Results for ' Network Traffic, '

986 found
Order:
  1.  33
    Unsupervised network traffic anomaly detection with deep autoencoders.Vibekananda Dutta, Marek Pawlicki, Rafał Kozik & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):912-925.
    Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in terms (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  19
    Time series forecasting with model selection applied to anomaly detection in network traffic.Łukasz Saganowski & Tomasz Andrysiak - 2020 - Logic Journal of the IGPL 28 (4):531-545.
    In herein article an attempt of problem solution connected with anomaly detection in network traffic with the use of statistic models with long or short memory dependence was presented. In order to select the proper type of a model, the parameter describing memory on the basis of the Geweke and Porter-Hudak test was estimated. Bearing in mind that the value of statistic model depends directly on quality of data used for its creation, at the initial stage of the suggested (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  37
    Heuristic Ant Algorithm for Road Network Traffic Coordination Control.Yanguang Cai, Jianmin Xu & Minjie Zhang - 2012 - Journal of Intelligent Systems 21 (4):331-347.
    . The defects in macro traffic model research are pointed out firstly. In order to remedy these defects, traffic movements at the grid intersection were analyzed, and with the basic framework of the traffic transmission model, the new macro traffic model used in the paper for control simulation and evaluation has been proposed. Secondly, the bi-level optimization control model is proposed, using minimal delay and maximal throughput as its upper objectives, and optimal traffic coordination on both sides as the lower (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  36
    A cellular automata model can quickly approximate UDP and TCP network traffic.Richard R. Brooks, Christopher Griffin & T. Alan Payne - 2004 - Complexity 9 (3):32-40.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  74
    Dynamic Traffic Congestion Simulation and Dissipation Control Based on Traffic Flow Theory Model and Neural Network Data Calibration Algorithm.Li Wang, Shimin Lin, Jingfeng Yang, Nanfeng Zhang, Ji Yang, Yong Li, Handong Zhou, Feng Yang & Zhifu Li - 2017 - Complexity:1-11.
    Traffic congestion is a common problem in many countries, especially in big cities. At present, China’s urban road traffic accidents occur frequently, the occurrence frequency is high, the accident causes traffic congestion, and accidents cause traffic congestion and vice versa. The occurrence of traffic accidents usually leads to the reduction of road traffic capacity and the formation of traffic bottlenecks, causing the traffic congestion. In this paper, the formation and propagation of traffic congestion are simulated by using the improved medium (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  29
    The Traffic Capacity Variation of Urban Road Network due to the Policy of Unblocking Community.Xin Feng, Yue Zhang, Shuo Qian & Liming Sun - 2021 - Complexity 2021:1-12.
    At present, urban traffic congestion is a common problem of urban development in China. Therefore, China’s government issued the policy of opening the gated communities in 2016, hoping to alleviate traffic pressure to some extent. But, at present, the quantitative empirical research on the effect of the policy implementation is less and more idealistic. In order to complete the leap from research on local isolated traffic capacity of static gated communities to research on global coupling traffic capacity of dynamic multilayer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  26
    Development of a Complex Network-Based Integrated Multilayer Urban Growth and Optimisation Model for an Efficient Urban Traffic Network.Rui Ding, Yilin Zhang, Ting Zhang & Can Ma - 2021 - Complexity 2021:1-16.
    Previous research studies of traffic networks are mainly based on planar networks and less considered the influence of multilayer networks, which illustrate and represent different appropriate urban traffic modes. Development of rail and road networks is inseparable from the development of a prosperous urban area; thus, research on multilayer networks has scientific potential and fulfils a real need. In this paper, a framework of complex network based integrated multilayer urban growth and optimisation model is proposed, to analyse the complex (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  29
    Learning Air Traffic as Images: A Deep Convolutional Neural Network for Airspace Operation Complexity Evaluation.Hua Xie, Minghua Zhang, Jiaming Ge, Xinfang Dong & Haiyan Chen - 2021 - Complexity 2021:1-16.
    A sector is a basic unit of airspace whose operation is managed by air traffic controllers. The operation complexity of a sector plays an important role in air traffic management system, such as airspace reconfiguration, air traffic flow management, and allocation of air traffic controller resources. Therefore, accurate evaluation of the sector operation complexity is crucial. Considering there are numerous factors that can influence SOC, researchers have proposed several machine learning methods recently to evaluate SOC by mining the relationship between (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  57
    Applying the Virtual Input-Output Method to the Identification of Key Nodes in Busy Traffic Network.Fan Yang, Fei Yan, Chikun Zhang, Xiaoying Tang, Jianchang Li, Xindan Zhang & Yingxin Gan - 2021 - Complexity 2021:1-7.
    How to identify the key nodes effectively in urban traffic networks to achieve the equitable resource allocation face to the complex traffic network? This issue needs to be solved in current traffic management. This study considered the urban traffic network topology and network traffic status, put forward an improved model based on the economics of the input-output method by introducing a virtual node to the selected network set up with the flow of urban traffic network, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  38
    Adaptive Traffic-Aware PSM Mechanism for IEEE 802.11 WLANs.Xijian Chen, Pengfei Yuan, Xilong Sun & Yi Xie - 2014 - Journal of Intelligent Systems 23 (4):437-450.
    Wireless devices consume large amounts of energy during wireless communication. As the energy storage of battery is limited, improving energy efficiency has become an important approach to prolong the lifetime of devices. The IEEE 802.11 protocol supports the power save mode in wireless local area networks. However, the standard PSM cannot adapt to the changes of traffic load or channel conditions. Therefore, this article proposes an adaptive traffic-aware PSM mechanism that improves energy efficiency of wireless devices in a WLAN with (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  4
    Urban Traffic Identification by Comparing Machine Learning Algorithms.Boris A. Medina Salgado, Jhon Jairo Feria Diaz & Sandra Rojas Sevilla - forthcoming - Evolutionary Studies in Imaginative Culture.
    The Internet of Things (IoT) applied to intelligent transport systems has become a key element for understanding the way traffic flow behaves in cities, which helps in decision-making to improve the management of the transport system by monitoring and analyzing network traffic in real time, all with the aim of daily benefiting users of the city’s road infrastructure. Traffic volume estimation in real time, with high effectiveness, may help mobility management and improve traffic flow. Moreover, machine-learning algorithms have shown (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our central (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  13.  28
    Resilience Analysis of Urban Road Networks Based on Adaptive Signal Controls: Day-to-Day Traffic Dynamics with Deep Reinforcement Learning.Wen-Long Shang, Yanyan Chen, Xingang Li & Washington Y. Ochieng - 2020 - Complexity 2020:1-19.
    Improving the resilience of urban road networks suffering from various disruptions has been a central focus for urban emergence management. However, to date the effective methods which may mitigate the negative impacts caused by the disruptions, such as road accidents and natural disasters, on urban road networks is highly insufficient. This study proposes a novel adaptive signal control strategy based on a doubly dynamic learning framework, which consists of deep reinforcement learning and day-to-day traffic dynamic learning, to improve the (...) performance by adjusting red/green time split. In this study, red time split is regarded as extra traffic flow to discourage drivers to use affected roads, so as to reduce congestion and improve the resilience when urban road networks are subject to different levels of disruptions. In addition, we utilize the convolution neural network as Q-network to approximate Q values, link flow distribution and link capacity are regarded as the state space, and actions are denoted as red/green time split. A small network is utilized as a numerical example, and a fixed time signal control and other two adaptive signal controls are employed for the comparisons with the proposed one. The results show that the proposed adaptive signal control based on deep reinforcement learning can achieve better resilience in most of the cases, particularly in the scenarios of moderate and severe disruptions. This study may shed light on the advantages of the proposed adaptive signal control dealing with major emergencies compared to others. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Session 2-Network Measurements and Monitoring-Novel Traffic Measurement Methodology for High Precision Applications Awareness in Multi-gigabit Networks.Taesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan Kim, Joonkyung Lee & Kyeongho Lee - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 63-72.
    No categories
     
    Export citation  
     
    Bookmark  
  15.  30
    The mathematics of traffic in networks.Frank Kelly - 2008 - In T. Gowers, Princeton Companion to Mathematics. Princeton University Press.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  21
    Genetic Optimization Methods for Traffic Engineering Problems in Multi-Service High Speed Optical Networks.V. Pasias, D. A. Karras, R. C. Papademetriou & B. Prasad - 2007 - Journal of Intelligent Systems 16 (4):339-358.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  14
    Anchoring and traffic effects in the virtual market platform of FIFA 20.Andrei Popescu & Klaus Fiedler - 2023 - Journal of Dynamic Decision Making 9.
    An Internet-based competitive marketing game, FIFA 20, served to investigate the effectiveness of two opposite strategies in soccer-player auctions under semi-naturalistic conditions. Granting the validity of both causal principles, the anchoring principle giving an advantage to starting with a high price (Ritov, 1996) and the traffic principle underlying the starting-low advantage (Ku, Galinsky, & Murnighan, 2006), we nevertheless expected starting low strategies to produce higher end-prices under FIFA 20 conditions. Two experiments, each using multiple copies of two players from the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  5
    Snarl: in defense of stalled traffic and faulty networks.Ruth Austin Miller - 2013 - Ann Arbor: University of Michigan Press.
    Ruth A. Miller excavates a centuries-old history of nonhuman and nonbiological constitutional engagement and outlines a robust mechanical democracy that challenges existing theories of liberal and human political participation. Drawing on an eclectic set of legal, political, and automotive texts from France, Turkey, and the United States, she proposes a radical mechanical re-articulation of three of the most basic principles of democracy: vitality, mobility, and liberty. Rather than defending a grand theory of materialist or posthumanist politics, or addressing abstract concepts (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  26
    Aiding Traffic Prediction Servers through Self-Localization to Increase Stability in Complex Vehicular Clustering.Iftikhar Ahmad, Rafidah Md Noor, Roobaea Alroobaea, Muhammad Talha, Zaheed Ahmed, Umm-E.- Habiba & Ihsan Ali - 2021 - Complexity 2021:1-11.
    The integration of cellular networks and vehicular networks is complex and heterogeneous. Synchronization among vehicles in heterogeneous vehicular clusters plays an important role in effective data sharing and the stability of the cluster. This synchronization depends on the smooth exchange of information between vehicles and remote servers over the Internet. The remote servers predict road traffic patterns by adopting deep learning methods to help drivers on the roads. At the same time, local data processing at the vehicular cluster level may (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  19
    How to Identify Patterns of Citywide Dynamic Traffic at a Low Cost? An In-Depth Neural Network Approach with Digital Maps.Li Zhang, Ke Gong, Maozeng Xu, Aixing Li, Yuanxiang Dong & Yong Wang - 2021 - Complexity 2021:1-15.
    The identification and analysis of the spatiotemporal dynamic traffic patterns in citywide road networks constitute a crucial process for complex traffic management and control. However, city-scale and synchronal traffic data pose challenges for such kind of quantification, especially during peak hours. Traditional studies rely on data from road-based detectors or multiple communication systems, which are limited in not only access but also coverage. To avoid these limitations, we introduce real-time, traffic condition digital maps as our input. The digital maps keep (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  36
    Evacuation Traffic Management under Diffusion of Toxic Gas Based on an Improved Road Risk Level Assessment Method.Zheng Liu, Xingang Li & Xiaojing Chen - 2019 - Complexity 2019:1-11.
    Toxic gas leakage has diffusion characteristics and thus dynamically affects surrounding zones. Most of current evacuation traffic management models set the road risk level as a static value, which is related to the distance to the hazard source, or a dynamic value, which is determined by the toxic gas concentration. However, the toxic gas propagation direction is not considered, and this may lead some evacuees driving from less dangerous regions to higher dangerous regions. To address the shortcomings of traditional evacuation (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  30
    Short-Term Traffic Flow Prediction with Weather Conditions: Based on Deep Learning Algorithms and Data Fusion.Yue Hou, Zhiyuan Deng & Hanke Cui - 2021 - Complexity 2021:1-14.
    Short-term traffic flow prediction is an effective means for intelligent transportation system to mitigate traffic congestion. However, traffic flow data with temporal features and periodic characteristics are vulnerable to weather effects, making short-term traffic flow prediction a challenging issue. However, the existing models do not consider the influence of weather changes on traffic flow, leading to poor performance under some extreme conditions. In view of the rich features of traffic data and the characteristic of being vulnerable to external weather conditions, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  19
    Turning a Traffic Light into an Epistemological Device: An ANT Proposal to Disassemble and Stabilize Urban Life into Regions of Usefulness.Santiago Orrego - 2022 - Social Epistemology 36 (6):748-758.
    Mixing Actor-Network Theory, empirical philosophy, and Heidegger’s notion of usability, this paper discusses a methodological strategy for approaching and temporarily stabilizing urban life based on an experimental epistemological exercise of decomposing a traffic light in Times Square, New York City, into its practices and relations. This strategy conceives of urban elements and formations as multiplicities of multiple and simultaneous practices and materials (useful things) and pays particular attention to the effervescences and heterogeneous associations they embody and enact. As a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  12
    The “Traffic” in Graduate Students: Graduate Students as Tokens of Exchange between Academe and Industry.Edward Morgan, Margaret Holleman, Teresa Campbell & Sheila Slaughter - 2002 - Science, Technology, and Human Values 27 (2):282-312.
    This study analyzes interview data from 37 science and engineering faculty involved in university-industry relations. Faculty are particularly concerned about how these relations affect their work with graduate students. Our analysis is guided by ritual exchange theory and network theory. First, we explore the ways faculty define and redefine what makes industrial or corporate research appropriate or inappropriate for training graduates. Second, we examine difficulties and tensions faculty face when they work with students on industrial or corporate projects. These (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  29
    Regulation of protein traffic in polarized epithelial cells.Keith E. Mostov & Michael H. Cardone - 1995 - Bioessays 17 (2):129-138.
    The plasma membrane of polarized epithelial cells is divided into apical and basolateral surfaces, with different compositions. Proteins can be sent directly from the trans‐Golgi network (TGN) to either surface, or can be sent first to one surface and then transcytosed to the other. The glycosyl phosphatidylinositol anchor is a signal for apical targeting. Signals in the cytoplasmic domain containing a β‐turn determine basolateral targeting and retrieval, and are related to other sorting signals. Transcytosed proteins, such as the polymeric (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Natural Computation Techniques Applications-Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.Ming Li & Huamin Feng - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 4222--448.
    No categories
     
    Export citation  
     
    Bookmark  
  27.  18
    Data that warms: Waste heat, infrastructural convergence and the computation traffic commodity.Julia Velkova - 2016 - Big Data and Society 3 (2).
    This article explores the ways in which data centre operators are currently reconfiguring the systems of energy and heat supply in European capitals, replacing conventional forms of heating with data-driven heat production, and becoming important energy suppliers. Taking as an empirical object the heat generated from server halls, the article traces the expanding phenomenon of ‘waste heat recycling’ and charts the ways in which data centre operators in Stockholm and Paris direct waste heat through metropolitan district heating systems and urban (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  20
    International Crossways: Traffic in Sexual Harassment Policy.Abigail C. Saguy - 2002 - European Journal of Women's Studies 9 (3):249-267.
    This article examines how sexual harassment has been conceptualized by French feminists in an increasingly global political environment, demonstrating how feminist ideas, politics and legal initiatives are transformed as they travel across space and time. I argue that feminist networks have been a central determinant of the ways in which ideas about sexual harassment have spread across the globe in the past 20 years. However, I further contend that there were basic national differences in political, legal and cultural traditions that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  27
    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy.Bo Zhang & Rongji Liao - 2021 - Complexity 2021:1-10.
    The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. Therefore, the use of these elements in building (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  28
    On the application of compression-based metrics to identifying anomalous behaviour in web traffic.Gonzalo de la Torre-Abaitua, Luis F. Lago-Fernández & David Arroyo - 2020 - Logic Journal of the IGPL 28 (4):546-557.
    In cybersecurity, there is a call for adaptive, accurate and efficient procedures to identifying performance shortcomings and security breaches. The increasing complexity of both Internet services and traffic determines a scenario that in many cases impedes the proper deployment of intrusion detection and prevention systems. Although it is a common practice to monitor network and applications activity, there is not a general methodology to codify and interpret the recorded events. Moreover, this lack of methodology somehow erodes the possibility of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  46
    Multiconstrained Network Intensive Vehicle Routing Adaptive Ant Colony Algorithm in the Context of Neural Network Analysis.Shaopei Chen, Ji Yang, Yong Li & Jingfeng Yang - 2017 - Complexity:1-9.
    Neural network models have recently made significant achievements in solving vehicle scheduling problems. Adaptive ant colony algorithm provides a new idea for neural networks to solve complex system problems of multiconstrained network intensive vehicle routing models. The pheromone in the path is changed by adjusting the volatile factors in the operation process adaptively. It effectively overcomes the tendency of the traditional ant colony algorithm to fall easily into the local optimal solution and slow convergence speed to search for (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  5
    The Importance of the Role of Emergency Paramedics in Quickly Transporting Traffic Accident Cases to Health Facilities.Husam A. Althagafi, Abdullah Ali Alsalem, Wesam A. Alwadani, Naeem W. Alahmadi, Abdulaziz I. Almarwan, Mohammed A. Alshehri & Abdulaziz H. Althaqafi - forthcoming - Evolutionary Studies in Imaginative Culture:1360-1364.
    This study aims to know the effect of ambulance transportation in reducing the rate of injuries for people injured in traffic accidents, the importance of the role of emergency paramedics in reducing the rate of injury for people transported to health facilities, a questionnaire was prepared via Google Drive and distributed to the population between the ages of 25-55 years from Men and women in the holy city of Mecca. The questionnaire was distributed via the social networking program (WhatsApp) for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  14
    Feature Extraction of Broken Glass Cracks in Road Traffic Accident Site Based on Deep Learning.Shuai Liang - 2021 - Complexity 2021:1-12.
    This paper studies the feature extraction and middle-level expression of Convolutional Neural Network convolutional layer glass broken and cracked at the scene of road traffic accident. The image pyramid is constructed and used as the input of the CNN model, and the convolutional layer road traffic accident scene glass breakage and crack characteristics at each scale in the pyramid are extracted separately, and then the depth descriptors at different image scales are extracted. In order to improve the discriminative power (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  92
    Degrading network capacity may improve performance: private versus public monitoring in the Braess Paradox.Eyran J. Gisches & Amnon Rapoport - 2012 - Theory and Decision 73 (2):267-293.
    The Braess Paradox (BP) is a counterintuitive finding that degrading a network that is susceptible to congestion may decrease the equilibrium travel cost for each of its users. We illustrate this paradox with two networks: a basic network with four alternative routes from a single origin to a single destination, and an augmented network with six alternative routes. We construct the equilibrium solutions to these two networks, which jointly give rise to the paradox, and subject them to (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  27
    Smart Congestion Control in 5G/6G Networks Using Hybrid Deep Learning Techniques.Saif E. A. Alnawayseh, Waleed T. Al-Sit & Taher M. Ghazal - 2022 - Complexity 2022:1-10.
    With the mobility and ease of connection, wireless sensor networks have played a significant role in communication over the last few years, making them a significant data carrier across networks. Additional security, lower latency, and dependable standards and communication capability are required for future-generation systems such as millimeter-wave LANs, broadband wireless access schemes, and 5G/6G networks, among other things. Effectual congestion control is regarded as of the essential aspects of 5G/6G technology. It permits operators to run many network illustrations (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  25
    efficient IoT forensic approach for the evidence acquisition and analysis based on network link.Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo & Nhien-An Le-Khac - 2022 - Logic Journal of the IGPL 30 (6):1041-1055.
    In an Internet of Things (IoT) environment, IoT devices are typically connected through different network media types such as mobile, wireless and wired networks. Due to the pervasive nature of such devices, they are a potential evidence source in both civil litigation and criminal investigations. It is, however, challenging to identify and acquire forensic artefacts from a broad range of devices, which have varying storage and communication capabilities. Hence, in this paper, we first propose an IoT network architecture (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  25
    An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection.C. Manzano, C. Meneses, P. Leger & H. Fukuda - 2022 - Complexity 2022:1-18.
    Malware is a sophisticated, malicious, and sometimes unidentifiable application on the network. The classifying network traffic method using machine learning shows to perform well in detecting malware. In the literature, it is reported that this good performance can depend on a reduced set of network features. This study presents an empirical evaluation of two statistical methods of reduction and selection of features in an Android network traffic dataset using six supervised algorithms: Naïve Bayes, support vector machine, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  54
    Instance Based Classification for Decision Making in Network Data.Amarjit Singh, Parag Kulkarni & Shankar Lal - 2012 - Journal of Intelligent Systems 21 (2):167-193.
    . Network data analysis helps in capturing node usage behavior. Existing algorithms use reduced feature set to manage high runtime complexity. Ignoring features may increase classification errors. This paper presents a model, allowing classification of network traffic, while considering all the relevant features. Learning phase partitions training sample on values of the respective features. This creates equivalence classes related to m features. During classification, each feature value of the test instance results in picking one set from equivalence class (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  24
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  12
    Application Research of Key Frames Extraction Technology Combined with Optimized Faster R-CNN Algorithm in Traffic Video Analysis.Zhi-Guang Jiang & Xiao-Tian Shi - 2021 - Complexity 2021:1-11.
    The intelligent transportation system under the big data environment is the development direction of the future transportation system. It effectively integrates advanced information technology, data communication transmission technology, electronic sensing technology, control technology, and computer technology and applies them to the entire ground transportation management system to establish a real-time, accurate, and efficient comprehensive transportation management system that works on a large scale and in all directions. Intelligent video analysis is an important part of smart transportation. In order to improve (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  42
    Multidirection Object Detection in Aerial View of Traffic Target under Complex Scenes.Zeqing Zhang, Weiwei Lin & Yuqiang Zheng - 2021 - Complexity 2021:1-9.
    Focusing on DOTA, the multidirectional object dataset in aerial view of vehicles, CMDTD has been proposed. The reason why it is difficult for applying the general object detection algorithm in multidirectional object detection has been analyzed in this paper. Based on this, the detection principle of CMDTD including its backbone network and multidirectional multi-information detection end module has been studied. In addition, in view of the complexity of the scene faced by aerial view of vehicles, a unique data expansion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  33
    Self-Managed 5G Networks 1.Jorge Martín-Pérez, Lina Magoula, Kiril Antevski, Carlos Guimarães, Jorge Baranda, Carla Fabiana Chiasserini, Andrea Sgambelluri, Chrysa Papagianni, Andrés García-Saavedra, Ricardo Martínez, Francesco Paolucci, Sokratis Barmpounakis, Luca Valcarenghi, Claudio EttoreCasetti, Xi Li, Carlos J. Bernardos, Danny De Vleeschauwer, Koen De Schepper, Panagiotis Kontopoulos, Nikolaos Koursioumpas, Corrado Puligheddu, Josep Mangues-Bafalluy & Engin Zeydan - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 69-100.
    Meeting 5G high bandwidth rates, ultra-low latencies, and high reliabilities requires of network infrastructures that automatically increase/decrease the resources based on their customers’ demand. An autonomous and dynamic management of a 5G network infrastructure represents a challenge, as any solution must account for the radio access network, data plane traffic, wavelength allocation, network slicing, and network functions’ orchestration. Furthermore, federation among administrative domains (ADs) must be considered in the network management. Given the increased dynamicity (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  16
    Convolutional Neural Network Based Vehicle Classification in Adverse Illuminous Conditions for Intelligent Transportation Systems.Muhammad Atif Butt, Asad Masood Khattak, Sarmad Shafique, Bashir Hayat, Saima Abid, Ki-Il Kim, Muhammad Waqas Ayub, Ahthasham Sajid & Awais Adnan - 2021 - Complexity 2021:1-11.
    In step with rapid advancements in computer vision, vehicle classification demonstrates a considerable potential to reshape intelligent transportation systems. In the last couple of decades, image processing and pattern recognition-based vehicle classification systems have been used to improve the effectiveness of automated highway toll collection and traffic monitoring systems. However, these methods are trained on limited handcrafted features extracted from small datasets, which do not cater the real-time road traffic conditions. Deep learning-based classification systems have been proposed to incorporate the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  16
    Optimization of Backpropagation Neural Network under the Adaptive Genetic Algorithm.Junxi Zhang & Shiru Qu - 2021 - Complexity 2021:1-9.
    This study is to explore the optimization of the adaptive genetic algorithm in the backpropagation neural network, so as to expand the application of the BPNN model in nonlinear issues. Traffic flow prediction is undertaken as a research case to analyse the performance of the optimized BPNN. Firstly, the advantages and disadvantages of the BPNN and genetic algorithm are analyzed based on their working principles, and the AGA is improved and optimized. Secondly, the optimized AGA is applied to optimize (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and (...)
     
    Export citation  
     
    Bookmark  
  46.  31
    Application and Analysis of Multicast Blocking Modelling in Fat-Tree Data Center Networks.Guozhi Li, Songtao Guo, Guiyan Liu & Yuanyuan Yang - 2018 - Complexity 2018:1-12.
    Multicast can improve network performance by eliminating unnecessary duplicated flows in the data center networks. Thus it can significantly save network bandwidth. However, the network multicast blocking may cause the retransmission of a large number of data packets and seriously influence the traffic efficiency in data center networks, especially in the fat-tree DCNs with multirooted tree structure. In this paper, we build a multicast blocking model and apply it to solve the problem of network blocking in (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47.  43
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  28
    Performance Assessment of a Freight Network with Stochastic Capacities.Xiu-Zhen Xu, Yi-Feng Niu & Qing Li - 2018 - Complexity 2018:1-9.
    This paper focuses on performance assessment of a freight network with stochastic capacities by using reliability analysis, in which a node denotes a supplier, a transfer center, a distribution center, or a market, while an arc denotes a logistics service provider offering the freight traffic service for a pair of nodes. Due to some uncertainties in real environment, the available capacity of the provider along each arc is stochastic. Thus, network reliability that at least d units of commodity (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  58
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  72
    Invulnerability Analysis and Optimization Strategy of Sector Network Using Cascading Failure Model.Haijun Liang, Jingyu Lu & Nan Chen - 2022 - Complexity 2022:1-12.
    Resolving the challenge of flight delays caused by air traffic congestion renders it necessary to explore the mode of congestion propagation. By applying complex network theory, this article establishes a complex network structure where airspace sectors act as nodes, and the edges represent traffic flow relationships between sectors. In addition, a cascading failure model is proposed to analyze the airspace sector network’s invulnerability. The critical threshold and the sector abnormality rate are determined according to the cascading failure (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 986