نتایج جستجو برای: traffic detection

تعداد نتایج: 656237  

2013
Jing Zheng

This work use basic image processing technique to automatically recognize two different traffic signs (stop sign and yield sign) in an image. The image is first thresholded on RBG domain to separate out the regions with red color, which is those traffic signs usually have, then region mapping is done on the remaining regions, the regions that are either too small and too large are removed since...

2009
Michal Lyczek Lukasz Kaminski Agata Chrobak Anna Kulka

This article presents the concept of automatic traffic detection system. Idea of the system is based on image processing and distributed database. This work focuses on presentation of test installation set-up.

Automatic road extraction from aerial images can be very helpful in traffic control and vehicle guidance systems. Most of the road detection approaches are based on image segmentation algorithms. Color-based segmentation is very sensitive to light changes and consequently the change of weather condition affects the recognition rate of road detection systems. In order to reduce the light change ...

2016
Zihui Liu Sachin Sharma

In this project, we designed an advanced driver assistant system with three functions: traffic sign recognition, lane deviation detection, and car make identification. The traffic sign recognition implements Viola and Jones detector to accurately detect the traffic sign ahead. Hough transforms and edge detection are used in the lane deviation detection. For vehicle make identification, two mode...

2014
Jayro Santiago-Paz Deni Torres-Roman Angel Figueroa-Ypiña

Network anomaly detection and classification is an important open issue of network security. Several approaches and systems based on different mathematical tools have been studied and developed. Among them, the Anomaly-Network Intrusion Detection System (A-NIDS), this monitors network traffic and compares it against an established baseline of “normal” traffic profile. Then, it is necessary to c...

2017
Sumi K. M Arun Kumar

This paper presents a survey on the detection and recognition of traffic signs which has a number of important application areas that include advanced driver assistance systems, road surveying and autonomous vehicles. This has been thoroughly studied for a long time. But still it remains a challenging problem in computer vision due to the different types and the huge variability of informations...

2003
Matthew V. Mahoney Philip K. Chan

We investigate potential simulation artifacts and their effects on the evaluation of network anomaly detection systems in the 1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical comparison of the simulated background and training traffic with real traffic collected from a university departmental server suggests the presence of artifacts that could a...

2006
Arno Wagner Thomas Dübendorfer Roman Hiestand Christoph Göldi Bernhard Plattner

Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm infected hosts is one important possible cause. We developed a scan detection tool, which continuously monitors network traffic on VPN gateway(s) and that reliably detects and reports worm infected hosts by tracking ano...

2014
K. S. Karthika

-In this upcoming highly engaged traffic calls in the Peer to Peer (P2P) botnets the high scalability of detection systems is going down. Where the botmasters adopt modern system to detect traffic which ends in the malicious activities and poor scalability. So in this paper, we proposed a highly scalable botnet detection system for a stealthy peer to peer botnets. In this p2p detection it will ...

2011
Angelos Marnerides Cyriac James Alberto Schaeffer-Filho Saad Yunus Sait Andreas Mauthe Hema Murthy

Traffic analysis and anomaly detection have been extensively used to characterize network utilization as well as to identify abnormal network traffic such as malicious attacks. However, so far, techniques for traffic analysis and anomaly detection have been carried out independently, relying on mechanisms and algorithms either in edge or in core networks alone. In this paper we propose the noti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید