نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

Background: Today, the effects of environmental pollution on human life and human needs, which reduces the level of community health caused by traffic noise in large cities, are clearly visible by creating irritation and pathogenic conditions. The aim of this study was to assess the risk of noise pollution resulted from central traffic in Shiraz by analyzing its indicators and related componen...

Journal: :International Journal of Smart Sensor and Adhoc Network. 2013

Journal: :نشریه دانشکده فنی 0
شبنم شهبازی دانشگاه صنعتی امیرکبیر عبدالرحیم جواهریان موسسه ژئوفیزیک مجتبی محمدو خراسانی شرکت ملی نفت

geological facies interpretation is essential for reservoir studying. the method of classification and identification seismic traces is a powerful approach for geological facies classification and distinction. use of neural networks as classifiers is increasing in different sciences like seismic. they are computer efficient and ideal for patterns identification. they can simply learn new algori...

Journal: :journal of advances in computer engineering and technology 2015
maryam ashtari mahini mohammad teshnehlab mojtaba ahmadieh khanehsar

neural networks are applicable in identification systems from input-output data. in this report, we analyze thehammerstein-wiener models and identify them. thehammerstein-wiener systems are the simplest type of block orientednonlinear systems where the linear dynamic block issandwiched in between two static nonlinear blocks, whichappear in many engineering applications; the aim of nonlinearsyst...

Journal: :ارتقای ایمنی و پیشگیری از مصدومیتها 0
حسام الدین راضی اردکانی h ardakani razi دانشگاه صنعتی شریف محمدرضا احدی mr ahadi دانشگاه علم و صنعت ایرانسازمان اصلی تایید شده: دانشگاه علم و صنعت ایران (iran university of science and technology)

backgrounds and aims: the tehran province was subject to the second highest incidence of fatalities due to traffic accidents in 1390. most studies in this field examine rural traffic accidents, but this study is based on the use of logit models and artificial neural networks to evaluate the factors that affect the severity of accidents within the city of tehran. materials and methods: among the...

HK Arunkumar S Sivakumar

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

B. K. Katti G. Joshi Krishna Saw

Rapid urban growth is resulting into increase in travel demand and private vehicle ownership in urban areas. In the present scenario the existing infrastructure has failed to match the demand that leads to traffic congestion, vehicular pollution and accidents. With traffic congestion augmentation on the road, delay of commuters has increased and reliability of road network has decreased. Four s...

Journal: :JDFSL 2014
Petr Matousek Ondrej Rysavý Martin Kmet

This paper presents a fast multi-stage method for on-line detection of RTP streams and codec identification of transmitted voice or video traffic. The method includes an RTP detector that filters packets based on specific values from UDP and RTP headers. When an RTP stream is successfully detected, codec identification is applied using codec feature sets. The paper shows advantages and limitati...

2017

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

2015

IDS are becoming the logical next step for many organizations after deploying firewall technology at the network perimeter. IDS can offer protection from external users and internal attackers, where traffic doesn't go past the firewall at all. However, the following points are very important to keep in mind. 1. Strong identification and authentication: An IDS uses very good signature analysis m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید