排序方式: 共有13条查询结果,搜索用时 24 毫秒
1.
2.
3.
城市交叉口交通流特征与短时预测模型 总被引:11,自引:0,他引:11
时间尺度大于15 min的城市交通流预测模型已无法满足交通信号实时控制和交通信息实时发布的需求, 通过对广州市中心区交叉路口交通流长期观察和数据采集, 分析了各种时间尺度的交通流特性, 提出以路口信号周期作为时间尺度, 绿灯流率作为变量的ARIMA (p, d, q) 短时交通预测模型。以1个和3个信号周期的时间尺度为例, 对城市交叉路口不同时间段交通流进行建模和预测。结果表明ARIMA (p, d, q) 预测模型结构稳定, 算法简单, 时间尺度为3个信号周期的预测模型可以很好地保持交通流特征, 均方根误差为0.015 9, 预测精度较高。 相似文献
4.
分析湖南省高速公路可变信息标志的应用现状,指出存在的问题与误区,并从可变信息发布系统应用功能的角度.对高速公路可变信息标志设备选型、规模确定、布点及显示内容等关键性问题进行了深入的分析和探讨。 相似文献
5.
6.
为了分析基质沥青中橡胶粉掺量对Sasobit温拌橡胶沥青短期老化性能影响,进行了老化前后25℃针入度、软化点、180℃旋转黏度以及25℃弹性恢复试验,并计算其25℃残留针入度比、软化点增量、180℃旋转黏度比以及25℃弹性恢复比。研究结果表明:在基质沥青中掺入橡胶粉,有助于提高Sasobit温拌橡胶沥青的抗短期老化性能;短期老化使得橡胶粉进一步溶胀;当橡胶粉掺量多于20%时,Sasobit温拌橡胶沥青流动性变差,老化后黏度快速增大,黏度比增大较快,抗短期老化能力略有降低。 相似文献
7.
8.
Waveform audio (WAV) file is a widely used file format of uncompressed audio. With the rapid development of digital media technology, one can easily insert duplicated segments with powerful audio editing software, e.g. inserting a segment of audio with negative meaning into the existing audio file. The duplicated segments can change the meaning of the audio file totally. So for a WAV file to be used as evidence in legal proceedings and historical documents, it is very importance to identify if there are any duplicated segments in it. This paper proposes a method to detect duplicated segments in a WAV file. Our method is based on the similarity calculation between two different segments. Duplicated segments are prone to having similar audio waveform, i.e., a high similarity. We use fast convolution Mgorithm to calculate the similarity, which makes our method quit efficient. We calculate the similarity between any two different segments in a digital audio file and use the similarity to judge which segments are duplicated. Experimental results show the feasibility and efficiency of our method on detecting duplicated audio segments. 相似文献
9.
This paper proposes an efficient batch secret sharing protocol among n players resilient to t < n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network. 相似文献