Journal articles on the topic 'Traffic analysi'

To see the other types of publications on this topic, follow the link: Traffic analysi.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Traffic analysi.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Manvelidze, A. B. "Air lines network modelling algorithm." Strategic decisions and risk management, no. 6 (February 13, 2018): 22–29. http://dx.doi.org/10.17747/2078-8886-2017-6-22-29.

Full text
Abstract:
This analysis is dedicated to find out methods for setting of route networks where new aircraft can be effectively put into service. The conception of this analysis is based on the idea of so called connectivity principle for airports connected by passenger traffic with each other.For the passenger traffic analysis the author took passenger traffic data by federal districts starting from the Far East. Then consequently the data for Siberian, Ural, Wolga, Northwestern, Central, Southern and North Caucasian federal districts were analyzed. Passenger traffic to the Crimea was treated separately. Detailed specifications of passenger traffics were provided in order to determine the connections between airports both within federal districts and beyond them and with neighboring areas in western direction. Query of routes was done based on limitations for non-stop flight range and on minimum and maximum (for significant traffics) flight frequencies.The analysis approach lets us concentrate attention on those airlines which at best fit for putting into service of chosen aircraft. Also this method permits to determine the routes with currently insufficient or low traffics but where there’s a definite growth potential. When analysis data are combined with traffic data and tariffs, then it becomes possible to determine the most profitable routes for introduction of new aircraft. Traffic volume, actual figures and forecast, consolidated characteristics of chosen airlines, list of airlines for further studies of efficiency and competitiveness of introduced aircraft are determined.
APA, Harvard, Vancouver, ISO, and other styles
2

CURPEN, Radu, Mihai-Iulian ILIESCU, and Florin SANDU. "AN ANALYSIS OF 3G-4G TRAFFIC GUIDANCE METHODS." Review of the Air Force Academy 14, no. 2 (December 8, 2016): 123–32. http://dx.doi.org/10.19062/1842-9238.2016.14.2.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adje, Erick A., Vinasetan Ratheil Houndji, and Michel Dossou. "Features analysis of internet traffic classification using interpretable machine learning models." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 3 (September 1, 2022): 1175. http://dx.doi.org/10.11591/ijai.v11.i3.pp1175-1183.

Full text
Abstract:
Internet traffic classification is a fundamental task for network services and management. There are good machine learning models to identify the class of traffic. However, finding the most discriminating features to have efficient models remains essential. In this paper, we use interpretable machine learning algorithms such as decision tree, random forest and eXtreme gradient boosting (XGBoost) to find the most discriminating features for internet traffic classification. The dataset used contains 377,526 traffics. Each traffic is described by 248 features. From these features, we propose a 12-feature model with an accuracy of up to 99.76%. We tested it on another dataset with 19626 flows and obtained 98.40% of accuracy. This shows the efficiency and stability of our model. Also, we identify a set of 14 important features for internet traffic classification, including two that are crucial: port number (server) and minimum segment size (client to server).
APA, Harvard, Vancouver, ISO, and other styles
4

G, Kothai, and Poovammal E. "Performance Analysis of Stationary and Deterministic AODV Model." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 17 (October 13, 2020): 33. http://dx.doi.org/10.3991/ijim.v14i17.16643.

Full text
Abstract:
Vehicular Adhoc Network (VANET) is an emerging technology that provides a digital communication among vehicles, persons and Road-Side Units (RSU). VANETs are highly vulnerable to cyber-attacks. These cyber-attacks make a wrong illusion on traffic jam, can inject false information regarding traffics and injects large amount of spam messages that disrupts the normal functionalities. The main objective of the research work is to implement and analyze the different models that help in improving the traffic management. The scenarios are simulated, and the performance is analyzed using the OMNET++ Simulator<strong>.</strong>
APA, Harvard, Vancouver, ISO, and other styles
5

Mishra, Shailendra. "Network Traffic Analysis Using Machine Learning Techniques in IoT Networks." International Journal of Software Innovation 9, no. 4 (October 2021): 1–17. http://dx.doi.org/10.4018/ijsi.289172.

Full text
Abstract:
Internet of things devices are not very intelligent and resource-constrained; thus, they are vulnerable to cyber threats. Cyber threats would become potentially harmful and lead to infecting the machines, disrupting the network topologies, and denying services to their legitimate users. Artificial intelligence-driven methods and advanced machine learning-based network investigation prevent the network from malicious traffics. In this research, a support vector machine learning technique was used to classify normal and abnormal traffic. Network traffic analysis has been done to detect and prevent the network from malicious traffic. Static and dynamic analysis of malware has been done. Mininet emulator was selected for network design, VMware fusion for creating a virtual environment, hosting OS was Ubuntu Linux, network topology was a tree topology. Wireshark was used to open an existing pcap file that contains network traffic. The support vector machine classifier demonstrated the best performance with 99% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Shi Bao, Chuan Feng Bai, and Cui Feng Du. "Traffic Forecast Based on Empirical Mode Decomposition and RBF Neural Network." Advanced Materials Research 846-847 (November 2013): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1270.

Full text
Abstract:
Traffic analysis and forecast are the classic topics of telecommunication research, as they provide strategic ground to address the issues such as mobile networks traffic jam, network coverage planning design, marketing management etc. On the basis of the empirical mode decomposition theory and methods, this article first implements multi-scale analysis of the time series of traffic, then it goes on to executes RBF neural network based on the different compositions, and finally reach the forecast expectation of voice traffics of selected base stations.
APA, Harvard, Vancouver, ISO, and other styles
7

Gajewski, Piotr, Jerzy Łopatka, and Piotr Łubkowski. "Performance Analysis of Public Safety Cognitive Radio MANET for Diversified Traffic." Sensors 22, no. 5 (March 1, 2022): 1927. http://dx.doi.org/10.3390/s22051927.

Full text
Abstract:
This paper presents properties of a mobile ad hoc network (MANET) with dynamic spectrum management (DSM) and is devoted to the concept and implementation of the new traffic engine that is used in a High-Fidelity simulator of MANET with cognitive nodes for special applications. The communication traffic generated by each node is defined according to its role in the hierarchical structure of the operational scenario, determining its priorities, permission to use particular real time and non-real time services. The service usage is a source based model, defined in the user’s profile containing its statistical properties, describing periodicity, duration and randomness of traffic generation. The overall traffic generated by the node is a combination of traffics related to specific services. Their statistical parameters are based on real exercises results. The model was defined in the Matlab environment and next verified using the MAENA simulator for complex, operational scenarios. The achieved results show that use of both central and distributed DSM provides a better performance of the MANET network with complex traffic.
APA, Harvard, Vancouver, ISO, and other styles
8

Anupriya and Anita Singhrova. "Comparative Analysis of Time Series Forecasting Models for SDMN Traffic." Journal of Advanced Research in Dynamical and Control Systems 11, no. 0009-SPECIAL ISSUE (September 25, 2019): 531–40. http://dx.doi.org/10.5373/jardcs/v11/20192602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Jiazhong, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, and Wei Deng. "Integrating Traffics with Network Device Logs for Anomaly Detection." Security and Communication Networks 2019 (June 13, 2019): 1–10. http://dx.doi.org/10.1155/2019/5695021.

Full text
Abstract:
Advanced cyberattacks are often featured by multiple types, layers, and stages, with the goal of cheating the monitors. Existing anomaly detection systems usually search logs or traffics alone for evidence of attacks but ignore further analysis about attack processes. For instance, the traffic detection methods can only detect the attack flows roughly but fail to reconstruct the attack event process and reveal the current network node status. As a result, they cannot fully model the complex multistage attack. To address these problems, we present Traffic-Log Combined Detection (TLCD), which is a multistage intrusion analysis system. Inspired by multiplatform intrusion detection techniques, we integrate traffics with network device logs through association rules. TLCD correlates log data with traffic characteristics to reflect the attack process and construct a federated detection platform. Specifically, TLCD can discover the process steps of a cyberattack attack, reflect the current network status, and reveal the behaviors of normal users. Our experimental results over different cyberattacks demonstrate that TLCD works well with high accuracy and low false positive rate.
APA, Harvard, Vancouver, ISO, and other styles
10

SEMENIKHIN, B. A., L. P. KUZNETSOVA, YU A. MALNEVA, and A. YU ALTUKHOV. "THE ANALYSIS OF PASSENGER TRAFFIC ON THE ROUTES OF THE BUS OF KURSK." World of transport and technological machines 71, no. 4 (December 2020): 37–45. http://dx.doi.org/10.33979/2073-7432-2020-71-4-37-45.

Full text
Abstract:
Results of inspection and the analysis of passenger traffics on routes of the bus of Kursk are presented, the main shortcomings of the existing route network are revealed. The analysis of change of daily volume of transportations of passengers made on the basis of data of it and the previous inspections of passenger traffics and also distribution of total power of a passenger traffic on hours of day is provided. Results of development of rational route bus network of Kursk which is almost completely deprived of the shortcomings inherent in the existing route network are presented.
APA, Harvard, Vancouver, ISO, and other styles
11

Oujezsky, Vaclav, Tomas Horvath, and Vladislav Skorpil. "Botnet C&C Traffic and Flow Lifespans Using Survival Analysis." International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 6, no. 1 (March 27, 2017): 38. http://dx.doi.org/10.11601/ijates.v6i1.205.

Full text
Abstract:
This paper addresses the issue of detecting unwanted traffic in data networks, namely the detection of botnet networks. In this paper, we focused on a time behavioral analysis, more specifically said – lifespans of a simulated botnet network traffic, collected and discovered from NetFlow messages, and also of real botnet communication of a malware.As a method we chose survival analysis and for rigorous testing of differences Mantel–Cox test. Lifespans of those referred traffics are discovered and calculated by lifelines using Python language.Based on our research we have figured out a possibility to distinguish the individual lifespans of C&C communications that are identical to each other by using survival projection curves, although it occurred in a different time course.
APA, Harvard, Vancouver, ISO, and other styles
12

Sharma, Satish C., Jin Y. Oh, and Jon J. Wyatt. "Estimation of design hourly volume from seasonal traffic counts." Canadian Journal of Civil Engineering 14, no. 6 (December 1, 1987): 728–31. http://dx.doi.org/10.1139/l87-110.

Full text
Abstract:
By considering the thirtieth highest hourly volume (30HV) as the design hour volume, this study reexamines a commonly used method of predicting the 30HV as a function of the annual average daily traffice (AADT) volume. Based on Alberta's highway system data, some common limitations of the traditional 30HV–AADT model are pointed out. Also included in the analysis presented is a proposed alternative model which utilizes July/August traffic data to estimate the design hour volume. The alternative model appears to provide more accurate prediction results and it also eliminates the need of subjectively classifying the roads into various groups as required by the 30HV–AADT method. Key words: annual average daily traffice, design hour volume, highway design, road classification, traffic volume counts, transportation.
APA, Harvard, Vancouver, ISO, and other styles
13

Kaužljar, Dražen. "Analiza primjene matrice sigurnost-kultura-promet-psihologija." Socijalna ekologija 29, no. 2 (2020): 315–30. http://dx.doi.org/10.17234/socekol.29.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ištoka Otković, Irena, Damir Varevac, and Matjaž Šraml. "ANALYSIS OF NEURAL NETWORK RESPONSES IN CALIBRATION OF MICROSIMULATION TRAFFIC MODEL." Elektronički časopis građevinskog fakulteta Osijek 6, no. 10 (July 2, 2015): 67–76. http://dx.doi.org/10.13167/2015.10.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hafezi, Mohammad Hesam, Amiruddin Ismail, Ramez A. Al-Mansob, and Omran Kohzadi Seifabad. "Comparative Analysis on Bus Operation Duration Light and Rush Traffic Period." International Journal of Engineering and Technology 4, no. 1 (2012): 97–102. http://dx.doi.org/10.7763/ijet.2012.v4.326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wakeman, Ian, Dave Lewis, and Jon Crowcroft. "Traffic analysis of trans-Atlantic traffic." Computer Communications 16, no. 6 (June 1993): 376–88. http://dx.doi.org/10.1016/0140-3664(93)90119-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Özsoy, Aydan, and Ebru Arıkan Öztürk. "Türk Medyasında Trafik ve Yol Güvenliği Haberleri: Karşılaştırmalı Bir İçerik Analizi." Etkileşim, no. 2 (2018): 158–73. http://dx.doi.org/10.32739/etkilesim.2018.2.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jang, Tae Youn. "Traffic Accident Damage Severity of Old Age Drivers by Multilevel Analysis Model." Journal of the Korean Society of Civil Engineers 34, no. 2 (2014): 561. http://dx.doi.org/10.12652/ksce.2014.34.2.0561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Meenal, Meenal, and Kiran Ahuja. "Performance Analysis of Multi Traffic over Multi Rate EDCA of WLAN Network." International Journal of Future Generation Communication and Networking 6, no. 6 (December 31, 2013): 99–108. http://dx.doi.org/10.14257/ijfgcn.2013.6.6.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kuo, Yau-Hwang, Mong-Fong Horng, and Jung-Hsien Chiang. "An Adaptive Fuzzy Clustering Technique for Traffic Prediction of Packet-switched Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 5, no. 3 (May 20, 2001): 180–88. http://dx.doi.org/10.20965/jaciii.2001.p0180.

Full text
Abstract:
Traffic prediction is significant to QoS design because it assists efficient management of network resources to improve the reliability and performance of the next generation Internet. The unavoidable traffic variation caused by diverse Internet services complicates traffic prediction, particularly in a multi-hop network. To simplify the complicated statistical analysis used in traditional approaches, an adaptive traffic prediction approach featuring robustness, high accuracy and high adaptability is proposed in this paper. The proposed approach bases on a novel fuzzy clustering algorithm to generalize and unveil the hidden structure of traffic patterns. The unveiled structure represents the characteristics of the target traffic. Therefore, it can be referenced to predict traffic in a limited time period by fuzzy matching. To track the variation of target traffic, the proposed approach adopts an incremental and dynamic on-line clustering procedure so that the prediction can maintain high accuracy under traffic variation. To verify the performance of the proposed approach and investigate its properties, the periodical, Poisson and real video traffic patterns have been used to experiment. The experimental results showed an excellent performance of the developed adaptive predictor. The prediction errors, in average, are near 2.2%, 13.6% and 7.62% for periodical, Poisson and real video traffics, respectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Pešić, Dalibor, Boris Antić, Emir Smailovic, and Bojana Todosijević. "The impact of the average traffic flow speed on occurrence risk of road crash." Put i saobraćaj 65, no. 2 (July 9, 2019): 29–36. http://dx.doi.org/10.31075/pis.65.02.05.

Full text
Abstract:
Traffic flow characteristics have a significant impact on occurrence risk of road crash. The most important characteristics of the traffic flow, the impact of which is the subject of numerous studies, are the traffc flow, density, average traffic flow speed, dispersion of traffic flow speeds, as well as the contents of vehicle in traffic flow. These characteristics are in strong correlation between each other, so changes in one parameter conditional make change of other parameters. Research shows that speed-related traffic flow parameters have a significant impact on occurrence risk of road crash. Therefore, in this study an analysis of the impact of the change in the average speed of the traffic flow on the risk of an accident occurred. The research includes a section of the single carriageway from Preljina to Ljig. After the construction of the highway in the stated section of the signle carriageway, a change in the characteristics of the traffic flow occurred, with this study examining the impact of changing the average speed of the traffic flow to the occurrence risk of road crash. The connection between the speed of traffic flow and the risk of accidents has been confirmed in this study, so with the increase in average speed the risk of accidents increases.
APA, Harvard, Vancouver, ISO, and other styles
22

Hailu, Dawit Hadush, Gebrehiwet Gebrekrstos Lema, Gebremichael T. Tesfamariam, and Tole Sutikno. "A simulation based performance evaluation of optical ethernet switch." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1639. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1639-1646.

Full text
Abstract:
<p class="FigureCaption"><span>With the advent of several new cloud radio access network (C-RAN) technologies, today’s networking environment is dramatically altered and is experiencing a rapid transformation. One of the most important is ethernet based C-RAN, in support of which many products such as optical Ethernet switches have recently appeared on the market. This paper presents the performance analysis of such switches with respect to packet loss ratio (PLR), latency and packet delay variation (PDV). We employed the Simula based on discrete event modelling on Simula (DEMOS), a context class for discrete event simulation to simulate a cut-through optical ethernet switch under two types of traffics: high priority (HP) traffic and low priority (LP) traffic. In this way, the paper evaluates the optical Ethernet switch performance quantitatively. The results obtained from the simulator showed that the high quality of service was reflected on HP traffic and the low quality of service in LP traffic. Hence, HP traffic can be used for transporting radio over ethernet (RoE) traffic while LP traffic can used for transporting time insensitive application. It is also found that HP traffic experiences a PDV equals to the duration of maximum sized LP traffic in Optical Ethernet switch.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
23

Mikola, Andri, and Azriel Christian Nurcahyo. "Analisis Load Balancing Berbasis Mikrotik Dalam Meningkatkan Kemampuan Server di Institut Shanti Bhuana." Journal of Information Technology 2, no. 2 (September 28, 2022): 17–20. http://dx.doi.org/10.46229/jifotech.v2i2.481.

Full text
Abstract:
Intisari— Semakin berkembangnya teknologi semakin bertambahnya pengguna-pengguna baru dalam bidang teknologi. Seiring dengan perkembangan teknologi, kemampuan dalam jaringan internet juga semakin meningkat sehingga menyebabkan sebuah trafIfic pada jaringan semakin buruk. Load blancing dapat membuat kinerja pada jaringan internet lebih optimal dan melakukan proses Traffic jaringan menjadi lebih stabil. Konfigurasi Load Blancing dapat di lakukan Pada Mikrotik server melalui media aplikasi Winbox. Proses konfigurasi sehingga menjadi stanbil dapat dilakukan dengan 2 ISP agar jaringan terbagi merata. Dengan Load Balancing bukan hanya sekedar membagikan pemerataan pada jaringan tetapi juga sebagai pengendalian dan penyeimbangan pada web server. Proses pengujian traffic pada jaringan yang kami mendapatkan kecepatan jaringan 17.6 Mbps, dan dapat di simpulkan bahwa jaringan internet di Institut Shanti Bhuana tergolong “Baik”.
APA, Harvard, Vancouver, ISO, and other styles
24

Gomes, João V. P., Pedro R. M. Inácio, Branka Lakic, Mário M. Freire, Henrique J. A. Da Silva, and Paulo P. Monteiro. "Source traffic analysis." ACM Transactions on Multimedia Computing, Communications, and Applications 6, no. 3 (August 2010): 1–23. http://dx.doi.org/10.1145/1823746.1823755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gorbachev, A. M. "Mathematical model of aperiodic timetables of urban electric transport." Automation on Transport 6, no. 4 (December 2020): 499–517. http://dx.doi.org/10.20295/2412-9186-2020-6-4-499-517.

Full text
Abstract:
The analysis of scientifi c publications and timetable models is given. Existing works have been used as a basis of a classification of timetables by the frequency of time values. The urban transport network is presented in the form of a multigraph. The transition from a multigraph of the urban transport network to a network of events characterizing the traffi c process is considered. Constraints on time values have been formalized to solve the main problem of the scheduling theory. The proposed formalization factors in the specifi cs of traffic management planning in Russia and other post-Soviet countries. A mathematical model of aperiodic timetables for the ground urban electric transport traffic based on the theory of linear programming is presented. The optimization criterion for solving the main problem of the scheduling theory has been substantiated. The uniformity of traffi c intervals is used as an optimization criterion for solving the main problem of the scheduling theory. The article provides tabular timetables used in urban transport to describe the traffi c process in the absence of significant events on the line. The implementation of the model presented in this article is exemplified by the automated tram and trolleybus timetable design software being part of the automated urban electric transport control system currently used in Saint Petersburg to form tram and trolleybus timetables. The examples of calculating the vehicle departure interval diagrams have been used to demonstrate the function of aligning the traffi c intervals. In conclusion, the advantages and development paths of the proposed model of aperiodic timetables for the ground urban electric transport traffic are listed
APA, Harvard, Vancouver, ISO, and other styles
26

SONY, BODANAPU. "Analysis of Roadway Crash Prediction Studies on Urban Roads under Heterogeneous Traffic Conditions." Journal of Research on the Lepidoptera 51, no. 1 (February 28, 2020): 292–301. http://dx.doi.org/10.36872/lepi/v51i1/301025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Abdullah, Wisam Dawood, Ali Abdullah Ali, and Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study." Webology 19, no. 1 (January 20, 2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.

Full text
Abstract:
Network Traffic Monitoring and Analysis (NTMA) is the main element to network management, especially to correctly operate large-scale networks such as the Internet on which modern academic organizations heavily depend. Their traffic use increases significantly because students, staff members, and research labs use them to search information. It is necessary to analyze, measure, and classify this Internet traffic according to the need of different stakeholders such as Internet Service Providers and network administrators. Moreover, bandwidth congestions frequently occur, causing user dissatisfaction. This study tries to find different characterizations such as data over hosts, countries, cities, companies, top-level domains, and servers. In addition, this is a new study to find out different patterns and levels of analysis from the device to its international requests. Our findings show that the highest traffic use is on Mondays and Wednesdays. Web server and DNS server drop in response to fault tolerance. Social networks consume most of the bandwidth, such as 42% Facebook followed by 22% WhatsApp in peak hours. The second most accessed sites are search engines. Google is the most used one. About 59% of the host cities are outside Iraq, in particular USA and the UK. In Amara and Baghdad cities, the requested sites are 51% and 49% overseas. About 40% of the traffic is provided by EarthLink Ltd. Communication Internet services (Iraq), 14% EdgeCast. 12% level3, 9% Facebook, 7% Google, Akamai-as and Microsoft-corp-msn-as-block. This study gives guidelines for network administrators to improve their performance and bandwidth at the educational networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Бешлей, М., А. Прислупський, М. Медвецький, and Г. Бешлей. "Інтелектуальна система моніторингу та аналізу трафіку для виявлення атак в програмно-конфігурованих мережах." Information and communication technologies, electronic engineering 2, no. 1 (August 2022): 1–11. http://dx.doi.org/10.23939/ictee2022.01.001.

Full text
Abstract:
Today, the task of monitoring, security, management, traffic prioritization and optimization of the overall load on the network infrastructure is becoming extremely important not only for the corporate sector, but also for mobile and fixed-line operators. Current trends in Internet content services indicate that the requirements for traffic management are unpredictable. Therefore, service providers must implement new algorithms to monitor and analyze network traffic to detect attacks in today's networks, where software can be updated to support changing traffic management and control requirements as needed. That is why this paper developed a unique algorithm for monitoring and analyzing network traffic, which improved the efficiency of standard intrusion detection and prevention systems by using intelligent multifractal processes for analyzing incoming traffic. It has been experimentally proved that the use of the developed algorithms in the communication infrastructure allowed to reduce data losses up to 5 % if malicious traffic was present in the communication channels.
APA, Harvard, Vancouver, ISO, and other styles
29

Handayani, Sri, and Prind Triajeng Pungkasanti. "Monitoring dan Analisis Trafik di Jaringan USM Menggunakan Multi Router Traffic Grapher." Jurnal Transformatika 12, no. 1 (July 5, 2014): 1. http://dx.doi.org/10.26623/transformatika.v12i1.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shi, Heng Hua, Xin Xu, Yu Jie Wang, and Yuan Yue Yang. "Research on Queue Scheduling Algorithm Modeling and Analysis." Advanced Materials Research 542-543 (June 2012): 1390–93. http://dx.doi.org/10.4028/www.scientific.net/amr.542-543.1390.

Full text
Abstract:
With the development of network technology and the wide use of the Internet, QoS has attracted wide attention. Queue scheduling algorithm of Router is an important core technology of the network resource management for QoS. Through controlling usage of the link bandwidth of the different type groups, the different traffics have the different levels of service. Based on the analysis and modeling of FIFO, PQ, and WFQ scheduling algorithms, the simulation experiment simulate three different priority video conferencing traffic, and apply FIFO, PQ, and WFQ scheduling algorithms on the bottleneck link. The simulation results compare network delay of FIFO, PQ, and WFQ scheduling algorithms, and describe the various queue scheduling algorithm characteristics.
APA, Harvard, Vancouver, ISO, and other styles
31

AKIYAMA, Takamasa, and Chun Fu SHAO. "Traffic Information Service and Fuzzy Traffic Flow Analysis." Journal of Japan Society for Fuzzy Theory and Systems 11, no. 2 (1999): 246–58. http://dx.doi.org/10.3156/jfuzzy.11.2_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Velazco, Enio E. "Air traffic management: High-low traffic intensity analysis." European Journal of Operational Research 80, no. 1 (January 1995): 45–58. http://dx.doi.org/10.1016/0377-2217(93)e0045-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Harjono, Mulyadi Sinung, Wimpie A. N. Aspar, Abdul Halim, and Kalamullah Ramli. "ANALISIS DISTRIBUSI PROBABILITAS DAN KENDALI OPTIMAL PERSIMPANGAN = PROBABILITY DISTRIBUTION ANALYSIS AND OPTIMAL CONTROL INTERSECTION." Majalah Ilmiah Pengkajian Industri 9, no. 1 (June 16, 2015): 21–26. http://dx.doi.org/10.29122/mipi.v9i1.92.

Full text
Abstract:
Abstract Research traffic dynamics modeling requires the enumeration of traffic flow data on many road network nodes. Information enumeration traffic flows are applied to the analysis model of the road network control or control the intersection area, either as a standalone junction (isolated) and the coordinative intersection. Classification of types and traffic conditions used for this control is determined by ITS transportation management policy or government. Estimation and prediction of traffic conditions in real terms are based on information obtained by traffic counting. Counting of traffic flows is aimed to determine the probability distribution function (pdf) traffic flow for the intersection of two segments, namely Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin and Jalan Kebun Sirih - Jalan Mohammad Husni Thamrin, Jakarta, Indonesia. Signalized intersection is composed of roads with 12 lanes and 4 lanes with traffic signs and fixtures actuated traffic control system using historical data. Based on the evolution of the combined token, it was obtained fundamental equation for the evolution of the token. Based on the modeling, the needs of departure vehicle for red light violators and breakthrough yellow light, it would require further development to SimHPN. Modeling and simulation of hybrid Petri nets on this research are aimed to perform optimal control system for traffic flow, the number of vehicles at intersections, in order to obtain optimal current flow in the study area. Abstrak Penelitian pemodelan dinamika lalu-lintas memerlukan data pencacahan arus lalu-lintas (traffic counting) pada banyak simpul jaringan jalan. Informasi pencacahan arus lalu-lintas tersebut dipergunakan untuk analisa model pengendalian jaringan jalan ataupun pengendalian area persimpangan, baik sebagai persimpangan mandiri (isolated) maupun persimpangan koordinatif. Penggolongan jenis dan kondisi lalu-lintas yang dipergunakan untuk pengendalian ini ditentukan oleh kebijakan manajemen transportasi ITS ataupun pemerintah. Estimasi dan prediksi kondisi lalu-lintas secara riil diperoleh berdasarkan informasi hasil pencacahan arus lalu-lintas. Pencacahan arus lalulintas bertujuan untuk menentukan fungsi distribusi probabilitas (pdf) arus lalulintas untuk dua ruas persimpangan, yaitu Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin dan Jalan Kebon Sirih - Jalan Mohammad Husni Thamrin, Jakarta Indonesia. Persimpangan bersinyal ini tersusun atas ruas jalan dengan 12 lajur dan 4 lajur dengan rambu lalu-lintas dan perlengkapan actuated traffic control system menggunakan data historical. Berdasarkan evolusi token gabungan diperoleh persamaan fundamental untuk evolusi token. Berdasarkan kebutuhan pemodelan keberangkatan kendaraan untuk pelanggar lampu merah dan penerobos lampu kuning, maka diperlukan pengembangan lebih lanjut terhadap SimHPN. Pemodelan dan simulasi dengan hybrid Petri nets pada penelitian ditujukan untuk melakukan sistem kendali optimal terhadap arus lalulintas, jumlah kendaraan di persimpangan, sehingga diperoleh aliran arus optimal pada area penelitian.
APA, Harvard, Vancouver, ISO, and other styles
34

Feng, Suwei, Guoqing Gu, and Shiqiang Dai. "Effects of traffic lights on CA traffic model." Communications in Nonlinear Science and Numerical Simulation 2, no. 2 (May 1997): 70–74. http://dx.doi.org/10.1016/s1007-5704(97)90042-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tanaka, Shunichi, Kazumasa Kumazawa, and Takafumi Koseki. "360594 PASSENGER FLOW ANALYSIS FOR TRAIN RESCHEDULING AND ITS EVALUTION(Traffic Planning,Technical Session)." Proceedings of International Symposium on Seed-up and Service Technology for Railway and Maglev Systems : STECH 2009 (2009): _360594–1_—_360594–5_. http://dx.doi.org/10.1299/jsmestech.2009._360594-1_.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Murovanyi, Igor, and Pavlo Mazyliuk. "Analysis of saturation flow on isolated lanes of controlled intersections with significant traffic intensity." Transport technologies 2020, no. 2 (November 9, 2020): 1–12. http://dx.doi.org/10.23939/tt2020.02.001.

Full text
Abstract:
The methods and results of the investigation of intervals between vehicles during queue dissipation before controlled intersections with the further determination of saturation flow are reviewed in this paper. Having reviewed existing methods of determining the saturation in traffic flows, those are determined which provide the most certain results in conditions of intensive movement and take into account quite a large number of impact factors. Such methods are based on experimental measurement of intervals between vehicles during their passage through the stop-line in different directions of the controlled intersection. For the completeness of the analysis of such intervals, such factors are considered additionally as traffic composition and use of lanes by directions. Objects of the research are controlled intersections on approaches to which the slope is absent, there is no pedestrian and cyclist movement during the performance of turn, and conflicting traffic flows and also public transport stops in the zone of the intersection. The transitional research result is the determination of the number of vehicles that pass the stop-line during the permissive signal and time intervals between them, and the final result is the oncoming of saturation period on the lanes of straight and turns movement depending on traffic flow composition.
APA, Harvard, Vancouver, ISO, and other styles
37

Jarocki, Jacek, and Paweł Wontorski. "The analysis of the rail trafic management on the railway routes with the given traffic factors." WUT Journal of Transportation Engineering 121 (June 1, 2018): 95–104. http://dx.doi.org/10.5604/01.3001.0014.4570.

Full text
Abstract:
One of the elements of modernising the railroad in Poland is introducing the management of the rail transport system which fulfills the needs of growing transportation and increased speed of trains. The proces of investing and innovating of the rail traffic system should be preceded by the analysis of transport prognoses and designing of the rail traffic system adequate to the needs. The aim of this this publication is introducing the simplified conception, which can be the basis for analysis of selecting the proper system. The analysis was carried out on the examplary section of the main arterial route no. 2 between Międzyrzec Podlaski and Biała Podlaska stations.
APA, Harvard, Vancouver, ISO, and other styles
38

WENDT, JAN A., and DARIUSZ JACEK OLSZEWSKI-STRZYŻOWSKI. "Changes in air tourism to Tunisia in 2009–2018." Baltic Journal of Health and Physical Activity 12, Special Issue 1 (November 30, 2020): 158–66. http://dx.doi.org/10.29359/bjhpa.12.spec.iss1.17.

Full text
Abstract:
Background: T he subject of this study is an analysis of the changes of tourist air traffic in Tunisia between 2009 and 2018. During this time, Tunisia saw political changes and worldwide-reported coverage of terrorist attacks on tourists (2014–2015). The aim of this study was to attempt to determine the extent to which the Tunisian Revolution and terrorist attacks have had a negative impact on the decline in the tourist traffic, and to assess the rate of return of the tourist traffic and income in this sector to the levels from before the Revolution. Material and methods: The main source of statistical data for Tunisian airports are documents List of the busiest airports in Africa and Trafic Mondial / World Traffic, and data collected from individual airports for the relevant years. The main problem in the analysis and correlation was the access to reliable data on the volume of tourist traffic, and in the case of some airports, data presenting the volume of passenger traffic. Data from the Statistical Office of Tunisia were used to identify and analyse changes in revenues. Results: Data for 2009–2018 clearly show a decrease in the number of all passengers arriving in Tunisia by air travel. Conclusions: R esearch suggests that the decline in the number of tourists as a result of political changes and terrorist attacks has been characterised by different dynamics. Political events have a lower impact on the decrease in the number of tourists and have an effect over a longer period. It seems that after a period of a twofold decrease in the number of tourists – firstly, because of the revolution, and secondly, because of attacks after 2016, Tunisia has entered a period of prosperity in tourism, as evidenced by data for 2017–2018. However, after the record-breaking year 2019, the first quarter of 2020 began under the sign of the Coronavirus pandemic, and tourism around the world is facing a period of stagnation.
APA, Harvard, Vancouver, ISO, and other styles
39

Mercier, Magali. "Traffic flow modelling with junctions." Journal of Mathematical Analysis and Applications 350, no. 1 (February 2009): 369–83. http://dx.doi.org/10.1016/j.jmaa.2008.09.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Karaeva, M., N. Napkhonenko, and V. Perevozniuk. "Managing Dynamically Changing Traffic Flows." International Journal of Engineering & Technology 7, no. 4.3 (September 15, 2018): 222. http://dx.doi.org/10.14419/ijet.v7i4.3.19791.

Full text
Abstract:
The brief analysis of publications in the field of transport development, the organization and management of urban passenger traffic in the conditions of constantly changing passenger traffics is carried out. The efficiency of using logistic methods is proved by optimization of public passenger transport of the megalopolis. The factors influencing regularity of passenger traffics formation and their dynamic spatial distribution taking into account the main communications between passenger formed points and service providers are revealed. For improvement of traffic flows management the relevance of development of new mathematical models and methods considering relationship of cause and effect between the input and output parameters is established. Methods of solving large-size problems in the conditions of difficult criterion function are considered. Advantages and the prospects of meta-heuristic methods application – genetic algorithms – are shown at the solution of the transport tasks characteristic of unstable streams.For solving the objective using a set of genes is proposed which elements represent a chromosome with a certain set of decisions. Restrictions are formulated and operators of casual changes for a work of genetic algorithm are defined. The algorithm allowing to define and range the key input parameters influencing process of providing transport services and to receive parameters for the output correlation analysis is obtained.
APA, Harvard, Vancouver, ISO, and other styles
41

Nur Haziq Mohd Safri, Mohamad, Wan Nor Shuhadah Wan Nik, Zarina Mohamad, and Mumtazimah Mohamad. "Wireless Network Traffic Analysis and Troubleshooting using Raspberry Pi." International Journal of Engineering & Technology 7, no. 2.15 (April 6, 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.15.11213.

Full text
Abstract:
In the past five decades, computer network has kept up growing with the increases of its complexity. In such situation, the management, monitoring and maintenance of such computer network requires special attention to ensure optimal network access capability is achieved. Wireless network traffic analysis is a process of recording, studying and analyzing packets in wireless network for network performance analysis purposes. In some cases, the quality of network access performance can be very low without knowing the actual problem. Therefore, in this paper, the performance of wireless network traffic is proposed to be analyzed by using a Raspberry Pi which further able to send an alert to network admin to lessen the downtime. Raspberry Pi is a low cost, a small and portable size of a computer board that can be used to plug-in to monitor, keyboard, mouse, pen drive, etc. In this project, a MyTraceroute (MTR) program is installed on the Raspberry Pi to capture the IP of the Access Point (AP) and show packets loss percentage in the network. The results will be saved in the form of text file and sent to network admin by using email. The solution proposed in this paper is able to support solution to a problem on efficient monitoring, managing and maintaining wireless network traffics.
APA, Harvard, Vancouver, ISO, and other styles
42

Boranbayev, S., and D. Kuanyshev. "NETWORK TRAFFIC ANALYSIS TOOLS." EurasianUnionScientists 5, no. 12(81) (January 18, 2021): 35–38. http://dx.doi.org/10.31618/esu.2413-9335.2020.5.81.1171.

Full text
Abstract:
The article studies network traffic analysis tools. Various aspects of network traffic analysis are considered algorithms and approaches to network traffic analysis, as well as software and hardware tools for effectively solving this problem. The article studies the current state of this area. It is given recommendations on what to pay attention when using network traffic analysis tools.
APA, Harvard, Vancouver, ISO, and other styles
43

Utkirov, Shokirxuja, Erkinjon Abdusamatov, and Baxtiyor Raxmanov. "ORGANIZATION OF TRAFFIC AT UNCONTROLLED INTERSECTIONS." Eurasian Journal of Academic Research 03, no. 02 (February 1, 2023): 57–65. http://dx.doi.org/10.37547/ejar-v03-i02-p2-53.

Full text
Abstract:
This paper presents a study of drivers' gap acceptance behavior at an uncontrolled intersection. A 4-leg uncontrolled intersection located in a semi-urban area of Ahmedabad, Gujarat was selected to study the gap acceptance behavior of drivers. Video recording technique was adopted for data collection and analysis. Various available methods are used to calculate the critical gap for minor road passing and right turn movements. Gaps are analyzed for three different vehicle types. A comparison is made between the various existing methods of critical gap detection and their critical analysis is presented. The result shows that except for the behavior elimination approach, all other methods cannot provide the real scenario of the critical gap under mixed traffic conditions because all these methods are developed for homogeneous traffic conditions.
APA, Harvard, Vancouver, ISO, and other styles
44

GOMES, LUIZ H., VIRGILIO A. F. ALMEIDA, JUSSARA M. ALMEIDA, FERNANDO D. O. CASTRO, and LUÍS M. A. BETTENCOURT. "QUANTIFYING SOCIAL AND OPPORTUNISTIC BEHAVIOR IN EMAIL NETWORKS." Advances in Complex Systems 12, no. 01 (February 2009): 99–112. http://dx.doi.org/10.1142/s0219525909002088.

Full text
Abstract:
Email graphs have been used to illustrate the general properties of social networks of communication and collaboration. However, increasingly, the majority of Internet traffic reflects opportunistic rather than symbiotic social relations. Here we use email data drawn from a large university to construct directed graphs of email exchange that quantify the differences between social and opportunistic behavior, represented by legitimate messages and spam, respectively. We show that while structural characteristics typical of other social networks are shared to a large extent by the legitimate component, they are not characteristic of opportunistic traffic. To complement the graph analysis, which suffers from incomplete knowledge of users external to the domain, we study temporal patterns of communication to show dynamical properties of email traffic. The results indicate that social email traffic has lower entropy (higher structural information) than opportunistic traffic for periods covering both working and non-working hours. We see in general that both social and opportunistic traffics are not random, and that social email shows stronger temporal structure with a high probability for long silences and bursts of a few messages. These findings offer insights into the fundamental differences between social and opportunistic behavior in email networks, and may generalize to the structure of opportunistic social relations in other environments.
APA, Harvard, Vancouver, ISO, and other styles
45

Abdi, Ali, Hamid Bigdeli Rad, and Ehsan Azimi. "Simulation and analysis of traffic flow for traffic calming." Proceedings of the Institution of Civil Engineers - Municipal Engineer 170, no. 1 (March 2017): 16–28. http://dx.doi.org/10.1680/jmuen.16.00005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Besenczi, Renátó, Norbert Bátfai, Péter Jeszenszky, Roland Major, Fanny Monori, and Márton Ispány. "Large-scale simulation of traffic flow using Markov model." PLOS ONE 16, no. 2 (February 9, 2021): e0246062. http://dx.doi.org/10.1371/journal.pone.0246062.

Full text
Abstract:
Modeling and simulating movement of vehicles in established transportation infrastructures, especially in large urban road networks is an important task. It helps in understanding and handling traffic problems, optimizing traffic regulations and adapting the traffic management in real time for unexpected disaster events. A mathematically rigorous stochastic model that can be used for traffic analysis was proposed earlier by other researchers which is based on an interplay between graph and Markov chain theories. This model provides a transition probability matrix which describes the traffic’s dynamic with its unique stationary distribution of the vehicles on the road network. In this paper, a new parametrization is presented for this model by introducing the concept of two-dimensional stationary distribution which can handle the traffic’s dynamic together with the vehicles’ distribution. In addition, the weighted least squares estimation method is applied for estimating this new parameter matrix using trajectory data. In a case study, we apply our method on the Taxi Trajectory Prediction dataset and road network data from the OpenStreetMap project, both available publicly. To test our approach, we have implemented the proposed model in software. We have run simulations in medium and large scales and both the model and estimation procedure, based on artificial and real datasets, have been proved satisfactory and superior to the frequency based maximum likelihood method. In a real application, we have unfolded a stationary distribution on the map graph of Porto, based on the dataset. The approach described here combines techniques which, when used together to analyze traffic on large road networks, has not previously been reported.
APA, Harvard, Vancouver, ISO, and other styles
47

Yao, Changhua, Lei Zhu, Yongxing Jia, and Lei Wang. "Demand-aware traffic cooperation for self-organizing cognitive small-cell networks." International Journal of Distributed Sensor Networks 15, no. 1 (January 2019): 155014771881728. http://dx.doi.org/10.1177/1550147718817289.

Full text
Abstract:
This article investigates the problem of efficient spectrum access for traffic demands of self-organizing cognitive small-cell networks, using the coalitional game approach. In particular, we propose a novel spectrum and time two-dimensional Traffic Cooperation Coalitional Game model which aims to improve the network throughput. The main motivation is to complete the data traffics of users, and the main idea is to make use of spectrum resource efficiently by reducing mutual interference in the spectrum dimension and considering cooperative data transmission in the time dimension at the same time. With the approach of coalition formation, compared with the traditional binary order in most existing coalition formation algorithms, the proposed functional order indicates a more flexibly preferring action which is a functional value determined by the environment information. To solve the distributed self-organizing traffic cooperation coalition formation problem, we propose three coalition formation algorithms: the first one is the Binary Preferring Traffic Cooperation Coalition Formation Algorithm based on the traditional Binary Preferring order; the second one is the Best Selection Traffic Cooperation Coalition Formation Algorithm based on the functional Best Selection order to improve the converging speed; and the third one is the Probabilistic Decision Traffic Cooperation Coalition Formation Algorithm based on the functional Probabilistic Decision order to improve the performance of the formed coalition. The proposed three algorithms are proved to converge to Nash-stable coalition structure. Simulation results verify the theoretic analysis and the proposed approaches.
APA, Harvard, Vancouver, ISO, and other styles
48

Alfandianto, Alex, Cosmos Eko Suharyanto, and Fidelis Nikehana DIsa Prasasti. "Analisis Regresi Linier Guna Mengetahui Pengaruh Tingkat Kematian Kecelakaan Lalu Lintas Terhadap Faktor Mabuk." SAINTEK : Jurnal Ilmiah Sains dan Teknologi Industri 5, no. 1 (July 10, 2021): 47–51. http://dx.doi.org/10.32524/saintek.v5i1.246.

Full text
Abstract:
The linear regression analysis model of traffic accidents obtained, showing the results close to the number of accident data that occurred in the period of 3 years (2017-2019). The difference between traffic accidents and traffic accident estimates for 3 years. Observations were also observed on the national level of Indonesia. Based on the influence factors, the traffic accident rate can be estimated with linear regression analysis, based on the model made, so that traffic accidents data can be controlled, in order to know the traffic accident level, so it can be calibrated based on the traffic accident data obtained from the data PT Jasa Raharja. After the test, the influence and the difference that affect the traffic accident rate that the death rate due to traffic accident is not influenced by the factor due to drunk that is equal to 6%. Rather, the most dominant factors such as less traffic order by 20%, factors due to drowsiness by 17%, factors due to fatigue of 14%, and factors due to speeding by 11%.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Jian Ling, and Hong Bo Lai. "Congestion Analysis on Urban Traffic Network." Advanced Materials Research 756-759 (September 2013): 1635–38. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1635.

Full text
Abstract:
this paper explores the urban traffic congestion problems, from four angles: the discrimination of the traffic congestion, cause of traffic congestion, congestion characteristics of urban traffic network, measures to solve traffic congestion, to conduct in-depth analysis of traffic congestion.
APA, Harvard, Vancouver, ISO, and other styles
50

Alexis Fidele, Kagiraneza, Suryono, and Wahyul Amien Syafei. "Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment." E3S Web of Conferences 202 (2020): 15003. http://dx.doi.org/10.1051/e3sconf/202020215003.

Full text
Abstract:
Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environment. In this research, the user identifies the attack levels (TCP SYN, UDP, and HTTP protocol), ranging from low (Q1), medium (Q2), and high (Q4) attacks. The approach is to simulate the TCP, HTTP, and UDP flood attacks and analyze the attacks' effects on the network environment. In this work, normal scenarios and pattern attacks were compared. In this case, the intruder floods unwanted packets to the victim with a massive number of request packets; the SYN from the corresponding SYN-ACK replies are not achieved. This paper will identify the DoS attacks level and analyze the behavior of traffics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography