Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: December 2012
Authors: Zhen Cun Li, Wen Li, Sheng Zeng
This phenomenon is a serious hidden trouble to the safety of high-speed driving.
International Journal forNumerical and Analytical Methods in Geomechanics, 1996, 20: 489-516
Chinese Journal of Geotechnical Engineering, 2008, 30(2):181-185
Chinese Journal of Rock Mechanics and Engineering, 2005, 24(15): 2709-2714
International Journal for Numerical and Analytical Methods in Geomechanics, 2002, 26:25-52.
International Journal forNumerical and Analytical Methods in Geomechanics, 1996, 20: 489-516
Chinese Journal of Geotechnical Engineering, 2008, 30(2):181-185
Chinese Journal of Rock Mechanics and Engineering, 2005, 24(15): 2709-2714
International Journal for Numerical and Analytical Methods in Geomechanics, 2002, 26:25-52.
Online since: October 2010
Authors: Ming Cheng E, Guo Qi Zhang, Ji Wu Wang
Crack inspection of bridges is indispensable to maintain the public traffic safety.
Michael: Journal of Computing in Civil Engineering (2003), pp.255~256 [2] T.
Roux: International Journal For Numerical Methods In Engineering(2008), pp.248~272 [8] Z.H.
Brilakis: Journal of Construction Engineering and Management(2010), pp.210~218 [9] J.K.
E: The Fifteenth International Symposium on Artificial Life and Robotics (Japan, 2010), pp.669~672 [11] J.S.
Michael: Journal of Computing in Civil Engineering (2003), pp.255~256 [2] T.
Roux: International Journal For Numerical Methods In Engineering(2008), pp.248~272 [8] Z.H.
Brilakis: Journal of Construction Engineering and Management(2010), pp.210~218 [9] J.K.
E: The Fifteenth International Symposium on Artificial Life and Robotics (Japan, 2010), pp.669~672 [11] J.S.
Online since: June 2010
Authors: Nian Peng Wang, Li Min Liu, Yan Jun Pang
Traffic and Logistic (The Sixth International Conference on Communications
and Transportation), (2006), P.117-121
Journal of Sichuan University, VOL. 36(2004), P. 98-102
Method of Second Fuzzy Comprehensive Safety Evaluation and Its Application to Oil Depot Safety Evaluation.
China Safety Science Journal, VOL. 17(2007), P. 135-138
Journal of Peking University , VOL. 33(1997), P. 12-19.
Journal of Sichuan University, VOL. 36(2004), P. 98-102
Method of Second Fuzzy Comprehensive Safety Evaluation and Its Application to Oil Depot Safety Evaluation.
China Safety Science Journal, VOL. 17(2007), P. 135-138
Journal of Peking University , VOL. 33(1997), P. 12-19.
Online since: August 2013
Authors: Xiao Xi Zhang, Ling Ling Yang, Wei Jiang, Yu Jie Li, Qian Su
Safety is the core of the railway transport [4].
Once the train speed reached 200km/h or more, even smaller disasters or accidents is also likely to lead to a major traffic accident on the railway, it seriously endanger the safety of state property and the lives of the passengers[7].
The train locomotive and 1-4 vehicles had derailed, the accident caused four deaths and 71 injured, Jiao Liu line interrupted traffic whole line.
It is a threat to railway lines and train traffic safety.
When monitoring specific work sites, we should be investigated local topography, environment, climate and safety level types to choose reasonable monitoring means. 2 home and abroad development status of the foreign matter invasion warning system With the growing national degree of attention on railway safety, related railway departments keep train safety as a priority and study the relevant safety technology as an important part of the high-speed railway construction.
Once the train speed reached 200km/h or more, even smaller disasters or accidents is also likely to lead to a major traffic accident on the railway, it seriously endanger the safety of state property and the lives of the passengers[7].
The train locomotive and 1-4 vehicles had derailed, the accident caused four deaths and 71 injured, Jiao Liu line interrupted traffic whole line.
It is a threat to railway lines and train traffic safety.
When monitoring specific work sites, we should be investigated local topography, environment, climate and safety level types to choose reasonable monitoring means. 2 home and abroad development status of the foreign matter invasion warning system With the growing national degree of attention on railway safety, related railway departments keep train safety as a priority and study the relevant safety technology as an important part of the high-speed railway construction.
Online since: August 2013
Authors: Ming Chen, Hai Sheng Yang, Qi Wang, Yang Shen Zhou, Zhen Shan Liu, Ren Qiang Gao
Moreover, stored procedures can reduce the network traffic and save network resource.
Therefore, it can reduce network traffic and CPU load.
Tao, Journal of Safety and Environment.
Wang, N.Chen, Safety Science.
IEEE 14th International Conference on Data Engineering, Orlando, 23-27 February 1998
Therefore, it can reduce network traffic and CPU load.
Tao, Journal of Safety and Environment.
Wang, N.Chen, Safety Science.
IEEE 14th International Conference on Data Engineering, Orlando, 23-27 February 1998
Online since: February 2013
Authors: Jian Shu Gao, Jie Han
Airport runway friction coefficient test vehicle is the key equipment to test the runway friction coefficient, it's test precision directly affects the safety of aircraft.
The international civil aviation organization prescribed slip ratio is 12%.How to maintain this value is a key part.
Journal of Natural Science of Hunan Normal University,2009,32(3)
A Multiple SVR Approach with TimeLags for Traffic Flow Prediction.
In Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems.
The international civil aviation organization prescribed slip ratio is 12%.How to maintain this value is a key part.
Journal of Natural Science of Hunan Normal University,2009,32(3)
A Multiple SVR Approach with TimeLags for Traffic Flow Prediction.
In Proceedings of the 11th International IEEE Conference on Intelligent Transportation Systems.
Online since: October 2011
Authors: Hong Ke Xu, Nai Quan Sun, Yong Mei Yang
Introduction
Safety Driving Assist (SDA) is the important research subject in the research of intelligent transportation system recently, which mainly solves the traffic security problems.
The chance of traffic accident caused by lane departure of vehicles under different visibility conditions is more numerous.
It identify lane line in front of vehicles, warning tired or inattention drivers to fixed driving directions, and provide navigation after decision and analysis , help driver safe driving ,thus reduce traffic accidents and improve the expressway safety.
“On board vision system for lane recognition and front vehicle detection to enhance driver’s awareness,” IEEE International Conference on Robotics & Automation.
“Researches on road recognition in landsat TM images,” Journal of Remote Sensing, vol9, NO.2, 2005, pp.220-224.
The chance of traffic accident caused by lane departure of vehicles under different visibility conditions is more numerous.
It identify lane line in front of vehicles, warning tired or inattention drivers to fixed driving directions, and provide navigation after decision and analysis , help driver safe driving ,thus reduce traffic accidents and improve the expressway safety.
“On board vision system for lane recognition and front vehicle detection to enhance driver’s awareness,” IEEE International Conference on Robotics & Automation.
“Researches on road recognition in landsat TM images,” Journal of Remote Sensing, vol9, NO.2, 2005, pp.220-224.
Online since: January 2014
Authors: Zhi Qiang Liu, Peng Wang
Without a good visually, drivers can not get favorable basis to make a driving decision to ensure driving safety.
When gazes sustained behavior is shorter, and it has little effect on driving safety.
Journal of Illuminating Engineering Society of North America, 2012, 9(1): 9-23 [3] Toriyama, Masashi.
Visual function in professional truck drivers [J].International Arch Occupy Environment Health, 1998, 7(1):357-362
IEEE International Conference on Systems, Man and Cybernetics,2005,2:1764~1770
When gazes sustained behavior is shorter, and it has little effect on driving safety.
Journal of Illuminating Engineering Society of North America, 2012, 9(1): 9-23 [3] Toriyama, Masashi.
Visual function in professional truck drivers [J].International Arch Occupy Environment Health, 1998, 7(1):357-362
IEEE International Conference on Systems, Man and Cybernetics,2005,2:1764~1770
Online since: October 2014
Authors: Shi Da Zhao, Nan Zhang, Ying Zhao
Journal of University of Shanghai for Science and Technology, 2006 (1): 19-22
Journal of traffic and Transportation Engineering, 2011,2(4): 114-120
Fire Safety Science, 2007, 16(3): 175-179
Journal of Computer Applications, 2012, 32(6):1753-1756
ICROS-SICE International Joint Conference 2009, 8: 5040-5045
Journal of traffic and Transportation Engineering, 2011,2(4): 114-120
Fire Safety Science, 2007, 16(3): 175-179
Journal of Computer Applications, 2012, 32(6):1753-1756
ICROS-SICE International Joint Conference 2009, 8: 5040-5045
Online since: January 2015
Authors: Tao Li
Any suspicious traffic on the local client does not recognize to be the first time to the background of cloud testing center, the use of cloud computing capabilities to detect quickly locate resolve security threats, and threats to security protocol features pushed to all clients or safety gateway, thereby making the entire cloud client and security gateway detection capability with this unknown threat, the client and the cloud coupling has been further strengthened.
References [1] Y Enzi CC, EI-Hoiydi A., Decotignie J.D., Peiris V, WiseNET: Journal of Nanjing University of Posts and Telecommunications, Vo1. 4 (2010) No. 26, p.20-29
[3] Fok CL, Li Changhong, etc.: First International Conference on Advances in Future Internet, Vo1. 34 (2009) No. 11, p. 1608-1618
[4] Sun Qibo: Journal of Anhui University of Technology, Vo1. 23 (2010) No. 26, p. 786-793
[5] Liu Jie, Li Shan: Journal of Wuhan Institute of Technology, Vo1. 31 (2007) No.27, p. 260-264.
References [1] Y Enzi CC, EI-Hoiydi A., Decotignie J.D., Peiris V, WiseNET: Journal of Nanjing University of Posts and Telecommunications, Vo1. 4 (2010) No. 26, p.20-29
[3] Fok CL, Li Changhong, etc.: First International Conference on Advances in Future Internet, Vo1. 34 (2009) No. 11, p. 1608-1618
[4] Sun Qibo: Journal of Anhui University of Technology, Vo1. 23 (2010) No. 26, p. 786-793
[5] Liu Jie, Li Shan: Journal of Wuhan Institute of Technology, Vo1. 31 (2007) No.27, p. 260-264.