Microscopic Simulation Modeling and Traffic Optimization Sample Clauses

Microscopic Simulation Modeling and Traffic Optimization. The Engineer shall use the TDM and mesoscopic outputs to perform multimodal microscopic sub-regional, corridor, and intersection traffic simulation modeling. Traffic simulation modeling consists of conducting detailed traffic data and scenario evaluation analysis to evaluate the travel demand’s impact of the operation analysis of the transportation network. The Engineer shall model scenarios for each specific alternative and include the demand and all planned network improvements for the analysis years. Engineer shall: • Develop, calibrate, and validate the models according to best practice modeling standards. ▪ To accurately represent the supply side, the updating and cleanup process may include updating nodes, links, link attributes, parameters, traffic signals, etc. ▪ To accurately represent the demand side, volumes must be modeled according to study area conditions. ▪ To accurately represent travel behavior, the model must be calibrated to capture local conditions. • Produce calibrated and validated base models for the current and future years. The State shall define the calibration and validation procedures and thresholds and review and approve the base models prior to development of alternative scenarios. • Utilize approved base models to develop scenarios for each specific alternative to be modeled. The Engineer shall use professional experience and knowledge of Vissim, Synchro, Highway Capacity Software (HCS), and/or the latest software this analysis. • Deliverables: ▪ Travel/Traffic modeling software dataset files (for all modeled scenarios) DocuSign Envelope ID: 33148E80-3050-48D0-AEFE-80B871840D51 PeopleSoft Contract No. 7650 Legacy Contract No. 12-7IDP5014 ▪ Travel/Traffic modeling software data inputs (for all modeled scenarios) ▪ Demographic, economic, and land use reports ▪ Technical memo documenting travel/traffic modeling methods, efforts, assumptions, etc. ▪ Technical memo documenting travel/traffic modeling results, results analysis, and conclusions. ▪ Technical memo documenting scenarios in performance matrices ▪ Technical memo documenting traffic data inputs ▪ Calibration and validation reports for all travel/traffic models ▪ Traffic modeling software dataset files ▪ Simulation electronic files ▪ Videos for presentations ▪ TDM Reports ▪ Presentations
AutoNDA by SimpleDocs

Related to Microscopic Simulation Modeling and Traffic Optimization

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.