-
21
Traffic Flow Prediction with Rainfall Impact Using a Deep Learning Method
Published 2017-01-01“…Accurate traffic flow prediction is increasingly essential for successful traffic modeling, operation, and management. Traditional data driven traffic flow prediction approaches have largely assumed restrictive (shallow) model architectures and do not leverage the large amount of environmental data available. …”
Get full text
Article -
22
Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach
Published 2025-01-01“…To address the detection of such attacks, we first present a traffic modeling framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, data poison attacks, and denial-of-service (DoS) attacks. …”
Get full text
Article -
23
Filter for Traffic Congestion Prediction: Leveraging Traffic Control Signal Actions for Dynamic State Estimation
Published 2025-01-01“…This study contributes to this domain by enhancing traffic prediction models. Traditional traffic models often fall short in accurately predicting traffic flow, particularly in dynamic urban settings. …”
Get full text
Article -
24
Modeling and analysis of performance reliability for communication networks based on traffic dynamics
Published 2011-01-01“…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
Get full text
Article -
25
Multiscale admission control algorithm for statistical QoS guarantee
Published 2011-11-01“…Statistical properties of the traffic were calculated to estimate the burst level through online measurement for selecting proper traffic model.In order to guarantee traffic QoS,the effective envelope of self-similarity and multiracial traffic was derived using the transformation theory between the effective bandwidth and effective envelope.Then,QoS parameters were obtained using network calculus to perform admission decision;furthermore appropriate admission time was chosen to reduce the proposed algorithm’s impact on QoS performance.The simulations prove that the traffic model can be selected accurately,statistical delay can be ensured and utilization efficiency of network is improved.…”
Get full text
Article -
26
Reaction time driven profiling of traffic flow with intelligent vehicles
Published 2025-01-01“…Thus, a new traffic model for IVs based on safe reaction velocity, reaction time, and braking time is proposed, incorporating the IVs reaction times. …”
Get full text
Article -
27
Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User
Published 2017-01-01“…Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. …”
Get full text
Article -
28
On study and implementation of self-similar network traffic
Published 2005-01-01“…Combining the modern statistical result on network traffic with the existing traffic models, a practical traffic model was constructed. …”
Get full text
Article -
29
Study on self-similar call admission control algorithm in WiM AX
Published 2012-09-01“…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
Get full text
Article -
30
Research on Limitation of Snake Flow Test in Routers' Performance Test
Published 2013-11-01“…The differences of the test results in latency, jitter, drop, traffic model and so on, were analyzed. The limitation of snake flow test methods in performance test was revealed.…”
Get full text
Article -
31
Estimating Macroscopic Volume Delay Functions with the Traffic Density Derived from Measured Speeds and Flows
Published 2017-01-01“…Thanks to this traffic congestion in macroscopic traffic models can be reproduced more realistically in line with empirical observations.…”
Get full text
Article -
32
Simulation Strategies for Mixed Traffic Conditions: A Review of Car-Following Models and Simulation Frameworks
Published 2020-01-01“…The accommodation of vehicle heterogeneity into the car-following models (homogeneous traffic models) is discussed in detail, along with their shortcomings and research gaps. …”
Get full text
Article -
33
Research on enhanced channel assignment scheme in wireless mesh network
Published 2012-10-01“…To ensure the reliability of the wireless mesh network resource assignment,an interference model to node traffic model of WMN was introduced,and channel assignment strategy based on fixed traffic-awareness C-HYA channel assignment strategy was improved,which a greedier algorithm to avoid ripple effect and reduce network interference was adopted.In addition,the network topology and simulates the algorithm was built.The results of theoretical analysis and simulation show the performance of improved channel assignment strategy compared with traditional algorithm in terms of resisting ripple effect and channel interference.…”
Get full text
Article -
34
Fairness based channel borrowing strategy for multimedia LEO satellite communications
Published 2006-01-01“…A LEO satellite mobility model and user multimedia traffic model was first built,then a novel channel bor-rowing strategy(CBS)was proposed and its performance was evaluated and compared with several existing channel al-location schemes through computer simulation.Simulation results show this scheme can satisfy the QoS requirement of LEO satellite multimedia service very well,at the same time,keeping resource utilization high,finally discussed the fair-ness and system performance under three different channel borrowing strategies.…”
Get full text
Article -
35
Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class
Published 2015-12-01“…Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. …”
Get full text
Article -
36
Quantum key supply and dynamic adjustment strategies for power dispatch
Published 2018-12-01“…In order to ensure the transmission security of electric power dispatching service data,a quantum key supply and dynamic adjustment algorithm was provided.Firstly,the key application mode was determined according to the priority of different services,and the calculation method of the key pool capacity was also provided.Secondly,the quantum key dynamic adjustment algorithm was designed based on the key update frequency and application mode.Finally,the traffic model for the dispatching system was established,and the algorithm’s application performance for different scenarios was simulated within point-to-point/multipoint architectures.The test results show that the algorithm can realize the dynamic key adjustment in the selected adjustment period,and thus improves the security of the scheduling data transmissions.…”
Get full text
Article -
37
Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN
Published 2016-04-01“…Firstly,CSMA algorithm was used to estimate potential bandwidth of secondary user under the given PU traffic model. Then,aggregated bandwidth of multiple SU simultaneous transmitting within different business channels was derived. …”
Get full text
Article -
38
A posteriori Variational Multiscale Methods for the 1D convection-diffusion equations
Published 2023-06-01“…We present an extension of this technique to nonlinear convection-diffusion equations (a traffic model), providing an efficient method for the resolution of shocks from just the Galerkin solution at targeted times. …”
Get full text
Article -
39
Simulating method for TCP aggregated traffic of large scale network
Published 2006-01-01“…To obtain a trade-off between veracity and complexity when simulating TCP traffic of large-scale network,the TCP aggregated traffic of access network in the gateway was proposed as simulated object,instead of the traffic generated at the individual host or session level.Based on the self-similarity of application-level and network-level,the TCP aggregated traffic model was proposed due to the self-similarity of network traffic.The self-similar traffic at application level was generated by aggregating many ON/OFF sources following Pareto distribution.The aggregated transmission control was put on the traffic at network transmission level based on the mechanism of TCP protocol.Compared with the real data collected from a Network Exchange Center,the simulating result shows the validity of the model from the criteria of traffic load proportion,traffic self-similarity,and the packet loss ratio.…”
Get full text
Article -
40
Distance-Based Stable Routing Decision Scheme in Urban Vehicular Ad Hoc Networks
Published 2015-08-01“…The performance is then evaluated under simulation which is implemented with the Manhattan urban traffic model. The results show the improved performance as compared with the previous researches.…”
Get full text
Article