نتایج جستجو برای: traffic detection

تعداد نتایج: 656237  

2011
Partha Kanuparthy Constantine Dovrolis

We present end-to-end measurement methods for the detection of traffic shaping. Traffic shaping is typically implemented using token buckets, allowing a maximum burst of traffic to be serviced at the peak capacity of the link, while any remaining traffic is serviced at a lower shaping rate. The contribution of this paper is threefold. First, we develop an active end-to-end detection mechanism, ...

2016
Shiwen Zhang

In this paper, an algorithm for traffic sign detection based on color and shape detection is developed. The algorithm uses images taken by a low resolution camera mounted in front of a moving car. Two types of traffic signs, yellow warning signs and red stop signs, are tested and detection results are summarized. The conclusion is that color-based detection is sensitive to illumination conditio...

2010
Gift Khangamwa

Intrusion Detection Systems (IDS) are a very popular network security tool. These tools can allow network administrators, to identify and react to hostile traffic aimed at, or generated from their own network. In general there are two common Intrusion Detection approaches which are behavior or traffic anomaly based and knowledge or signature based. As a result of the increased sophistication of...

Journal: :J. Intellig. Transport. Systems 2000
Christopher Grant Bret Gillis Randall Guensler

Advanced traffic management systems allow video image detection to supplement and improve data inputs in transportation modeling efforts. Video detection systems use machine vision technology, the interaction of video cameras, and specialty computer hardware and software to measure traffic. Traffic parameters such as hourly flows, density, vehicle speed, level of service, and other parameters d...

Journal: :CoRR 2014
Raad Ahmed Hadi Ghazali Sulong Loay Edwar George

Vehicle detection and tracking applications play an important role for civilian and military applications such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic analysis and vehicle categorizing objectives and may be implemented under differ...

2013
Wei-Lieh Hsu Po-Lun Chang Rueiher Tsaur

Highway accidents significantly impact normal traffic flow. Consequently, automatic detection of abnormal traffic events has gradually attracted the attention of researchers interested in intelligent transportation system. This work presents a vision-based approach for automatic traffic congestion and incident detection. The proposed approach involves extracting entropy-based features to create...

Journal: :CoRR 2010
Jaydip Sen

The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the resources of the network and denying services to legitimate users. This paper has presented a mechanism for protecting a web-server against a distributed denia...

2006
Ahren Studer Chenxi Wang

Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Existing scan detection schemes use statically determined detection criteria, and as a result do not respond well to traffic perturbations. We present two adaptive scan detection schemes, Success Based (SB) and Failure ...

2013
Mehdi Barati Azizol Abdullah Ramlan Mahmod Norwati Mustapha Nur Izura Udzir

Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. On the other hand, encrypted exchanges between users are widely used to ensure data security. Traditional IDSs are not able to reactive efficiently in encrypted and tunneled traffic due to inability to analyze packet content. An encrypted malicious traffic is able to evade the de...

Journal: :International Journal of Security and Its Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید