نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

Journal: :journal of industrial engineering, international 2011
l ogunwolu o adedokun o orimoloye s.a oke

short-term prediction of traffic flow is central to alleviating congestion and controlling the negative impacts of environmental pollution resulting from vehicle emissions on both inter- and intra-urban highways. the strong need to monitor and control congestion time and costs for metropolis in developing countries has therefore motivated the current study. this paper establishes the applicatio...

Draft traffic impact assessment (TIA) guidelines for various landuses in general, and for high traffic generating buildings in particular, were published in Iran in the middle of 2016. In formulating that report the Traffic Committee of the Iranian Building Engineering Order reviewed international experience, including that of Australia. Traffic impact assessment started in Australia in the 196...

2007
Hajime Inoue Dana Jansens Abdulrahman Hijazi Anil Somayaji

Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insufficient to understand modern computer networks. Here we describe NetADHICT, a tool for better understanding the behavior of network traffic. The key innovation of NetADHICT is that it can identify and present a hierarchi...

2009
Taekyu Kim Bernard P. Zeigler

As the network uses, and especially the number of internet users, increases rapidly, an efficient system for managing large network traffic datasets becomes an important issue. Although there are several network traffic analysis tools such as tcpdump, Ethereal, and other applications, these tools have weaknesses: limited size of files, command line execution, large memory and huge computational...

Journal: :جغرافیا و توسعه فضای شهری 0
عزت اله مافی هومن شاداب مهر

every year, a part of the national capital of the country is lost due to the disorders of traffic. an important part of the traffic disorders is caused by the improper behavior of some users of urban transport system. such a situation is contrary to the principles of smart growth and urban sustainability. the study of traffic conflicts as a symbol of the society culture of traffic can lead city...

2009
Aravind Venkataraman Raheem A. Beyah

Attacks on wireless networks can be classified into two categories: external wireless and internal wired. In external wireless attacks, an attacker uses a wireless device to target the access point (AP), other wireless nodes or the communications on the network. In internal wired attacks, an attacker or authorized insider inserts an unauthorized (or rogue) AP into the wired backbone for malicio...

Journal: :Wireless Communications and Mobile Computing 2021

An IoT is the communication of sensing devices linked to Internet in order communicate data. have extremely critical reliability with an efficient and robust network condition. Based on enormous growth their connectivity, contributes bulk traffic. Prediction traffic very important function any network. Traffic prediction ensure good system efficiency service quality applications, as it relies p...

2008
Taekyu Kim Chungman Seo Bernard P. Zeigler

As the network uses, and especially the number of internet users, increases rapidly, an efficient system for managing large network traffic datasets becomes an important issue. There are several network traffic analysis tools such as tcpdump, Ethereal, and other applications. But, these tools have weaknesses: limited size of files, command line execution, large memory and huge computational pow...

2007
Vikrant Vaze Moshe E. Ben-Akiva Daniele Veneziano

Accurate calibration of demand and supply simulators within a Dynamic Traffic Assignment (DTA) system is critical for the provision of consistent travel information and efficient traffic management. Emerging traffic surveillance devices such as Automatic Vehicle Identification (AVI) technology provide a rich source of disaggregate traffic data. This thesis presents a methodology for calibration...

Journal: :JCM 2013
Justin Tharp Jinoh Kim Sang C. Suh Hyeonkoo Cho

Accurate application identification is one of the core elements of network operations and management to provide enhanced network services and security. While the signaturebased approach that examines packet content for identification is attractive with greater accuracy than the traditional technique relying on TCP port numbers, one potential challenge is multiple matches arising when more than ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید