نتایج جستجو برای: traffic behavior
تعداد نتایج: 709868 فیلتر نتایج به سال:
This report addresses an important need for fundamental understanding of bicycleautomobile mixed-traffic. It presents models of (1) gap acceptance behavior and (2) bicyclist behavior at the onset of a yellow traffic signal indication, in addition to analysis of (3) coordinating traffic signals to provide (simultaneous) progression for both bicycles and automobiles. Fundamental insights into mix...
Lane-changing (LC) behavior is investigated on Chinese freeways, where the driving circumstances are relatively aggressive. Three data sets were collected from urban expressways and an intercity highway in the form of traffic videos. Different aspects of LC behaviors are analyzed, i.e., the LC rate, motivation, target lane choice and impact on traffic. The results suggest that LC is a transient...
In order to reveal the influence of different traffic classes on the Internet, backbone traffic was collected within an eight month period on backbone links of the Swedish University Network (SUNET). The collected data was then classified according to network application. In this study, three traffic classes (P2P, Web and malicious) are compared in terms of traffic volumes and signaling behavio...
Traditional statistical analysis of network data is often employed to determine traffic distribution, to summarize user’s behavior patterns, or to predict future network traffic. Mining of network data may be used to discover hidden user groups, to detect payment fraud, or to identify network abnormalities. In our research we combine traditional traffic analysis with data mining technique. We a...
Nowadays, traffic congestion is a big problem in metropolises all around the world. Traffic problems rise with the rise of population and slow growth of urban transportation systems. Car accidents or population concentration in particular places due to urban events can cause traffic congestions. Such traffic problems require the direct involvement of the traffic police, and it is urgent for the...
Tools required for the security purposes are firewall, passwords, IDS, IPS for the detection of anomaly and prevent it from sending out the harmful traffic to the network. So, it is very necessary to examine the behavior of traffic that coming to the network and recognize the anomalous behavior. In this paper, statistical based chi-square method is used to detect the anomalous behavior and pred...
Recently, Peer-to-peer (P2P) networks have been widely applied in streaming media, instant messaging, file sharing and other fields, which have occupied more and more network bandwidth. Accurately identify P2P traffic is very important to management and control P2P traffic. In this paper, we introduce HFBP, a novel P2P identification scheme based on the host level and flow level behavior profil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید