نتایج جستجو برای: traffic behavior

تعداد نتایج: 709868  

1998
Dean Brantley Taylor Hani S. Mahmassani

This report addresses an important need for fundamental understanding of bicycleautomobile mixed-traffic. It presents models of (1) gap acceptance behavior and (2) bicyclist behavior at the onset of a yellow traffic signal indication, in addition to analysis of (3) coordinating traffic signals to provide (simultaneous) progression for both bicycles and automobiles. Fundamental insights into mix...

2018
Mingmin Guo Zheng Wu Huibing Zhu

Lane-changing (LC) behavior is investigated on Chinese freeways, where the driving circumstances are relatively aggressive. Three data sets were collected from urban expressways and an intercity highway in the form of traffic videos. Different aspects of LC behaviors are analyzed, i.e., the LC rate, motivation, target lane choice and impact on traffic. The results suggest that LC is a transient...

2008
Wolfgang John Sven Tafvelin Tomas Olovsson

In order to reveal the influence of different traffic classes on the Internet, backbone traffic was collected within an eight month period on backbone links of the Swedish University Network (SUNET). The collected data was then classified according to network application. In this study, three traffic classes (P2P, Web and malicious) are compared in terms of traffic volumes and signaling behavio...

1998
Hao Chen

Traditional statistical analysis of network data is often employed to determine traffic distribution, to summarize user’s behavior patterns, or to predict future network traffic. Mining of network data may be used to discover hidden user groups, to detect payment fraud, or to identify network abnormalities. In our research we combine traditional traffic analysis with data mining technique. We a...

Nowadays, traffic congestion is a big problem in metropolises all around the world. Traffic problems rise with the rise of population and slow growth of urban transportation systems. Car accidents or population concentration in particular places due to urban events can cause traffic congestions. Such traffic problems require the direct involvement of the traffic police, and it is urgent for the...

2016
Abhinav Bhandari

Tools required for the security purposes are firewall, passwords, IDS, IPS for the detection of anomaly and prevent it from sending out the harmful traffic to the network. So, it is very necessary to examine the behavior of traffic that coming to the network and recognize the anomalous behavior. In this paper, statistical based chi-square method is used to detect the anomalous behavior and pred...

Journal: :JNW 2013
Jinghua Yan Xiaohui Fan

Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we introduce HFBP, a novel P2P identification scheme based on the host level and flow level behavior profil...

Journal: :International Journal of Transportation Science and Technology 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید