Search results
Jump to navigation
Jump to search
- ...39B (2).</ref><ref>Daganzo, Carlos F. 2006. "On the variational theory of traffic flow: well-posedness, duality and applications". Networks and Heterogeneous ...study period where traffic past upstream detector (U) is unrestricted and traffic past downstream detector (D) is restricted so that waves from both boundari ...10 KB (1,669 words) - 02:29, 29 May 2021
- ...rbulence model in combustion|the traffic flow model|Biham–Middleton–Levine traffic model}} Assuming constant pressure and constant molecular weight, ideal gas law can be shown to reduce to ...4 KB (740 words) - 22:47, 11 December 2023
- ...linger, M. S. Taqqu, D. V. Wilson, "On the self-similar nature of Ethernet traffic", ACM SIGCOMM Computer Communication Review 25,202-213,1995.</ref> ...e [[spectral density]] function of long-range dependence follows a [[power law]] near the origin. Equivalently to <math>\gamma (t) \rightarrow t^{-\beta}L ...11 KB (1,820 words) - 00:43, 8 August 2021
- ...ed in business, economics, actuarial science, queueing theory and Internet traffic modeling.<ref>Lomax, K. S. (1954) "Business Failures; Another example of th * [[Power law]] ...7 KB (1,013 words) - 18:12, 25 February 2025
- ...link. Infineta Systems ceased operations by February 2013, a [[Liquidator (law)|liquidator]] was appointed, and its products will no longer be manufacture * {{cite web |title= Infineta Systems—WAN Optimization for Big Traffic |work= Company web site |url= http://www.infineta.com/ |url-status=dead |ar ...6 KB (755 words) - 17:06, 25 July 2024
- ...sts and improved visibility with the intention to reduce the likelihood of traffic incidents]] ...on Officials]] (AASHTO).<ref name="Garber">Garber, N.J., and Hoel, L., A., Traffic and Highway Engineering, 3rd Edition. Brooks/Cole Publishing, 2001</ref> O ...44 KB (6,747 words) - 01:45, 5 August 2024
- ...ent]] networks, the law takes the same form but with a different [[Scaling law|characteristic exponent]] {{Mvar|α}}. ...biomimetics|biomimetic engineering]], but human designs rarely exploit the law. ...18 KB (2,659 words) - 21:23, 5 December 2024
- * [[Traffic flow|Law of conservation in the kinematic wave model of traffic flow theory]] ...13 KB (1,449 words) - 10:46, 23 January 2025
- * [[Amdahl's law]] ...eed choices and driving behavior | journal=Transportation Research Part F: Traffic Psychology and Behaviour | publisher=Elsevier BV | volume=14 | issue=6 | is ...8 KB (1,220 words) - 18:45, 31 October 2024
- ...last4 = Stanley | first4 = H. E. | year = 2003 | title = A theory of power-law distributions in financial market fluctuations | journal = Nature | volume ...transport]]ation systems and it has been shown that "[[network topology]], traffic structure, and individual mobility patterns are all essential for accurate ...17 KB (2,346 words) - 04:56, 31 July 2024
- ...= 56–71 | year = 1959 }}</ref> This result is sometimes known as Kingman's law of congestion.<ref>{{Cite journal | last1 = Gans | first1 = N. | last2 = Ko ...12 KB (1,546 words) - 22:56, 19 February 2025
- ...tters is considered as noise, and when this [[noise]] is [[Gaussian]], the law of the typical Shannon channel capacity is then determined by that of the S ...stribution]].<ref name="lowen1990power">S. B. Lowen and M. C. Teich. Power-law shot noise. ''Information Theory, IEEE Transactions on'', 36(6):1302–1318, ...59 KB (8,607 words) - 07:51, 16 February 2025
- ...cryption standards and obtain master keys—either by agreement, by force of law, or by computer network exploitation ([[hacker (computer security)|hacking] ...gehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300."<ref name="nytimes1 ...37 KB (5,170 words) - 07:12, 18 February 2025
- ...tives. Electrification was cost effective due to the very high density of traffic and was at times projected to yield at least a 10% return on electrificatio Replacing steam traction (on lines with high traffic) by electrification was cost effective<ref>Дмитриев {{in lang|ru}} p.42; Ра ...49 KB (6,646 words) - 20:18, 8 January 2025
- ...arness Ireland Railroad Map 1838.png|thumb|left|250px|1838 map of railroad traffic in Ireland, one of the first thematic maps to use proportional symbols.]] ...rly attempt to portray point sizes proportionally, on an 1838 map of cargo traffic in Ireland (with [[Flow map|proportional widths]]) that showed city populat ...29 KB (4,345 words) - 01:13, 12 February 2025
- ...stead scale free, meaning that their degree distribution follows a [[power law]] of the form: ...ng|thumb|256px|right|Route map of the world's scheduled commercial airline traffic, 2024. This network evolves continuously as new routes are scheduled or can ...15 KB (2,137 words) - 19:46, 24 January 2025
- Using [[Ampère's circuital law]], it can be shown that the magnetic flux density <math>B</math> induced by ...ple, their durability and quick operation can make them valuable in a high-traffic office environment where electronic authentication is necessary. ...15 KB (2,367 words) - 13:35, 18 January 2025
- ...3000 [[Kelvin|K]], while the national [[France|French]] light pollution [[law]] restricts CCT to maximum 3000 K in most areas, and 2400 K or 2700 K in [[ ...Revision of the EU Green Public Procurement Criteria for Road Lighting and traffic signals |number= EUR 29631 EN |institution=Joint Research Centre |date=2019 ...16 KB (2,261 words) - 09:07, 11 December 2024
- ...t3=Hui |last4=Alrabady |first4=A. |title=Enhancing Security and Privacy in Traffic-Monitoring Systems |journal=IEEE Pervasive Computing |date=October 2006 |vo * Live traffic report ...55 KB (7,739 words) - 07:36, 21 December 2024
- Law, Huang and Liu<ref>{{Cite journal |last1=Law |first1=Lok Man |last2=Huang |first2=Jianwei |last3=Liu |first3=Mingyan |da ...erence on Electronic commerce |chapter=Altruism, selfishness, and spite in traffic routing |date=2008-07-08 |chapter-url=https://doi.org/10.1145/1386790.13868 ...26 KB (4,004 words) - 16:00, 18 February 2025