Search:

  • international journal of traffic safety

Search Options

Sort by:

Publication Type:

Open access:

Publication Date:

Periodicals:

Search results

Online since: June 2014
Authors: B. Kannega, K. Latha, B. Gowsalya
Drop box also recommended that users improve their online safety by setting a unique password for each website they use.
A honey pot should see no traffic because it has no legitimate activity.
[3] Rashmi, Dr, G.Sahoo, Dr.S.Mehfuz, “Securing Software as a Service Model of Cloud Computing: Issues and solutions”, in International Journal on Cloud Computing, 4th August 2013
Sahu,”Securing cloud environment by means of Intrusion Detection and Prevention system”, in International Journal of Computer Science and Management Research, May 5 2013
[8] Parsi Kalpana,Sudha Singaraju,”Data Security in Cloud Computing using RSA Algorithm”, at International Journal of Research in Computer and Communication Technology, September 4,2012
Online since: May 2011
Authors: Xu Hui He, Hai Tao Wu
Journal of structural engineering, Vol. 121, No. 11, 1995, pp. 1651-1659
Chen: Structural Safety Monitoring for Nanjing Yangtze River bridge.
International Journal of Solids and Structures, Vol. 39, No.9, 2002, pp. 2401-2417
Journal of Applied Mechanics, Vol. 12, No. 3, 1945, pp. 159-164
Journal of Shijiazhuang Railway Institute, Vol. 9, No.2, 1996, pp.49-53.
Online since: January 2021
Authors: Mohamed Saad Bajjou, Anas Chafi
S., and Chafi, A., Empirical study of schedule delay in Moroccan construction projects, International Journal of Construction Management, 20 (2020) 783-800
A., Nikakhtar, A., and Ghoddousi, P., Flow Production of Construction Processes through Implementing Lean Construction Principles and Simulation, International Journal of Engineering and Technology, 4 (2012) 475-479
Y., and Zavichi, A., Application of lean construction principles to reduce construction process waste using computer simulation: a case study, International Journal of Services and Operations Management, 20 (2015) 461-480
Malaysian Construction Research Journal, 26 (2018) 67-87
A., and Rajgopal, J., Analyzing the benefits of lean manufacturing and value stream mapping via simulation: A process sector case study, International Journal of production economics, 107 (2007) 223-236
Online since: May 2014
Authors: Jin Meng, Yu Yang Du, Xiao Zhang
Format IPv6 packet contains an 8-bit traffic class and a 20-bit flow label.
Package can be configured to use ESP or AH authentication to ensure the safety of the routing protocol packets.
In order to build a secure network, we should also take other safety measures, such as: the use of firewalls, intrusion detection systems and other traditional safety devices.
[2] Li Juan, Lu Hanyu, Wang Huajun, The safety technical analysis based on IPv6, J.
Journal of chifeng institute (Natural Science), 2 (2011) 54-55
Online since: April 2014
Authors: Giosuè Boscato, Alessandra Dal Cin
In OMA approach the unknown environmental loads (traffic, wind and waves) - that for the traditional techniques the background noise becomes a problem - are used as the basis of the testing and subsequent modal analysis [5].
In Safety and Security Engineering, Brebbia CA, Bucciarelli T, Garzia F, Guarascio M (eds).
Journal of Intelligent Material Systems and Structures 2007; 18:793–807
Tralli (2012), Seismic Behaviour of a Complex Historical Church in L'Aquila, in INTERNATIONAL JOURNAL OF ARCHITECTURAL, ISSN: 1558-3066, doi: 10.1080/15583058.2012.736013 [11] G.
Bridge Maintenance, Safety Management, Health Monitoring and Informatics: Proceedings of the Fourth International Conference on Bridge Maintenance, Safety and Management.
Online since: October 2011
Authors: Hong Nan Li, Guo Jun Zhang, Yong Gang Tan
The anchorage adopts the hollow triangular frame structure, breaking through the physical heavy structure of gravity anchorage; and the design of two wedge-shaped gravel bed foundations improves the anti-slip safety factor of the anchorage.
After completion of the Project, South Binhai Avenue will be an important horizontal trunk road in the “seven vertical and seven horizontal” of the future traffic network in Dalian and an important part of the south ring of Dalian Ring Expressway.
Except for oblique shear plane shear stress calculation and sliding safety factor checking, it is required to ensure that the concrete of anchor blocks has a certain reinforcement ratio.
[3] Park S.Z., Jeong G.H., Matsui Tamotsu, Hirai Masaya, Suwa Seiji, Deep foundation for offshore structure: The Kwang-An Grand Bridge, Proceedings of the International Offshore and Polar Engineering Conference, vol1 (1999) 639-645
Kockar, Design of anchorage and assessment of the stability of openings in silty, sandy limestone: a case study in Turkey, International Journal of Rock Mechanics & Mining Sciences 41 (2004) 37-49
Online since: February 2011
Authors: Wen Zhong Zhao, Bing Zhi Chen, Zhi Dong Lv, Su Ming Xie
Traffic accident has become the major killer in the world, presenting great threaten to economic development and life safety.
Chinese Journal of Numerical mathematics and applications in china,29(1)(2007)
Journal of China Agricultural University in china. 10(1): 81-85(2005)
Journal of Changsha Communications University in china, 15(2): 17-21(1999)
International Journal of Impact Engineering. 32: 759-777(2006)
Online since: December 2014
Authors: Ming Ye Zhang, Zhi Jia Lin
This transport is considered as an efficient solution for heavy traffic load and rapid transit requirement.
And single moment method is preferred because of the balance between safety and amount of calculation.
Zhang, On the inverse power laws for accelerated random fatigue testing, International Journal of Fatigue, Vol.30 (6):967–977. (2007) [3] ABAQUS documentation
Cebon, Predicting fatigue lives for modal stress spectral densities, International Journal of Fatigue, 22:11–21. (2000) [5] EN1993: Eurocode 3, Design of steel structures, 2006 [6] J.
Online since: November 2013
Authors: Ming Liang Zhu, Meng Liu, Min Jing Peng, Bo Li
Identifying user behavior by analyzing web server access log file, International Journal of Computer Science and Network Securit, vol. 9, pp. 327-332, 2009 [3] Y.
Journal of Service Management, vol. 24, pp. 170-190, 2013
Journal of Systems and Software, vol. 86, pp. 12–20, 2013
Android Vs iOS: An analysis, International journal of Computer Engineering & Technology. vol. 4, pp. 377-382, 2013
International Journal of Internet Marketing and Advertising, vol. 5, pp. 74-94, 2009.
Online since: March 2014
Authors: Ting Yao Jiang, Peng Chen, Ben Can Gong, Shou Zhi Xu
TSP has very high application value in circuit board wiring, VLSI chip design, robot control, traffic routes and other areas.
Batouche: IEEE International Conference on Industrial Technology (Hammamet, Tunisia, 2004), Vol. 3, p. 1192
[5] Yang Haiqing and Yang Haihong: International Conference on Neural Networks and Brain (Hangzhou, China, 2005), Vol. 1, p. 379
[6] Sun Lijuan, Wang Liangjun and Wang Ruchuan: Journal of China Institute of Communications, Vol. 25 (2004) No.10, p. 111
[7] Wang Xiwu, Wang Yongxin, Wang Yinlong and Jin Yican: International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (Chengdu, China, 2013), Vol. 1, p. 2055.
Showing 881 to 890 of 1563 items