Results 221 to 230 of about 76,767 (261)
Some of the next articles are maybe not open access.
Parameter Identification for a Traffic Flow Model
IFAC Proceedings Volumes, 1979Abstract A macroscopic model is presented in this paper which describes the traffic flow on a freeway by a set of nonlinear, deterministic difference equations. The model is deduced from simple physical and empirical considerations and contains a set of free parameters which have to be identified using real traffic data.
M. Cremer, M. Papageorgiou
openaire +1 more source
Mathematical model based traffic violations identification
Computational and Mathematical Organization Theory, 2018Traffic rules violations and accidents on road are major issues now-a-days. Identification of vehicles violating traffic rules and manual monitoring of vehicles is difficult, due to traffic congestion on freeways. A novel mathematical model is proposed to generalize detection of a number of traffic violations on highways.
Fozia Mehboob +2 more
openaire +1 more source
P2P Traffic Identification Method Based on Traffic Statistical Characteristics
2017Different from traditional P2P traffic identification methods based on keywords or well-known ports, this paper presents a new identification method of P2P traffic based on the most basic characteristics of P2P protocol. We compare and analyze P2P traffic and traditional C/S traffic using statistical analysis techniques, and obtain two statistical ...
Bing Hu, Zhixin Sun
openaire +1 more source
Fuzzy clustering based traffic pattern identification
2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2016Automatic anomaly detection is of great importance in the big data era because the large volume of raw data can be accessed easily and the automatic method to analyze the data is desirable. This paper uses a framework based on fuzzy c-means clustering to detect anomaly in temporal traffic data.
Tianjun Li, Long Chen, C. L. Philip Chen
openaire +1 more source
OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics
2013OpenVPN is a user-space SSL-based VPN, which doesn’t use fixed port and communication contents are encrypted after the establishment of handshake process. Therefore, traditional port-based or payload-based identification methods are not applicable for OpenVPN traffic identification.
Yi Pang +4 more
openaire +1 more source
Active learning for P2P traffic identification
Peer-to-Peer Networking and Applications, 2014P2P traffic identification methods by using machine learning have been provided in a great number of works, which suffer from a large and representative labeled sample set. To overcome the sample labeling problem, a new P2P traffic identification approach by active learning called P2PTIAL is presented.
San-Min Liu, Zhi-Xin Sun
openaire +1 more source
Protocol Identification of Encrypted Network Traffic
2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006New means of communication are constantly emerg- ing, some of which may constitute resource mis- use of an organisation?s network system. Identify- ing the protocols used is straight-forward when in- specting network logs, but we focus on the problem of identifying the underlying protocol present in an unknown TCP connection.
Matthew Gebski +2 more
openaire +1 more source
Traffic Simulator: A Traffic Risk Hotspot Identification Platform
2023 IEEE Smart World Congress (SWC), 2023Qingxian Tang +5 more
openaire +1 more source
A Survey on Network Traffic Identification
2019With the rapid development of the Internet, the scale of Internet users has been expanding. At the same time, various mobile phone applications have emerged in an endless stream. While providing users with a variety of services, it also leads to the difficulty of user identification.
Qiuping Zhu +4 more
openaire +1 more source

