Vulnerability Analysis for Transportation Networks
Autor Michael Tayloren Limba Engleză Paperback – 5 iun 2017
The book covers the dimensions of time (hours, days, weeks, months and years), spatial coverage (national networks, regional areas, metropolitan and urbanized areas) and modes (road, urban public transport and national railway systems). It shows how the provided framework can be used to indicate the most suitable accessibility tools and metrics for a particular application. Vulnerability Analysis for Transportation Networks is for academics and researchers in transportation networks and for practicing professionals involved in the planning and management of transportation networks and services.
- Presents the most current, complete and integrated account of transport network vulnerability analysis
- Includes numerous case studies from around the world
- Compares alternative approaches to vulnerability analysis for multiple modes and the applicability of each
- Shows how academic transport network planning and management research development can be applied to actual practice, with special focus on socio-economic and environmental impacts
Preț: 577.48 lei
Preț vechi: 756.44 lei
-24% Nou
Puncte Express: 866
Preț estimativ în valută:
110.52€ • 114.80$ • 91.80£
110.52€ • 114.80$ • 91.80£
Carte tipărită la comandă
Livrare economică 27 ianuarie-10 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128110102
ISBN-10: 0128110104
Pagini: 274
Dimensiuni: 152 x 229 x 19 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128110104
Pagini: 274
Dimensiuni: 152 x 229 x 19 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE
Public țintă
Academic researchers, practitioners, and policy makers in transportation planning, management, operations, networks, systems, and infrastructuresCuprins
1. Introduction2. Critical infrastructure, Services, and Locations3. Methods for Vulnerability Analysis4. Network Performance Measures5. Regional Development and Economic Planning6. Case Studies7. Integrated Framework for Vulnerability Analysis8. Conclusion