نتایج جستجو برای: network traffic identification
تعداد نتایج: 1117736 فیلتر نتایج به سال:
The main objective of this project is to design an intelligent auto traffic signal control system. Traffic congestion is one of the major issues to be considered.Generally Vehicular traffic intersects at the junctions of the road and are controlled by the traffic signals.Traffic signals need a good coordination and control to ensure the smooth and safe flow of the vehicular traffic.During the r...
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
The identification of Internet protocols provides a significant basis for keeping security and improving Quality Service (QoS). However, the overwhelming developments updating technologies have led to large volumes unknown traffic, which threaten safety network environment lot. Since most traffic does not any labels, it is difficult adopt deep learning directly. Additionally, feature accuracy m...
The recent development in the domestic economy has increased number of private vehicles leading to issue road congestions and traffic accidents. diversity severity problems leads requirements modern intelligent transportation systems. In case vehicle license identification, plate positioning plays a very vital role this is key factor affecting accuracy system. order alleviate pressure, solve pr...
Delay time recovery can increase the efficiency of the railway network and increase the attractiveness of railway transport against other transportation systems. This article presents a new dynamical model of railway system. The proposed model is a discrete event systems that is defined based on the deviation of travel time and deviation of stop time of trains. Due to the existence of multiple ...
In random access protocols, the service rate depends on the number of stations with a packet buffered for transmission. We demonstrate via numerical analysis that this state-dependent rate along with the consideration of Poisson traffic and infinite (or large enough to be considered infinite) buffer size may cause a high-throughput and extremely long (in the order of hours) transitory phase whe...
In order to curtail the escalating packet loss rates caused by an exponential increase in network traffic, active queue management techniques such as Random Early Detection (RED) have come into picture. Flow Random Early Drop (FRED) keeps state based on instantaneous queue occupancy of a given flow. FRED protects fragile flows by deterministically accepting flows from low bandwidth connections ...
the ability to discover services in mobile ad hoc network (manet) is a major prerequisite. cluster basedcross layer intelligent service discovery for manet (cbisd) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. the cluster basedarchitecture using semantic knowledge provides scalability and accuracy. also, the mini...
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید