نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

2014
V. Viswanadha Kavitha

The main objective of this project is to design an intelligent auto traffic signal control system. Traffic congestion is one of the major issues to be considered.Generally Vehicular traffic intersects at the junctions of the road and are controlled by the traffic signals.Traffic signals need a good coordination and control to ensure the smooth and safe flow of the vehicular traffic.During the r...

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

Journal: :Future Internet 2022

The identification of Internet protocols provides a significant basis for keeping security and improving Quality Service (QoS). However, the overwhelming developments updating technologies have led to large volumes unknown traffic, which threaten safety network environment lot. Since most traffic does not any labels, it is difficult adopt deep learning directly. Additionally, feature accuracy m...

Journal: :International Journal of Systems Assurance Engineering and Management 2021

The recent development in the domestic economy has increased number of private vehicles leading to issue road congestions and traffic accidents. diversity severity problems leads requirements modern intelligent transportation systems. In case vehicle license identification, plate positioning plays a very vital role this is key factor affecting accuracy system. order alleviate pressure, solve pr...

ژورنال: کنترل 2020

Delay time recovery can increase the efficiency of the railway network and increase the attractiveness of railway transport against other transportation systems. This article presents a new dynamical model of railway system. The proposed model is a discrete event systems that is defined based on the deviation of travel time and deviation of stop time of trains. Due to the existence of multiple ...

Journal: :CoRR 2014
Cristina Cano David Malone

In random access protocols, the service rate depends on the number of stations with a packet buffered for transmission. We demonstrate via numerical analysis that this state-dependent rate along with the consideration of Poisson traffic and infinite (or large enough to be considered infinite) buffer size may cause a high-throughput and extremely long (in the order of hours) transitory phase whe...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :CoRR 2011
Sanjeev Patel P. K. Gupta Arjun Garg Prateek Mehrotra Manish Chhabra

In order to curtail the escalating packet loss rates caused by an exponential increase in network traffic, active queue management techniques such as Random Early Detection (RED) have come into picture. Flow Random Early Drop (FRED) keeps state based on instantaneous queue occupancy of a given flow. FRED protects fragile flows by deterministically accepting flows from low bandwidth connections ...

Journal: :journal of artificial intelligence in electrical engineering 0

the ability to discover services in mobile ad hoc network (manet) is a major prerequisite. cluster basedcross layer intelligent service discovery for manet (cbisd) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. the cluster basedarchitecture using semantic knowledge provides scalability and accuracy. also, the mini...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Wei Lu Ali A. Ghorbani

Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید