Showing 21 - 40 results of 57 for search '"traffic modeling"', query time: 0.07s Refine Results
  1. 21

    Traffic Flow Prediction with Rainfall Impact Using a Deep Learning Method by Yuhan Jia, Jianping Wu, Ming Xu

    Published 2017-01-01
    “…Accurate traffic flow prediction is increasingly essential for successful traffic modeling, operation, and management. Traditional data driven traffic flow prediction approaches have largely assumed restrictive (shallow) model architectures and do not leverage the large amount of environmental data available. …”
    Get full text
    Article
  2. 22

    Detecting Subtle Cyberattacks on Adaptive Cruise Control Vehicles: A Machine Learning Approach by Tianyi Li, Mingfeng Shang, Shian Wang, Raphael Stern

    Published 2025-01-01
    “…To address the detection of such attacks, we first present a traffic modeling framework for three types of potential cyberattacks: malicious manipulation of vehicle control commands, data poison attacks, and denial-of-service (DoS) attacks. …”
    Get full text
    Article
  3. 23

    Filter for Traffic Congestion Prediction: Leveraging Traffic Control Signal Actions for Dynamic State Estimation by Younus Hasan Taher, Jit Singh Mandeep, Mohammad Tariqul Islam, Omer Tareq Abdulhae, Ahmed Thair Shakir, Md. Shabiul Islam, Mohamed S. Soliman

    Published 2025-01-01
    “…This study contributes to this domain by enhancing traffic prediction models. Traditional traffic models often fall short in accurately predicting traffic flow, particularly in dynamic urban settings. …”
    Get full text
    Article
  4. 24

    Modeling and analysis of performance reliability for communication networks based on traffic dynamics by ZHAO Juan1, GUO Ping1, DENG Hong-zhong2, WU Jun2, TAN Yue-jin2, LI Jian-ping1

    Published 2011-01-01
    “…To investigate the impact of the amount and change of traffic loads on the performance reliability of network,a simple traffic model for computer networks was established based on the traffic dynamics.The ratio between the ex-pected and the practical delay and the packet loss rate of each demand were used to characterize the performance reliabil-ity of the network.The performance reliability of a special local network was simulated and analyzed using the proposed approach.It was shown that the performance reliability of the network exhibited an obvious phase transition,no matter whether traffic loads were the Poisson traffic model or the Burstiness Constraints traffic model.In addition,the value of transition point can be considered as a measurement of network communication capability under special performance constraints.…”
    Get full text
    Article
  5. 25

    Multiscale admission control algorithm for statistical QoS guarantee by Yan-ping CHEN, Hui-qiang WANG, Guang-sheng FENG, Yu-long GAO

    Published 2011-11-01
    “…Statistical properties of the traffic were calculated to estimate the burst level through online measurement for selecting proper traffic model.In order to guarantee traffic QoS,the effective envelope of self-similarity and multiracial traffic was derived using the transformation theory between the effective bandwidth and effective envelope.Then,QoS parameters were obtained using network calculus to perform admission decision;furthermore appropriate admission time was chosen to reduce the proposed algorithm’s impact on QoS performance.The simulations prove that the traffic model can be selected accurately,statistical delay can be ensured and utilization efficiency of network is improved.…”
    Get full text
    Article
  6. 26

    Reaction time driven profiling of traffic flow with intelligent vehicles by Waheed Imran, Daud Khan, Zawar H. Khan, Katarzyna Markowska, Susilawati Susilawati, Luigi Pariota

    Published 2025-01-01
    “…Thus, a new traffic model for IVs based on safe reaction velocity, reaction time, and braking time is proposed, incorporating the IVs reaction times. …”
    Get full text
    Article
  7. 27

    Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User by Md. Baitul Al Sadi, Afsana Nadia

    Published 2017-01-01
    “…Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. …”
    Get full text
    Article
  8. 28

    On study and implementation of self-similar network traffic by SHI Jiang-tao, WANG Yong-gang, DAI Xue-long, YAN Tian-xin

    Published 2005-01-01
    “…Combining the modern statistical result on network traffic with the existing traffic models, a practical traffic model was constructed. …”
    Get full text
    Article
  9. 29

    Study on self-similar call admission control algorithm in WiM AX by Yong-dong HU, Guo-xin WU, Ning QIAN, San-feng ZHANG

    Published 2012-09-01
    “…As to the self-similarity of WiMAX network traffic,M/Pareto model was proposed to model network traf-fic.Through the statistical nature between the M/Pareto model and FBM traffic model,the parameters of the M/Pareto were mapped to the ones of FBM traffic model.The effective bandwidth formula was derived for M/Pareto model para-meters.Whereby,a self-similar call admission control algorithm(SS-CAC)was designed.It avoided getting the parame-ter values of FBM traffic flow model with the measurem method and adapted to the self-similarity of WiMAX traffic.Since the calculation of the effective bandwidth was accurate and convenient,simulation results show that SS-CAC greatly reduces the call blocking rate and improves the bandwidth utilization.…”
    Get full text
    Article
  10. 30

    Research on Limitation of Snake Flow Test in Routers' Performance Test by Liang Guo, Subin Wang, Junqi Zhao, Hua Chen

    Published 2013-11-01
    “…The differences of the test results in latency, jitter, drop, traffic model and so on, were analyzed. The limitation of snake flow test methods in performance test was revealed.…”
    Get full text
    Article
  11. 31

    Estimating Macroscopic Volume Delay Functions with the Traffic Density Derived from Measured Speeds and Flows by Rafał Kucharski, Arkadiusz Drabicki

    Published 2017-01-01
    “…Thanks to this traffic congestion in macroscopic traffic models can be reproduced more realistically in line with empirical observations.…”
    Get full text
    Article
  12. 32

    Simulation Strategies for Mixed Traffic Conditions: A Review of Car-Following Models and Simulation Frameworks by Bhargav Naidu Matcha, Satesh Narayana Namasivayam, Mohammad Hosseini Fouladi, K. C. Ng, Sivakumar Sivanesan, Se Yong Eh Noum

    Published 2020-01-01
    “…The accommodation of vehicle heterogeneity into the car-following models (homogeneous traffic models) is discussed in detail, along with their shortcomings and research gaps. …”
    Get full text
    Article
  13. 33

    Research on enhanced channel assignment scheme in wireless mesh network by Lin-han FENG, Zhi-hong QIAN, Dong-cheng JIN

    Published 2012-10-01
    “…To ensure the reliability of the wireless mesh network resource assignment,an interference model to node traffic model of WMN was introduced,and channel assignment strategy based on fixed traffic-awareness C-HYA channel assignment strategy was improved,which a greedier algorithm to avoid ripple effect and reduce network interference was adopted.In addition,the network topology and simulates the algorithm was built.The results of theoretical analysis and simulation show the performance of improved channel assignment strategy compared with traditional algorithm in terms of resisting ripple effect and channel interference.…”
    Get full text
    Article
  14. 34

    Fairness based channel borrowing strategy for multimedia LEO satellite communications by HUANG Fei, XU Hui, WU Shi-qi

    Published 2006-01-01
    “…A LEO satellite mobility model and user multimedia traffic model was first built,then a novel channel bor-rowing strategy(CBS)was proposed and its performance was evaluated and compared with several existing channel al-location schemes through computer simulation.Simulation results show this scheme can satisfy the QoS requirement of LEO satellite multimedia service very well,at the same time,keeping resource utilization high,finally discussed the fair-ness and system performance under three different channel borrowing strategies.…”
    Get full text
    Article
  15. 35

    Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class by Xuejiao Chen, Pan Wang, Shidong3 Liu

    Published 2015-12-01
    “…Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. …”
    Get full text
    Article
  16. 36

    Quantum key supply and dynamic adjustment strategies for power dispatch by Wei DENG, Zhuozhi YU, Yefeng ZHANG, Yalin CHEN, Yonghong MA

    Published 2018-12-01
    “…In order to ensure the transmission security of electric power dispatching service data,a quantum key supply and dynamic adjustment algorithm was provided.Firstly,the key application mode was determined according to the priority of different services,and the calculation method of the key pool capacity was also provided.Secondly,the quantum key dynamic adjustment algorithm was designed based on the key update frequency and application mode.Finally,the traffic model for the dispatching system was established,and the algorithm’s application performance for different scenarios was simulated within point-to-point/multipoint architectures.The test results show that the algorithm can realize the dynamic key adjustment in the selected adjustment period,and thus improves the security of the scheduling data transmissions.…”
    Get full text
    Article
  17. 37

    Performance evaluation of primary user and secondary user based on CSMA protocol in CRSN by Ying LIU, Li ZHENG, Yuansong LI

    Published 2016-04-01
    “…Firstly,CSMA algorithm was used to estimate potential bandwidth of secondary user under the given PU traffic model. Then,aggregated bandwidth of multiple SU simultaneous transmitting within different business channels was derived. …”
    Get full text
    Article
  18. 38

    A posteriori Variational Multiscale Methods for the 1D convection-diffusion equations by Chacón Rebollo, Tomás, Domínguez-Delgado, Antonio, Gómez Marmol, Macarena

    Published 2023-06-01
    “…We present an extension of this technique to nonlinear convection-diffusion equations (a traffic model), providing an efficient method for the resolution of shocks from just the Galerkin solution at targeted times. …”
    Get full text
    Article
  19. 39

    Simulating method for TCP aggregated traffic of large scale network by CHEN Yu-feng1, DONG Ya-bo1, LU Dong-ming1, PAN Yun-he1

    Published 2006-01-01
    “…To obtain a trade-off between veracity and complexity when simulating TCP traffic of large-scale network,the TCP aggregated traffic of access network in the gateway was proposed as simulated object,instead of the traffic generated at the individual host or session level.Based on the self-similarity of application-level and network-level,the TCP aggregated traffic model was proposed due to the self-similarity of network traffic.The self-similar traffic at application level was generated by aggregating many ON/OFF sources following Pareto distribution.The aggregated transmission control was put on the traffic at network transmission level based on the mechanism of TCP protocol.Compared with the real data collected from a Network Exchange Center,the simulating result shows the validity of the model from the criteria of traffic load proportion,traffic self-similarity,and the packet loss ratio.…”
    Get full text
    Article
  20. 40

    Distance-Based Stable Routing Decision Scheme in Urban Vehicular Ad Hoc Networks by Sang-woo Chang, Sang-sun Lee

    Published 2015-08-01
    “…The performance is then evaluated under simulation which is implemented with the Manhattan urban traffic model. The results show the improved performance as compared with the previous researches.…”
    Get full text
    Article