نتایج جستجو برای: traffic analysis

تعداد نتایج: 2898804  

2004
Todd DeSantis

.........................................................................................................................ii

2016
Georgios Methenitis Michael Kaisers Han La Poutré

Current electricity tariffs for retail rarely provide incentives for intelligent demand response of flexible customers. Such customers could otherwise contribute to balancing supply and demand in future smart grids. This paper proposes an innovative risk-sharing tariff to incentivize intelligent customer behavior. A two-step parameterized payment scheme is proposed, consisting of a prepayment b...

2003
Vincent Hogan Colm Harmon

1 The purpose of this paper is to explore, in practical terms, prospects for empirical analysis in the non-life insurance market in Ireland, with particular reference to Motor, Employer's Liability and Public Liability insurance. The paper is being made available to potential candidates for a consultancy contract in relation to the study on insurance being carried out jointly by the Authority a...

Analyzing motion patterns in traffic videos can be exploited directly to generate high-level descriptions of the video contents. Such descriptions may further be employed in different traffic applications such as traffic phase detection and abnormal event detection. One of the most recent and successful unsupervised methods for complex traffic scene analysis is based on topic models. In this pa...

2010
Sara Tonelli Rodolfo Delmonte

The system to spot INIs, DNIs and their antecedents is an adaptation of VENSES, a system for semantic evaluation that has been used for RTE challenges in the last 6 years. In the following we will briefly describe the system and then the additions we made to cope with the new task. In particular, we will discuss how we mapped the VENSES analysis to the representation of frame information in ord...

Journal: :medical journal of islamic republic of iran 0
haidar nadrian department of health education and promotion, school of health and health research institute, tehran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی تهران (tehran university of medical sciences) saharnaz nedjat department of epidemiology and biostatistics, school of health, knowledge utilization research center, tehran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی تهران (tehran university of medical sciences)سازمان های دیگر: knowledge utilization research center mohammad hossein taghdisi department of health education and promotion, school of health, iran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی ایران (iran university of medical sciences) davoud shojaeizadeh department of health education and promotion, school of health and health research institute, tehran university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی تهران (tehran university of medical sciences)

background :traffic and transport is a substantial part of a range of economic, social and environmental factors distinguished to have impact on human health. this paper is a report on a preliminary section of a health impact assessment (hia) on urban traffic and transport initiatives, being conducted in sanandaj, iran. in this preliminary study, the psychometric properties of urban traffic rel...

2002
Andrei Serjantov George Danezis

In this paper we look closely at the popular metric of anonymity, the anonymity set, and point out a number of problems associated with it. We then propose an alternative information theoretic measure of anonymity which takes into account the probabilities of users sending and receiving the messages and show how to calculate it for a message in a standard mix-based anonymity system. We also use...

2015
Budi Rahardjo Kuspriyanto Intan Muchtadi-Alamsyah Marisa W. Paryasto

A novel method of concealing information is proposed. Encrypted data is mixed with noise to add the security. The cost of an attack increases linearly with the size of the added noise. Since generating noise is cheap, the size of noise can be as large as possible. However, there are issues in automatically detecting and separating noise in the intended recipient end. This stegocrypto method als...

2001
Larry Korba Ronggong Song

We first provide an overview of the better known network approaches for assuring anonymity and privacy over networks. We then analyze possible attacks to these network based on traffic analysis techniques and discuss their implementation and design issues for network privacy. In the conclusion we discuss the results, indicating research opportunities in this domain.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید