901 resultados para Distributed Traffic Control


Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Meteorological study sponsored by Air Navigation Development Board under Contract Cwb-8175 with the U.S. Weather Bureau."

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Proteins of the p120 family have been implicated in the regulation of cadherin-based cell adhesion, but their relative importance in this process and their mechanism of action have remained less clear. Three papers in this issue suggest that p120 plays a key role in maintaining normal levels of cadherin in mammalian cells, and that it may do so by regulating cadherin trafficking.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Air Traffic Control Laboratory Simulator (ATC-lab) is a new low- and medium-fidelity task environment that simulates air traffic control. ATC-lab allows the researcher to study human performance of tasks under tightly controlled experimental conditions in a dynamic, spatial environment. The researcher can create standardized air traffic scenarios by manipulating a wide variety of parameters. These include temporal and spatial variables. There are two main versions of ATC-lab. The medium-fidelity simulator provides a simplified version of en route air traffic control, requiring participants to visually search a screen and both recognize and resolve conflicts so that adequate separation is maintained between all aircraft. The low-fidelity simulator presents pairs of aircraft in isolation, controlling the participant's focus of attention, which provides a more systematic measurement of conflict recognition and resolution performance. Preliminary studies have demonstrated that ATC-lab is a flexible tool for applied cognition research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Theoretical analyses of air traffic complexity were carried out using the Method for the Analysis of Relational Complexity. Twenty-two air traffic controllers examined static air traffic displays and were required to detect and resolve conflicts. Objective measures of performance included conflict detection time and accuracy. Subjective perceptions of mental workload were assessed by a complexity-sorting task and subjective ratings of the difficulty of different aspects of the task. A metric quantifying the complexity of pair-wise relations among aircraft was able to account for a substantial portion of the variance in the perceived complexity and difficulty of conflict detection problems, as well as reaction time. Other variables that influenced performance included the mean minimum separation between aircraft pairs and the amount of time that aircraft spent in conflict.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to examine the way Australian air traffic controllers manage their airspace. Fourteen controllers ranging from 7 to 30 years experience were sampled from the Brisbane air traffic control centre. All had previously been endorsed for en route radar sectors. Five static pictures varying in workload level (low, medium and high) were presented to participants. Controllers were asked to work through the scenarios and describe aloud how they would resolve any potential conflicts between the aircraft. Following this controllers were asked a set of probe questions based on the critical decision method, to extract further information about the way they manage their airspace. A content analysis was used to assess patterns in the way controllers scan, strategies used in conflict detection and conflict resolution and the effect of workload on strategy choice. Findings revealed that controllers use specific strategies (such as working in a left to right scan or prioritising levels) when managing their airspace. Further analyses are still planned however a model based on the processes controllers used to resolve conflicts has been developed and will be presented as a summary of the results.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The popular technologies Wi-Fi and WiMAX for realization of WLAN and WMAN respectively are much different, but they could compliment each other providing competitive wireless access for voice traffic. The article develops the idea of WLAN/WMAN (Wi-Fi/WiMAX) integration. WiMAX is offering a backup for the traffic overflowing from Wi-Fi cells located into the WiMAX cell. Overflow process is improved by proposed rearrangement control algorithm applied to the Wi-Fi voice calls. There are also proposed analytical models for system throughput evaluation and verification of the effectiveness using WMAN as a backup for WLAN overflow traffic and the proposed call rearrangement algorithm as well.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This Handbook has been prepared by the Iowa DOT as a guide and supplement to the MUTCD. It provides in one document a large number of illustrations which can be easily adapted to specific conditions by field personnel. It is intended to supersede all previous non-conforming standards now being used throughout the state and to provide uniform guidelines for all agencies, public and private, who must conduct construction and maintenance activities on the streets and highways of the state. The illustrations contained herein serve as a quick reference for field personnel to follow, however, no amount of detailed instructions can adequately cover every situation. For this reason, sound judgment is required in using these illustrations to cover actual field conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper begins with a short review of the current state of integrated traffic control. This is followed by a summary of the main components for the Integrated Road Transport Environment (IRTE) and the role of the DRIVE II project HERMES, which aims at providing some of these components. The paper concludes with an outline of some scenarios for integrated traffic control operation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: 1) if policies are complex, their enforcement can lead to performance decay of database servers; 2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.