Results 21 to 30 of about 7,816,845 (321)
Analysing Pedestrian Traffic Around Public Displays [PDF]
This paper presents a powerful approach to evaluating public technologies by capturing and analysing pedestrian traffic using computer vision. This approach is highly flexible and scales better than traditional ethnographic techniques often used to evaluate technology in public spaces.
Williamson, Julie R., Williamson, John
openaire +1 more source
Increasingly, commercial vehicles are equipped with automated vehicle (AV) features such as adaptive cruise control systems. The AV feature can automatically control the headway between the current vehicle and the preceding vehicle in an adaptive manner.
Xiaowei Shi, X. Li
semanticscholar +1 more source
Air traffic generation for new terminal area air traffic management concepts design and evaluation [PDF]
This paper describes two systems that can be used to obtain realistic random traffic samples in a terminal area: a real traffic analyser and a synthetic traffic generator.
Bernardos Barbolla, Ana M. +4 more
core +2 more sources
Ethanol Sensing Properties of Nanocrystalline α-MoO3
Ethanol sensors with effective and selective sensitivity are extensively used by traffic police to detect drunken drivers, in wine industries for controlling the fermentation process, food package testing, different medical applications etc. Orthorhombic
Sucheta Sau +3 more
doaj +1 more source
Optical Network Virtualisation using Multi-technology Monitoring and SDN-enabled Optical Transceiver [PDF]
We introduce the real-time multi-technology transport layer monitoring to facilitate the coordinated virtualisation of optical and Ethernet networks supported by optical virtualise-able transceivers (V-BVT).
Aguado, Alejandro +5 more
core +3 more sources
Analysing TCP for Bursty Traffic
The Transmission Control Protocol has been designed to support interactive and bulk applications, with performance tuned to support bulk applications that desire to continuously send data. In contrast, this paper analyses TCP performance for a class of applications that do not wish to send continuous data, but instead generate bursts of data separated ...
Israfil Biswas +3 more
openaire +2 more sources
Network Traffic Anomaly Detection via Deep Learning
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems.
Konstantina Fotiadou +5 more
semanticscholar +1 more source
Spectrum occupancy measurements and lessons learned in the context of cognitive radio [PDF]
Various measurement campaigns have shown that numerous spectrum bands are vacant even though licenses have been issued by the regulatory agencies. Dynamic spectrum access (DSA) based on Cognitive Radio (CR) has been regarded as a prospective solution to ...
Ammar, M. +4 more
core +2 more sources
The world is currently going through the COVID-19 pandemic which has caused hundreds of thousands of deaths in just a few months. Considering the need for lockdown measures, most countries, including Malaysia, have implemented ‘Movement Control Orders ...
Mohd Shahrul Mohd Nadzir +16 more
doaj +1 more source
Field-Trial of a high-budget, filterless, lambda-to-the-user, UDWDM-PON enabled by an innovative class of low-cost coherent transceivers [PDF]
©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Artiglia, Massimo +9 more
core +2 more sources

