نتایج جستجو برای: traffic detection
تعداد نتایج: 656237 فیلتر نتایج به سال:
We present end-to-end measurement methods for the detection of traffic shaping. Traffic shaping is typically implemented using token buckets, allowing a maximum burst of traffic to be serviced at the peak capacity of the link, while any remaining traffic is serviced at a lower shaping rate. The contribution of this paper is threefold. First, we develop an active end-to-end detection mechanism, ...
In this paper, an algorithm for traffic sign detection based on color and shape detection is developed. The algorithm uses images taken by a low resolution camera mounted in front of a moving car. Two types of traffic signs, yellow warning signs and red stop signs, are tested and detection results are summarized. The conclusion is that color-based detection is sensitive to illumination conditio...
Intrusion Detection Systems (IDS) are a very popular network security tool. These tools can allow network administrators, to identify and react to hostile traffic aimed at, or generated from their own network. In general there are two common Intrusion Detection approaches which are behavior or traffic anomaly based and knowledge or signature based. As a result of the increased sophistication of...
Advanced traffic management systems allow video image detection to supplement and improve data inputs in transportation modeling efforts. Video detection systems use machine vision technology, the interaction of video cameras, and specialty computer hardware and software to measure traffic. Traffic parameters such as hourly flows, density, vehicle speed, level of service, and other parameters d...
Vehicle detection and tracking applications play an important role for civilian and military applications such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic analysis and vehicle categorizing objectives and may be implemented under differ...
Highway accidents significantly impact normal traffic flow. Consequently, automatic detection of abnormal traffic events has gradually attracted the attention of researchers interested in intelligent transportation system. This work presents a vision-based approach for automatic traffic congestion and incident detection. The proposed approach involves extracting entropy-based features to create...
The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the resources of the network and denying services to legitimate users. This paper has presented a mechanism for protecting a web-server against a distributed denia...
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Existing scan detection schemes use statically determined detection criteria, and as a result do not respond well to traffic perturbations. We present two adaptive scan detection schemes, Success Based (SB) and Failure ...
Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. Traditional IDSs are not able to reactive efficiently in encrypted and tunneled traffic due to inability to analyze packet content. An encrypted malicious traffic is able to evade the de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید