes of air cargo payload, respectively.

Schlüsselwörter

  • air cargo
  • air cargo capacity
  • airlines
  • ultra-long-range flights
  • payload-range envelopes
  • passenger transportation
  • simulation
access type Uneingeschränkter Zugang

Priority Transfer Management Algorithm, Based on Interaction of the Public Transport Dispatch Systems Information and Traffic Lights Control

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 315 - 324

Zusammenfassung

Abstract

The article is dedicated to the multi agent approach for urban public transport dispatch system to organize priority transfer management, based on interaction with traffic lights control system. The article deals with the issue of urban passenger transport priority transfer of signalized intersections. Priority transfer management algorithm developed by the authors based on interaction of traffic lights control and public transport dispatch systems. The authors considered the role of agents in interaction process of traffic lights control and public transport dispatch systems for implementation of the buses priority passage. Criterion for decision making taking into account savings and loses of time of all participants of traffic at the intersection. The results of simulation modelling of priority public transport passage a signalized intersection are presented

Schlüsselwörter

  • urban passenger transport
  • signalized intersections
  • priority transfer management algorithm
  • transport dispatch system
  • passenger vehicle
  • GPSS
access type Uneingeschränkter Zugang

Data and Cyber Security in Autonomous Vehicle Networks

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 325 - 334

Zusammenfassung

Abstract

An autonomous vehicle (AV) is a vehicle that operates and performs tasks under its own power. Some features of autonomous vehicle are sensing the environment, collecting information and managing communication with other vehicles. Many autonomous vehicles in development use a combination of cameras, sensors, GPS, radar, LiDAR, and on-board computers. These technologies work together to map the vehicle’s position and its proximity to everything around it. Because of their reliance on these sorts of technologies, which are easily accessible to tampering, a autonomous vehicles are susceptible to cyber attacks if an attacker can discover a weakness in a certain type of vehicle or in a company’s electronic system. This lack of information security can lead to criminal and terrorist acts that eventually cost lives. This paper gives an overview of cyber attack scenarios relating to autonomous vehicles. The cyber security concept proposed here uses biometric data for message authentication and communication, and projects stored and new data based on iris recognition. Iris recognition system can provide other knowledge about drivers as well, such as how tired and sleepy they might be while driving, and they are designed to encrypt the vehicle-to-vehicle and vehicle-to-environment communication based on encryption security mechanisms.

Schlüsselwörter

  • autonomous vehicle
  • cyber attack
  • road safety
access type Uneingeschränkter Zugang

Analysis of Crowd Flow Parameters Using Artificial Neural Network

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 335 - 345

Zusammenfassung

Abstract

Research scientists have been developing mathematical tools to detect objects, recognize objects and actions, and discover behaviours and events to human abilities. In all these efforts, the understanding of human actions is of a special interest for both application and research purposes. In this study, crowd flow parameters are analysed by considering linear and non linear relationships between stream flow parameters using conventional and soft computing approach. Deterministics models like Greenshield and Underwood were applied in the study to describe flow characteristics. A non-linear model based on Artificial Neural Network (ANN) approach is also used to build a relationship between different crowd flow parameters and compared with the other deterministic models. ANN model gave good results based on accuracy measurement to deterministic models because of their self-processing and intelligent behaviour. Mean absolute error (MAE) and root mean square error (RMSE) values for the best fitted ANN model are less than those for the other models. ANN model gives better performance in fitness of model and future prediction of flow parameters.

Schlüsselwörter

  • ANN
  • deterministic models
  • Greenshield
  • Macroscopic flow diagram
  • MAE
  • RMSE
access type Uneingeschränkter Zugang

Designing the Analytical Base for Optimal Allocation of Stocks in Supply Chains

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 346 - 355

Zusammenfassung

Abstract

The carried out studies show that from the point of view of the issue of efficiency increase of logistical systems, there are several key aspects. Firstly, choice of methods for managing the triad of logistics functions ‘inventory management - warehousing – transportation’, where the inventory management issues are considered as the most relevant ones. Secondly, there is recognized the need to move the studies of multi-level systems within the framework of the concept of supply chain management.

Nowadays, supply chains, which are represented by the distribution system, are widespread in practice. The most common of them are two-level ones with a central supplier at the second level and a certain number of companies at the first level; and multi-level systems of the distribution configuration network in which multi-nomenclature stocks are located. The article is devoted to the design and enhancement of analytical platform for inventory management in such distribution systems.

Schlüsselwörter

  • inventory management
  • multi-level distribution systems
  • integrated models
access type Uneingeschränkter Zugang

Risk and Damage Assessment for Transportation of Dangerous Freight

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 356 - 363

Zusammenfassung

Abstract

The article provides information on transportation of dangerous freight. Legal acts regulating transportation of Dangerous freight are discussed. Major problems and non-compliances with The European Agreement concerning International Carriage of Dangerous Goods by Road (ADR) are distinguished. The type of risk that one encounters is analysed, as well as who is to take responsibility for transportation of dangerous freight. Transport accidents of dangerous substances are increasingly frequent and can cause serious injuries in inhabited areas or pollution of the environment. For quantitative risk assessment and mitigation planning, consequence calculations are necessary. The aim of this article is to present methods of the first approach for calculating costs and overall expenses of an accident and to demonstrate the main recommendations for the next development stage in the area of transport accident modelling. By the means of risk assessment models, it is possible to calculate the extent of the consequences and reduce the risks during the process of transportation. Based on Technology of Dangerous Freight Transportation, the accident calculation principles are suggested, which enables to assess the costs and to find a generalized accident rate. The calculation results are provided.

Schlüsselwörter

  • dangerous freight
  • transportation
  • safety
  • road transport
  • risk
access type Uneingeschränkter Zugang

Demand Data Modelling for Microscopic Traffic Simulation

Online veröffentlicht: 30 Nov 2018
Seitenbereich: 364 - 371

Zusammenfassung

Abstract

The current paper aim is to present the technique of demand data modelling for microscopic simulation of the traffic flows. Traffic microscopic simulation is a powerful decision supporting tool, which could be applied for a wide range of tasks. In a past microscopic traffic simulation was used to test local changes in transport infrastructure, but the growth of computers performance allows now to simulate wide-scale fragments of the traffic network and to apply more advanced traffic flow simulation approaches, like an example dynamic assignment (DA). The results, obtained in the frame of this research are part of the project completed for one of the shopping malls (Riga, Latvia). The goal of the project was to evaluate different development scenarios of the transport network to raise the accessibility of the shopping mall. The number of practical issues in the frame of this project pushed to develop a new technique to model the demand data for the simulation model. As a traffic flow simulation tool, the PTV VISSIM simulation software was applied. The developed model was based on dynamic assignment approach. To complete the simulation the demand data was represented in two forms: 1) OD matrix for regular traffic in the transport network; 2) trip-chain file for a description of the pass-by and targeted trips.

Schlüsselwörter

  • Demand modelling
  • OD matrix
  • Trip chain file

Planen Sie Ihre Fernkonferenz mit Scienceendo