نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

2014
Chunzhi Wang Zeqi Wang Zhiwei Ye Hongwei Chen

Nowadays new peer to peer (P2P) traffic with dynamic port and encrypted technology makes the identification of P2P traffic become more and more difficult. As one of the optimal classifiers, support vector machine (SVM) has special advantages with avoiding local optimum, overcoming dimension disaster, resolving small samples and high dimension for P2P classification problems. However, to employ ...

2016
A. AHMED A. F. M. SADULLAH A. S. YAHYA

Safety of any particular Road way facility cannot be attributed to set of parameters specific to a certain domain. Unsignalized intersections are no exceptions, thus, making them an important area of study. This paper presents the results of the analysis of four parameters, namely road width, traffic control, lane marking and landuse; and their sub-class on the safety of unsignalized intersecti...

2016
Zihui Liu Sachin Sharma

In this project, we designed an advanced driver assistant system with three functions: traffic sign recognition, lane deviation detection, and car make identification. The traffic sign recognition implements Viola and Jones detector to accurately detect the traffic sign ahead. Hough transforms and edge detection are used in the lane deviation detection. For vehicle make identification, two mode...

2005
Myung-Sup Kim Young J. Won

A major problem with current Internet traffic monitoring and analysis concerns the large number of newly emerging network-based applications possessing more complicated communication structures and traffic patterns than traditional applications. The amount of traffic generated by these applications, such as peer-to-peer (P2P), streaming media, games, etc., is reported to be well over half of th...

Journal: :JNW 2014
Yajun Hou

With the rapid development of computer technique in the past decades, the emergence of P2P techniqueprompts the network computing model evolving from centralized network to distributed network. Although P2P technique has brought tremendous changes to the network technique, P2P technique also exposes a lot of problems during its implementation. If we can manage the P2P network traffic effectivel...

ولی, زهرا, مقیم, ندا , هاشمی, مسعود رضا ,

Because of rapidly rising network traffic, ISP providers are trying to create new network structures and extend more resources to control the growth of demands. It is important to efficiently split the network bandwidth among different sources so that each user has enough bandwidth.  Traffic engineering is used to achieve this goal.   Performing reliable and efficient network ope...

2017
Huanjia Yang Shuang - Hua Yang

Zigbee is one of the most exciting wireless sensor network (WSN) technologies for monitoring and control. In our previous research, an integrated Zigbee RFID sensor network was designed as an ‘all-in-one’ system as well as a connectionless inventory tracking solution for Humanitarian Logistics Center (HLC) resource management. Various field trials, which have justified the feasibility and featu...

2009
Yong-Hyuk Moon Jae-Hoon Nah

The purpose of this paper proposes a network flow identification methodology considering network traffic dynamics caused by various types of recent network-based applications. In particular, P2P applications that generate encrypted packets are rarely visible to previous schemes, which have been proposed to handle packet filtering and control. Therefore, as a new strategy, we propose an efficien...

Journal: :Applied sciences 2023

Telecommuting and telelearning have gradually become mainstream lifestyles in the post-epidemic era. The extensive interconnection of massive terminals gives attackers more opportunities, which brings significant challenges to network traffic security analysis. existing attacks, often using encryption technology distributed attack methods, increase number complexity attacks. However, traditiona...

2017
Naveed Akhtar

During the last decade, Internet traffic classification finds its importance not only to safeguard the integrity and security of network resources, but also to ensure the quality of service for business critical applications by optimizing existing network resources. But optimization at first place requires correct identification of different traffic flows. In this paper, we have suggested a fra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید