The objective of this work is to develop a novel feature for traffic flow models, when traffic queues on two-way arterials periodically extend until then they block an upstream signal in oversaturated conditions. The ...The objective of this work is to develop a novel feature for traffic flow models, when traffic queues on two-way arterials periodically extend until then they block an upstream signal in oversaturated conditions. The new model, proposed as conditional cell transmission model (CCTM) has been developed with two improvements. First, cell transmission model (CTM) is expanded for two-way arterials by taking account of all diverging and merging activities at intersections. Second, a conditional cell is added to simulate periodic spillback and blockages at an intersection. The results of experiments for a multilane, two-way, three-signal sample network demonstrate that CCTM can accommodate various traffic demands and accurate representation of blockages at intersections. The delay of left turns is underestimated by 40 % in moderate conditions and by 58% in oversamrated condition when using the CTM rather than CCTM. Finally, the consistency between HCS 2000 and CCTM shows that CCTM is a reliable methodology of modeling traffic flow in oversaturated condition.展开更多
Highway capacity is defined as maximum volume of traffic flow through the particular highway section under given traffic conditions, road conditions and so on. Highway construction and management is judged by capacity...Highway capacity is defined as maximum volume of traffic flow through the particular highway section under given traffic conditions, road conditions and so on. Highway construction and management is judged by capacity standard. The reasonable scale and time of highway construction, rational network structure and optimal management mode of highway network can be determined by analyzing the fitness between capacity and traffic volume. All over the world, highway capacity is studied to different extent in different country. Based on the gap acceptance theory, the mixed traffic flow composed of two representative vehicle types heavy and light vehicles is analyzed with probability theory. Capacity model of the minor mixed traffic flows crossing m major lanes, on which the traffic flows fix in with M3 distributed headway, on the unsignalized intersection is set up, and it is an extension of minor lane capacity theory for one vehicle-type and one major-lane traffic flow.展开更多
We make some efforts to find some connections between religion and medical science. Medical science can be regarded as sacred and holy as a religion for doctors to believe. The common points between them are the basis...We make some efforts to find some connections between religion and medical science. Medical science can be regarded as sacred and holy as a religion for doctors to believe. The common points between them are the basis to successfully integrate them into doctors' faith. Furthermore, we explain that doctors need a faith to believe so as to meet the demand of humanitarian traits we should have and to do better in the scientific work and win in the battles with the diseases.展开更多
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective nois...In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.展开更多
基金Project(51108343) supported by the National Natural Science Foundation of ChinaProject(06121) supported by University of Transportation Center for Alabama,USA
文摘The objective of this work is to develop a novel feature for traffic flow models, when traffic queues on two-way arterials periodically extend until then they block an upstream signal in oversaturated conditions. The new model, proposed as conditional cell transmission model (CCTM) has been developed with two improvements. First, cell transmission model (CTM) is expanded for two-way arterials by taking account of all diverging and merging activities at intersections. Second, a conditional cell is added to simulate periodic spillback and blockages at an intersection. The results of experiments for a multilane, two-way, three-signal sample network demonstrate that CCTM can accommodate various traffic demands and accurate representation of blockages at intersections. The delay of left turns is underestimated by 40 % in moderate conditions and by 58% in oversamrated condition when using the CTM rather than CCTM. Finally, the consistency between HCS 2000 and CCTM shows that CCTM is a reliable methodology of modeling traffic flow in oversaturated condition.
基金Supported by the National Natural Science Foundation of China(50478071)
文摘Highway capacity is defined as maximum volume of traffic flow through the particular highway section under given traffic conditions, road conditions and so on. Highway construction and management is judged by capacity standard. The reasonable scale and time of highway construction, rational network structure and optimal management mode of highway network can be determined by analyzing the fitness between capacity and traffic volume. All over the world, highway capacity is studied to different extent in different country. Based on the gap acceptance theory, the mixed traffic flow composed of two representative vehicle types heavy and light vehicles is analyzed with probability theory. Capacity model of the minor mixed traffic flows crossing m major lanes, on which the traffic flows fix in with M3 distributed headway, on the unsignalized intersection is set up, and it is an extension of minor lane capacity theory for one vehicle-type and one major-lane traffic flow.
文摘We make some efforts to find some connections between religion and medical science. Medical science can be regarded as sacred and holy as a religion for doctors to believe. The common points between them are the basis to successfully integrate them into doctors' faith. Furthermore, we explain that doctors need a faith to believe so as to meet the demand of humanitarian traits we should have and to do better in the scientific work and win in the battles with the diseases.
基金supported by the National Natural Science Foundation of China(Grant No.11375152 and 61402407)the Natural Science Foundation of Zhejiang Province(Grant No.LQ12F02012)
文摘In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.