WorldWideScience

Sample records for network traffic generators

  1. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    their network capacities. However, in order to provide more advanced video services than simply porting the traditional television services to the network, the service provider needs to do more than just augment the network capacity. Advanced traffic management capability is one of the relevant abilities...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  2. A Deep Generative Adversarial Architecture for Network-Wide Spatial-Temporal Traffic State Estimation

    OpenAIRE

    Liang, Yunyi; Cui, Zhiyong; Tian, Yu; Chen, Huimiao; Wang, Yinhai

    2018-01-01

    This study proposes a deep generative adversarial architecture (GAA) for network-wide spatial-temporal traffic state estimation. The GAA is able to combine traffic flow theory with neural networks and thus improve the accuracy of traffic state estimation. It consists of two Long Short-Term Memory Neural Networks (LSTM NNs) which capture correlation in time and space among traffic flow and traffic density. One of the LSTM NNs, called a discriminative network, aims to maximize the probability o...

  3. Effects of traffic generation patterns on the robustness of complex networks

    Science.gov (United States)

    Wu, Jiajing; Zeng, Junwen; Chen, Zhenhao; Tse, Chi K.; Chen, Bokui

    2018-02-01

    Cascading failures in communication networks with heterogeneous node functions are studied in this paper. In such networks, the traffic dynamics are highly dependent on the traffic generation patterns which are in turn determined by the locations of the hosts. The data-packet traffic model is applied to Barabási-Albert scale-free networks to study the cascading failures in such networks and to explore the effects of traffic generation patterns on network robustness. It is found that placing the hosts at high-degree nodes in a network can make the network more robust against both intentional attacks and random failures. It is also shown that the traffic generation pattern plays an important role in network design.

  4. Next generation network based carrier ethernet test bed for IPTV traffic

    DEFF Research Database (Denmark)

    Fu, Rong; Berger, Michael Stübert; Zheng, Yu

    2009-01-01

    This paper presents a Carrier Ethernet (CE) test bed based on the Next Generation Network (NGN) framework. After the concept of CE carried out by Metro Ethernet Forum (MEF), the carrier-grade Ethernet are obtaining more and more interests and being investigated as the low cost and high performance...... services of transport network to carry the IPTV traffic. This test bed is approaching to support the research on providing a high performance carrier-grade Ethernet transport network for IPTV traffic....

  5. A Network Traffic Generator Model for Fast Network-on-Chip Simulation

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Angiolini, Frederico; Storgaard, Michael

    2005-01-01

    and effective Network-on-Chip (NoC) development and debugging environment. By capturing the type and the timestamp of communication events at the boundary of an IP core in a reference environment, the TG can subsequently emulate the core's communication behavior in different environments. Access patterns......For Systems-on-Chip (SoCs) development, a predominant part of the design time is the simulation time. Performance evaluation and design space exploration of such systems in bit- and cycle-true fashion is becoming prohibitive. We propose a traffic generation (TG) model that provides a fast...

  6. Network Traffic Generator Model for Fast Network-on-Chip Simulation

    DEFF Research Database (Denmark)

    Mahadevan, Shankar; Ang, Frederico; Olsen, Rasmus G.

    2008-01-01

    and effective Network-on-Chip (NoC) development and debugging environment. By capturing the type and the timestamp of communication events at the boundary of an IP core in a reference environment, the TG can subsequently emulate the core's communication behavior in different environments. Access patterns......For Systems-on-Chip (SoCs) development, a predominant part of the design time is the simulation time. Performance evaluation and design space exploration of such systems in bit- and cycle-true fashion is becoming prohibitive. We propose a traffic generation (TG) model that provides a fast...

  7. A Mobility and Traffic Generation Framework for Modeling and Simulating Ad Hoc Communication Networks

    Directory of Open Access Journals (Sweden)

    Chris Barrett

    2004-01-01

    Full Text Available We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad~hoc networks. Three components of this framework, namely a mobility data generator (MDG, a graph structure generator (GSG and an occlusion modification tool (OMT allow a variety of mobility models to be incorporated into the tool. The MDG module generates positions of transceivers at specified time instants. The GSG module constructs the graph corresponding to the ad hoc network from the mobility data provided by MDG. The OMT module modifies the connectivity of the graph produced by GSG to allow for occlusion effects. With two other modules, namely an activity data generator (ADG which generates packet transmission activities for transceivers and a packet activity simulator (PAS which simulates the movement and interaction of packets among the transceivers, the framework allows the modeling and simulation of ad hoc communication networks. The design of the framework allows a user to incorporate various realistic parameters crucial in the simulation. We illustrate the utility of our framework through a comparative study of three mobility models. Two of these are synthetic models (random waypoint and exponentially correlated mobility proposed in the literature. The third model is based on an urban population mobility modeling tool (TRANSIMS developed at the Los Alamos National Laboratory. This tool is capable of providing comprehensive information about the demographics, mobility and interactions of members of a large urban population. A comparison of these models is carried out by computing a variety of parameters associated with the graph structures generated by the models. There has recently been interest in the structural properties of graphs that arise in real world systems. We examine two aspects of this for the graphs created by the mobility models: change associated with power control (range of

  8. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  9. Characterization and Modeling of Network Traffic

    DEFF Research Database (Denmark)

    Shawky, Ahmed; Bergheim, Hans; Ragnarsson, Olafur

    2011-01-01

    This paper attempts to characterize and model backbone network traffic, using a small number of statistics. In order to reduce cost and processing power associated with traffic analysis. The parameters affecting the behaviour of network traffic are investigated and the choice is that inter......-arrival time, IP addresses, port numbers and transport protocol are the only necessary parameters to model network traffic behaviour. In order to recreate this behaviour, a complex model is needed which is able to recreate traffic behaviour based on a set of statistics calculated from the parameters values....... The model investigates the traffic generation mechanisms, and grouping traffic into flows and applications....

  10. Modeling Network Traffic in Wavelet Domain

    Directory of Open Access Journals (Sweden)

    Sheng Ma

    2004-12-01

    Full Text Available This work discovers that although network traffic has the complicated short- and long-range temporal dependence, the corresponding wavelet coefficients are no longer long-range dependent. Therefore, a "short-range" dependent process can be used to model network traffic in the wavelet domain. Both independent and Markov models are investigated. Theoretical analysis shows that the independent wavelet model is sufficiently accurate in terms of the buffer overflow probability for Fractional Gaussian Noise traffic. Any model, which captures additional correlations in the wavelet domain, only improves the performance marginally. The independent wavelet model is then used as a unified approach to model network traffic including VBR MPEG video and Ethernet data. The computational complexity is O(N for developing such wavelet models and generating synthesized traffic of length N, which is among the lowest attained.

  11. Fluctuations in Urban Traffic Networks

    Science.gov (United States)

    Chen, Yu-Dong; Li, Li; Zhang, Yi; Hu, Jian-Ming; Jin, Xue-Xiang

    Urban traffic network is a typical complex system, in which movements of tremendous microscopic traffic participants (pedestrians, bicyclists and vehicles) form complicated spatial and temporal dynamics. We collected flow volumes data on the time-dependent activity of a typical urban traffic network, finding that the coupling between the average flux and the fluctuation on individual links obeys a certain scaling law, with a wide variety of scaling exponents between 1/2 and 1. These scaling phenomena can explain the interaction between the nodes' internal dynamics (i.e. queuing at intersections, car-following in driving) and changes in the external (network-wide) traffic demand (i.e. the every day increase of traffic amount during peak hours and shocking caused by traffic accidents), allowing us to further understand the mechanisms governing the transportation system's collective behavior. Multiscaling and hotspot features are observed in the traffic flow data as well. But the reason why the separated internal dynamics are comparable to the external dynamics in magnitude is still unclear and needs further investigations.

  12. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  13. Modelling traffic congestion using queuing networks

    Indian Academy of Sciences (India)

    Traffic Flow-Density diagrams are obtained using simple Jackson queuing network analysis. Such simple analytical models can be used to capture the effect of non- homogenous traffic. Keywords. Flow-density curves; uninterrupted traffic; Jackson networks. 1. Introduction. Traffic management has become very essential in ...

  14. Broadband Traffic Forecasting in the Transport Network

    Directory of Open Access Journals (Sweden)

    Valentina Radojičić

    2012-07-01

    Full Text Available This paper proposes a modification of traffic forecast model generated by residential and small business (SOHO, Small Office Home Office users. The model includes forecasted values of different relevant factors and competition on broadband market. It allows forecasting the number of users for various broadband technologies and interaction impact of long-standing technologies as well as the impact of the new technology entrant on the market. All the necessary parameters are evaluated for the Serbian broadband market. The long-term forecasted results of broadband traffic are given. The analyses and evaluations performed are important inputs for the transport network resources planning.

  15. Routing strategies in traffic network and phase transition in network ...

    Indian Academy of Sciences (India)

    Routing strategy; network traffic flow; hysteretic loop; phase transition from free flow state to congestion state; scale-free network; bi-stable state; traffic dynamics. PACS Nos 89.75.Hc; 89.20.Hh; 05.10.-a; 89.75.Fb. 1. Traffic dynamics based on local routing strategy on scale-free networks. Communication networks such as ...

  16. Wireless traffic steering for green cellular networks

    CERN Document Server

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  17. Consensus-Based Cooperative Control Based on Pollution Sensing and Traffic Information for Urban Traffic Networks

    National Research Council Canada - National Science Library

    Antonio Artuñedo; Raúl M del Toro; Rodolfo E Haber

    2017-01-01

    .... The interconnected traffic lights controller (TLC) network adapts traffic lights cycles, based on traffic and air pollution sensory information, in order to improve the performance of urban traffic networks...

  18. Traffic Management for Satellite-ATM Networks

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Fahmy, Sonia; Vandalore, Bobby; Goyal, Mukul

    1998-01-01

    Various issues associated with "Traffic Management for Satellite-ATM Networks" are presented in viewgraph form. Specific topics include: 1) Traffic management issues for TCP/IP based data services over satellite-ATM networks; 2) Design issues for TCP/IP over ATM; 3) Optimization of the performance of TCP/IP over ATM for long delay networks; and 4) Evaluation of ATM service categories for TCP/IP traffic.

  19. Classification and Analysis of Computer Network Traffic

    DEFF Research Database (Denmark)

    Bujlow, Tomasz

    2014-01-01

    for traffic classification, which can be used for nearly real-time processing of big amounts of data using affordable CPU and memory resources. Other questions are related to methods for real-time estimation of the application Quality of Service (QoS) level based on the results obtained by the traffic......Traffic monitoring and analysis can be done for multiple different reasons: to investigate the usage of network resources, assess the performance of network applications, adjust Quality of Service (QoS) policies in the network, log the traffic to comply with the law, or create realistic models...... classifier. This thesis is focused on topics connected with traffic classification and analysis, while the work on methods for QoS assessment is limited to defining the connections with the traffic classification and proposing a general algorithm. We introduced the already known methods for traffic...

  20. Traffic incidents analysis on Slovenian motorway network

    OpenAIRE

    Jakše, Bojan

    2013-01-01

    In my bachelor thesis we were analysing traffic incidents (such as accidents, congestions, heavy snow, etc.) on Slovenian road network, specifically we focused on incidents on motorways. We were starting from database of incidents provided by Prometno-informacijski center (Traffic information center) and added information about hourly traffic at the moment of incident. We were also researching possible correlations between weather and traffic congestions and accidents as well as behaviour of ...

  1. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  2. On traffic modelling in GPRS networks

    DEFF Research Database (Denmark)

    Madsen, Tatiana Kozlova; Schwefel, Hans-Peter; Prasad, Ramjee

    2005-01-01

    Optimal design and dimensioning of wireless data networks, such as GPRS, requires the knowledge of traffic characteristics of different data services. This paper presents an in-detail analysis of an IP-level traffic measurements taken in an operational GPRS network. The data measurements reported...... here are done at the Gi interface. The aim of this paper is to reveal some key statistics of GPRS data applications and to validate if the existing traffic models can adequately describe traffic volume and inter-arrival time distribution for different services. Additionally, we present a method of user...

  3. Next generation traffic management centers.

    Science.gov (United States)

    2013-05-01

    Traffic management centers (TMCs) are critical to providing mobility to millions of people travelling on high-volume roadways. In Virginia, as with most regions of the United States, TMCs were aggressively deployed in the late 1990s and early 2000s. ...

  4. GSM Network Traffic Analysis | Ani | Nigerian Journal of Technology

    African Journals Online (AJOL)

    GSM networks are traffic intensive specifically the signaling traffic. Evolvement of effective and efficient performance management strategy requires accurate quantification of network signaling traffic volume along side with the user traffic volume. Inaccurate quantification may lead to serious network traffic congestion and ...

  5. Evaluation of traffic pollution on Moscow network

    Energy Technology Data Exchange (ETDEWEB)

    Lukanin, V.N.; Buslaev, A.P.; Yashina, M. [Moscow State Automobile and Road Technical University, MADI-TU, Mscow (Russian Federation)

    2000-07-01

    The Moscow vehicle fleet grows each year and traffic is a major source of air pollutants in Moscow. We have developed a model for air quality evaluation and management in a megalopolis in order to improve ecological parameters of vehicles. We have received estimations of traffic influence on human health. These analytical methods allow to regulate traffic flows on road network and structure of car fleet in order to minimise damage to the environment in large cities. Simulation methods are tested on traffic data of Moscow City. The purpose of the research is development of principles, modelling and experimental methods of air quality management in a large city in order to improve ecological parameters of vehicles, to regulate traffic flows on road network and structure of car fleet. (authors)

  6. A Traffic Prediction Model for Self-Adapting Routing Overlay Network in Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2017-01-01

    Full Text Available In large-scale location-based service, an ideal situation is that self-adapting routing strategies use future traffic data as input to generate a topology which could adapt to the changing traffic well. In the paper, we propose a traffic prediction model for the broker in publish/subscribe system, which can predict the traffic of the link in future by neural network. We first introduced our traffic prediction model and then described the model integration. Finally, the experimental results show that our traffic prediction model could predict the traffic of link well.

  7. Detecting Target Data in Network Traffic

    Science.gov (United States)

    2017-03-01

    packets, such as unauthorized connections to services like FTP and SSH connections, as well as RDP and MSSQL. Stateful firewalls are designed to...Hashdb can also be used to analyze network traffic and embedded content in other documents. There are hashdb libraries for the Python and C...amount of data that it logs. Bro will look at to DNS traffic, HTTP requests, and if any other connections attempted to be made over FTP, SSH and other

  8. Neural network system for traffic flow management

    Science.gov (United States)

    Gilmore, John F.; Elibiary, Khalid J.; Petersson, L. E. Rickard

    1992-09-01

    Atlanta will be the home of several special events during the next five years ranging from the 1996 Olympics to the 1994 Super Bowl. When combined with the existing special events (Braves, Falcons, and Hawks games, concerts, festivals, etc.), the need to effectively manage traffic flow from surface streets to interstate highways is apparent. This paper describes a system for traffic event response and management for intelligent navigation utilizing signals (TERMINUS) developed at Georgia Tech for adaptively managing special event traffic flows in the Atlanta, Georgia area. TERMINUS (the original name given Atlanta, Georgia based upon its role as a rail line terminating center) is an intelligent surface street signal control system designed to manage traffic flow in Metro Atlanta. The system consists of three components. The first is a traffic simulation of the downtown Atlanta area around Fulton County Stadium that models the flow of traffic when a stadium event lets out. Parameters for the surrounding area include modeling for events during various times of day (such as rush hour). The second component is a computer graphics interface with the simulation that shows the traffic flows achieved based upon intelligent control system execution. The final component is the intelligent control system that manages surface street light signals based upon feedback from control sensors that dynamically adapt the intelligent controller's decision making process. The intelligent controller is a neural network model that allows TERMINUS to control the configuration of surface street signals to optimize the flow of traffic away from special events.

  9. Competitive Traffic Assignment in Road Networks

    Directory of Open Access Journals (Sweden)

    Krylatov Alexander Y.

    2016-09-01

    Full Text Available Recently in-vehicle route guidance and information systems are rapidly developing. Such systems are expected to reduce congestion in an urban traffic area. This social benefit is believed to be reached by imposing the route choices on the network users that lead to the system optimum traffic assignment. However, guidance service could be offered by different competitive business companies. Then route choices of different mutually independent groups of users may reject traffic assignment from the system optimum state. In this paper, a game theoretic approach is shown to be very efficient to formalize competitive traffic assignment problem with various groups of users in the form of non-cooperative network game with the Nash equilibrium search. The relationships between the Wardrop’s system optimum associated with the traffic assignment problem and the Nash equilibrium associated with the competitive traffic assignment problem are investigated. Moreover, some related aspects of the Nash equilibrium and the Wardrop’s user equilibrium assignments are also discussed.

  10. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks

    Directory of Open Access Journals (Sweden)

    Haiyang Yu

    2017-06-01

    Full Text Available Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs, for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs and long short-term memory (LSTM neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction.

  11. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks

    Science.gov (United States)

    Yu, Haiyang; Wu, Zhihai; Wang, Shuqin; Wang, Yunpeng; Ma, Xiaolei

    2017-01-01

    Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs), for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs) and long short-term memory (LSTM) neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction. PMID:28672867

  12. Scaling in Computer Network Traffic

    Science.gov (United States)

    2005-01-07

    behaviour, measurement .... 29 The Self-Similar Traffic Model Fractional Gaussian Noise (fGn) and Fractional Brownian Motion (fBm) The unique...AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES See also ADM001750, Wavelets and Multifractal Analysis... Multifractality Wavelet qth order moments: IE|dX(j, k)|q ∼ C 2αqj, j → 0. Estimating the LHS from data using Sq(j) = 1 nj ∑ k |dX(j, k)|q, and measure the slopes

  13. Analyzing Worms and Network Traffic using Compression

    OpenAIRE

    Wehner, Stephanie

    2005-01-01

    Internet worms have become a widespread threat to system and network operations. In order to fight them more efficiently, it is necessary to analyze newly discovered worms and attack patterns. This paper shows how techniques based on Kolmogorov Complexity can help in the analysis of internet worms and network traffic. Using compression, different species of worms can be clustered by type. This allows us to determine whether an unknown worm binary could in fact be a later version of an existin...

  14. Multimodale trafiknet i GIS (Multimodal Traffic Network in GIS)

    DEFF Research Database (Denmark)

    Kronbak, Jacob; Brems, Camilla Riff

    1996-01-01

    The report introduces the use of multi-modal traffic networks within a geographical Information System (GIS). The necessary theory of modelling multi-modal traffic network is reviewed and applied to the ARC/INFO GIS by an explorative example.......The report introduces the use of multi-modal traffic networks within a geographical Information System (GIS). The necessary theory of modelling multi-modal traffic network is reviewed and applied to the ARC/INFO GIS by an explorative example....

  15. Network traffic anomaly prediction using Artificial Neural Network

    Science.gov (United States)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  16. Dynamic traffic grooming with multigranularity traffic in WDM optical mesh networks

    Science.gov (United States)

    Huang, Jun; Zeng, Qingji; Liu, Jimin; Xiao, Pengcheng; Liu, Hua; Xiao, Shilin

    2004-04-01

    In this paper, a traffic-grooming problem for multi-granularity traffic of SDH/SONET in WDM grooming mesh networks is investigated. We propose a path select routing algorithm to solve this problem. The performances of this traffic grooming path select routing algorithm are evaluated in WDM grooming networks. Finally, we presented and compared the simulation results of this algorithm in dynamic traffic grooming WDM mesh networks with that of other algorithms.

  17. Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Ladislav Schwartz

    2006-01-01

    Full Text Available Two network types had been existing in Slovakia by the end of the year 2004 – public switched telephone network – PSTN and packet switched data network – DCN. The other network, known as the next generation network – NGN, has been put into operation since the beginning of the year 2005. The role of the next generation network is to merge the both previous network types into one unified complex network with the full centralised control, based on routing and packet switching. The T-Com company (previous Slovak Telecom was the first who did it.

  18. Networks and their traffic in multiplayer games

    Directory of Open Access Journals (Sweden)

    Cristian Andrés Melo López

    2016-06-01

    Full Text Available Computer games called multiplayer real-time, or (MCG are at the forefront of the use of the possibilities of the network. Research on this subject have been made for military simulations, virtual reality systems, computer support teamwork, the solutions diverge on the problems posed by MCG. With this in mind, this document provides an overview of the four issues affecting networking at the MCG. First, network resources (bandwidth, latency and computing capacity, together with the technical limits within which the MCG must operate. Second, the distribution concepts include communication architectures (peer-to-peer, client / server, server / network, and data and control architectures (centralized, distributed and reproduced .Thirdly, scalability allows the MCG to adapt to changes in parameterization resources. Finally, security is intended to fend off the traps and vandalism, which are common in online games; to check traffic, particularly these games we decided to take the massively multiplayer game League of Legends, a scene corresponding to a situation of real life in a network of ADSL access network is deployed has been simulated by using NS2 Three variants of TCP, it means SACK TCP, New Reno TCP, and TCP Vegas, have been considered for the cross traffic. The results show that TCP Vegas is able to maintain a constant speed while racing against the game traffic, since it avoids the packet loss and the delays in the tail caused by high peaks, without increasing the size of the sender window. SACK TCP and TCP New Reno, on the other hand, tend to increase continuously the sender window size, which could allow a greater loss of packages and also to cause unwanted delays for the game traffic.

  19. Scheduling Network Traffic for Grid Purposes

    DEFF Research Database (Denmark)

    Gamst, Mette

    This thesis concerns scheduling of network traffic in grid context. Grid computing consists of a number of geographically distributed computers, which work together for solving large problems. The computers are connected through a network. When scheduling job execution in grid computing, data...... transmission has so far not been taken into account. This causes stability problems, because data transmission takes time and thus causes delays to the execution plan. This thesis proposes the integration of job scheduling and network routing. The scientific contribution is based on methods from operations...

  20. Machine learning for identifying botnet network traffic

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2013-01-01

    . Due to promise of non-invasive and resilient detection, botnet detection based on network traffic analysis has drawn a special attention of the research community. Furthermore, many authors have turned their attention to the use of machine learning algorithms as the mean of inferring botnet......-related knowledge from the monitored traffic. This paper presents a review of contemporary botnet detection methods that use machine learning as a tool of identifying botnet-related traffic. The main goal of the paper is to provide a comprehensive overview on the field by summarizing current scientific efforts....... The contribution of the paper is three-fold. First, the paper provides a detailed insight on the existing detection methods by investigating which bot-related heuristic were assumed by the detection systems and how different machine learning techniques were adapted in order to capture botnet-related knowledge...

  1. TRAFFIC TIME SERIES FORECASTING BY FEEDFORWARD NEURAL NETWORK: A CASE STUDY BASED ON TRAFFIC DATA OF MONROE

    Directory of Open Access Journals (Sweden)

    M. Raeesi

    2014-10-01

    Full Text Available Short time prediction is one of the most important factors in intelligence transportation system (ITS. In this research, the use of feed forward neural network for traffic time-series prediction is presented. In this paper, the traffic in one direction of the road segment is predicted. The input of the neural network is the time delay data exported from the road traffic data of Monroe city. The time delay data is used for training the network. For generating the time delay data, the traffic data related to the first 300 days of 2008 is used. The performance of the feed forward neural network model is validated using the real observation data of the 301st day.

  2. Estimating Traffic and Anomaly Maps via Network Tomography

    OpenAIRE

    Mardani, Morteza; Giannakis, Georgios B.

    2014-01-01

    Mapping origin-destination (OD) network traffic is pivotal for network management and proactive security tasks. However, lack of sufficient flow-level measurements as well as potential anomalies pose major challenges towards this goal. Leveraging the spatiotemporal correlation of nominal traffic, and the sparse nature of anomalies, this paper brings forth a novel framework to map out nominal and anomalous traffic, which treats jointly important network monitoring tasks including traffic estim...

  3. Traffic measurement for big network data

    CERN Document Server

    Chen, Shigang; Xiao, Qingjun

    2017-01-01

    This book presents several compact and fast methods for online traffic measurement of big network data. It describes challenges of online traffic measurement, discusses the state of the field, and provides an overview of the potential solutions to major problems. The authors introduce the problem of per-flow size measurement for big network data and present a fast and scalable counter architecture, called Counter Tree, which leverages a two-dimensional counter sharing scheme to achieve far better memory efficiency and significantly extend estimation range. Unlike traditional approaches to cardinality estimation problems that allocate a separated data structure (called estimator) for each flow, this book takes a different design path by viewing all the flows together as a whole: each flow is allocated with a virtual estimator, and these virtual estimators share a common memory space. A framework of virtual estimators is designed to apply the idea of sharing to an array of cardinality estimation solutions, achi...

  4. Network traffic model using GIPP and GIBP

    Science.gov (United States)

    Lee, Yong Duk; Van de Liefvoort, Appie; Wallace, Victor L.

    1998-10-01

    In telecommunication networks, the correlated nature of teletraffic patterns can have significant impact on queuing measures such as queue length, blocking and delay. There is, however, not yet a good general analytical description which can easily incorporate the correlation effect of the traffic, while at the same time maintaining the ease of modeling. The authors have shown elsewhere, that the covariance structures of the generalized Interrupted Poisson Process (GIPP) and the generalized Interrupted Bernoulli Process (GIBP) have an invariance property which makes them reasonably general, yet algebraically manageable, models for representing correlated network traffic. The GIPP and GIBP have a surprisingly rich sets of parameters, yet these invariance properties enable us to easily incorporate the covariance function as well as the interarrival time distribution into the model to better matchobservations. In this paper, we show an application of GIPP and GIBP for matching an analytical model to observed or experimental data.

  5. Online Gaming Traffic Generator for Reproducing Gamer Behavior

    OpenAIRE

    Shin, Kwangsik; Kim, Jinhyuk; Sohn, Kangmin; Park, Changjoon; Choi, Sangbang

    2010-01-01

    International audience; In this paper, we proposed an online gaming traffic generator reflecting user behavior patterns. We analyzed the packet size and inter departure time distributions of a popular FPS game (Left4Dead) and MMORPG (World of Warcraft) for regenerating gaming traffic. The proposed traffic generator generates an inter departure time and gaming packetbased on analytical model of the gamer behaviors, then transmits the packet according to the inter departure time. Packet generat...

  6. A Comparison of Techniques for Reducing Unicast Traffic in HSR Networks

    Directory of Open Access Journals (Sweden)

    Nguyen Xuan Tien

    2015-10-01

    Full Text Available This paper investigates several existing techniques for reducing high-availability seamless redundancy (HSR unicast traffic in HSR networks for substation automation systems (SAS. HSR is a redundancy protocol for Ethernet networks that provides duplicate frames for separate physical paths with zero recovery time. This feature of HSR makes it very suited for real-time and mission-critical applications such as SAS systems. HSR is one of the redundancy protocols selected for SAS systems. However, the standard HSR protocol generates too much unnecessary redundant unicast traffic in connected-ring networks. This drawback degrades network performance and may cause congestion and delay. Several techniques have been proposed to reduce the redundant unicast traffic, resulting in the improvement of network performance in HSR networks. These HSR traffic reduction techniques are broadly classified into two categories based on their traffic reduction manner, including traffic filtering-based techniques and predefined path-based techniques. In this paper, we provide an overview and comparison of these HSR traffic reduction techniques found in the literature. The concepts, operational principles, network performance, advantages, and disadvantages of these techniques are investigated, summarized. We also provide a comparison of the traffic performance of these HSR traffic reduction techniques.

  7. The effects of redundancy and information manipulation on traffic networks

    OpenAIRE

    Özel, Berk; Ozel, Berk

    2014-01-01

    Traffic congestion is one of the most frequently encountered problems in real life. It is not only a scientific concern of scholars, but also an inevitable issue for most of the individuals living in urban areas. Since every driver in traffic networks tries to minimize own journey length, and volume of the traffic prevents coordination between individuals, a cooperative behavior will not be provided spontaneously in order to decrease the total cost of the network and the time spent on traffic...

  8. Networked traffic state estimation involving mixed fixed-mobile sensor data using Hamilton-Jacobi equations

    KAUST Repository

    Canepa, Edward S.

    2017-06-19

    Nowadays, traffic management has become a challenge for urban areas, which are covering larger geographic spaces and facing the generation of different kinds of traffic data. This article presents a robust traffic estimation framework for highways modeled by a system of Lighthill Whitham Richards equations that is able to assimilate different sensor data available. We first present an equivalent formulation of the problem using a Hamilton–Jacobi equation. Then, using a semi-analytic formula, we show that the model constraints resulting from the Hamilton–Jacobi equation are linear ones. We then pose the problem of estimating the traffic density given incomplete and inaccurate traffic data as a Mixed Integer Program. We then extend the density estimation framework to highway networks with any available data constraint and modeling junctions. Finally, we present a travel estimation application for a small network using real traffic measurements obtained obtained during Mobile Century traffic experiment, and comparing the results with ground truth data.

  9. An assessment of a traffic monitoring system for a major traffic generator to improve regional planning : technical report.

    Science.gov (United States)

    2009-09-01

    The opening of a major traffic generator in the San Antonio area provided an opportunity to develop and : implement an extensive traffic monitoring system to analyze local, area, and regional traffic impacts from the : generator. Researchers reviewed...

  10. Routing strategies in traffic network and phase transition in network ...

    Indian Academy of Sciences (India)

    The dynamics of information traffic over scale-free networks has been investigated systematically. A series of routing strategies of data packets have been proposed, including the local routing strategy, the next-nearest-neighbour routing strategy, and the mixed routing strategy based on local static and dynamic information.

  11. Breakdown in traffic networks fundamentals of transportation science

    CERN Document Server

    Kerner, Boris S

    2017-01-01

    This book offers a detailed investigation of breakdowns in traffic and transportation networks. It shows empirically that transitions from free flow to so-called synchronized flow, initiated by local disturbances at network bottlenecks, display a nucleation-type behavior: while small disturbances in free flow decay, larger ones grow further and lead to breakdowns at the bottlenecks. Further, it discusses in detail the significance of this nucleation effect for traffic and transportation theories, and the consequences this has for future automatic driving, traffic control, dynamic traffic assignment, and optimization in traffic and transportation networks. Starting from a large volume of field traffic data collected from various sources obtained solely through measurements in real world traffic, the author develops his insights, with an emphasis less on reviewing existing methodologies, models and theories, and more on providing a detailed analysis of empirical traffic data and drawing consequences regarding t...

  12. Encapsulating Urban Traffic Rhythms into Road Networks

    Science.gov (United States)

    Wang, Junjie; Wei, Dong; He, Kun; Gong, Hang; Wang, Pu

    2014-02-01

    Using road GIS (geographical information systems) data and travel demand data for two U.S. urban areas, the dynamical driver sources of each road segment were located. A method to target road clusters closely related to urban traffic congestion was then developed to improve road network efficiency. The targeted road clusters show different spatial distributions at different times of a day, indicating that our method can encapsulate dynamical travel demand information into the road networks. As a proof of concept, when we lowered the speed limit or increased the capacity of road segments in the targeted road clusters, we found that both the number of congested roads and extra travel time were effectively reduced. In addition, the proposed modeling framework provided new insights on the optimization of transport efficiency in any infrastructure network with a specific supply and demand distribution.

  13. Network Analysis of Urban Traffic with Big Bus Data

    CERN Document Server

    Zhao, Kai

    2016-01-01

    Urban traffic analysis is crucial for traffic forecasting systems, urban planning and, more recently, various mobile and network applications. In this paper, we analyse urban traffic with network and statistical methods. Our analysis is based on one big bus dataset containing 45 million bus arrival samples in Helsinki. We mainly address following questions: 1. How can we identify the areas that cause most of the traffic in the city? 2. Why there is a urban traffic? Is bus traffic a key cause of the urban traffic? 3. How can we improve the urban traffic systems? To answer these questions, first, the betweenness is used to identify the most import areas that cause most traffics. Second, we find that bus traffic is not an important cause of urban traffic using statistical methods. We differentiate the urban traffic and the bus traffic in a city. We use bus delay as an identification of the urban traffic, and the number of bus as an identification of the bus traffic. Third, we give our solutions on how to improve...

  14. Consensus-Based Cooperative Control Based on Pollution Sensing and Traffic Information for Urban Traffic Networks

    Directory of Open Access Journals (Sweden)

    Antonio Artuñedo

    2017-04-01

    Full Text Available Nowadays many studies are being conducted to develop solutions for improving the performance of urban traffic networks. One of the main challenges is the necessary cooperation among different entities such as vehicles or infrastructure systems and how to exploit the information available through networks of sensors deployed as infrastructures for smart cities. In this work an algorithm for cooperative control of urban subsystems is proposed to provide a solution for mobility problems in cities. The interconnected traffic lights controller (TLC network adapts traffic lights cycles, based on traffic and air pollution sensory information, in order to improve the performance of urban traffic networks. The presence of air pollution in cities is not only caused by road traffic but there are other pollution sources that contribute to increase or decrease the pollution level. Due to the distributed and heterogeneous nature of the different components involved, a system of systems engineering approach is applied to design a consensus-based control algorithm. The designed control strategy contains a consensus-based component that uses the information shared in the network for reaching a consensus in the state of TLC network components. Discrete event systems specification is applied for modelling and simulation. The proposed solution is assessed by simulation studies with very promising results to deal with simultaneous responses to both pollution levels and traffic flows in urban traffic networks.

  15. Consensus-Based Cooperative Control Based on Pollution Sensing and Traffic Information for Urban Traffic Networks.

    Science.gov (United States)

    Artuñedo, Antonio; Del Toro, Raúl M; Haber, Rodolfo E

    2017-04-26

    Nowadays many studies are being conducted to develop solutions for improving the performance of urban traffic networks. One of the main challenges is the necessary cooperation among different entities such as vehicles or infrastructure systems and how to exploit the information available through networks of sensors deployed as infrastructures for smart cities. In this work an algorithm for cooperative control of urban subsystems is proposed to provide a solution for mobility problems in cities. The interconnected traffic lights controller (TLC) network adapts traffic lights cycles, based on traffic and air pollution sensory information, in order to improve the performance of urban traffic networks. The presence of air pollution in cities is not only caused by road traffic but there are other pollution sources that contribute to increase or decrease the pollution level. Due to the distributed and heterogeneous nature of the different components involved, a system of systems engineering approach is applied to design a consensus-based control algorithm. The designed control strategy contains a consensus-based component that uses the information shared in the network for reaching a consensus in the state of TLC network components. Discrete event systems specification is applied for modelling and simulation. The proposed solution is assessed by simulation studies with very promising results to deal with simultaneous responses to both pollution levels and traffic flows in urban traffic networks.

  16. Robust and Agile System against Fault and Anomaly Traffic in Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2017-03-01

    Full Text Available The main advantage of software defined networking (SDN is that it allows intelligent control and management of networking though programmability in real time. It enables efficient utilization of network resources through traffic engineering, and offers potential attack defense methods when abnormalities arise. However, previous studies have only identified individual solutions for respective problems, instead of finding a more global solution in real time that is capable of addressing multiple situations in network status. To cover diverse network conditions, this paper presents a comprehensive reactive system for simultaneously monitoring failures, anomalies, and attacks for high availability and reliability. We design three main modules in the SDN controller for a robust and agile defense (RAD system against network anomalies: a traffic analyzer, a traffic engineer, and a rule manager. RAD provides reactive flow rule generation to control traffic while detecting network failures, anomalies, high traffic volume (elephant flows, and attacks. The traffic analyzer identifies elephant flows, traffic anomalies, and attacks based on attack signatures and network monitoring. The traffic engineer module measures network utilization and delay in order to determine the best path for multi-dimensional routing and load balancing under any circumstances. Finally, the rule manager generates and installs a flow rule for the selected best path to control traffic. We implement the proposed RAD system based on Floodlight, an open source project for the SDN controller. We evaluate our system using simulation with and without the aforementioned RAD modules. Experimental results show that our approach is both practical and feasible, and can successfully augment an existing SDN controller in terms of agility, robustness, and efficiency, even in the face of link failures, attacks, and elephant flows.

  17. Best Practices Handbook: Traffic Engineering in Range Networks

    Science.gov (United States)

    2016-03-01

    accommodate an offered load or if traffic streams are inefficiently mapped onto available resources, causing subsets of network resources to become over...access equipment and video encoding equipment. 3. A response system, consisting of protocols and access mechanisms that allow the flow of traffic ...Multiprotocol Label Switching (MPLS) that enable the predictable traffic flow across the MRTFBs. A detailed description of network elements relevant to the

  18. Enhancing the Quality of Service for Real Time Traffic over Optical Burst Switching (OBS) Networks with Ensuring the Fairness for Other Traffics.

    Science.gov (United States)

    Al-Shargabi, Mohammed A; Shaikh, Asadullah; Ismail, Abdulsamad S

    2016-01-01

    Optical burst switching (OBS) networks have been attracting much consideration as a promising approach to build the next generation optical Internet. A solution for enhancing the Quality of Service (QoS) for high priority real time traffic over OBS with the fairness among the traffic types is absent in current OBS' QoS schemes. In this paper we present a novel Real Time Quality of Service with Fairness Ratio (RT-QoSFR) scheme that can adapt the burst assembly parameters according to the traffic QoS needs in order to enhance the real time traffic QoS requirements and to ensure the fairness for other traffic. The results show that RT-QoSFR scheme is able to fulfill the real time traffic requirements (end to end delay, and loss rate) ensuring the fairness for other traffics under various conditions such as the type of real time traffic and traffic load. RT-QoSFR can guarantee that the delay of the real time traffic packets does not exceed the maximum packets transfer delay value. Furthermore, it can reduce the real time traffic packets loss, at the same time guarantee the fairness for non real time traffic packets by determining the ratio of real time traffic inside the burst to be 50-60%, 30-40%, and 10-20% for high, normal, and low traffic loads respectively.

  19. Enhancing the Quality of Service for Real Time Traffic over Optical Burst Switching (OBS Networks with Ensuring the Fairness for Other Traffics.

    Directory of Open Access Journals (Sweden)

    Mohammed A Al-Shargabi

    Full Text Available Optical burst switching (OBS networks have been attracting much consideration as a promising approach to build the next generation optical Internet. A solution for enhancing the Quality of Service (QoS for high priority real time traffic over OBS with the fairness among the traffic types is absent in current OBS' QoS schemes. In this paper we present a novel Real Time Quality of Service with Fairness Ratio (RT-QoSFR scheme that can adapt the burst assembly parameters according to the traffic QoS needs in order to enhance the real time traffic QoS requirements and to ensure the fairness for other traffic. The results show that RT-QoSFR scheme is able to fulfill the real time traffic requirements (end to end delay, and loss rate ensuring the fairness for other traffics under various conditions such as the type of real time traffic and traffic load. RT-QoSFR can guarantee that the delay of the real time traffic packets does not exceed the maximum packets transfer delay value. Furthermore, it can reduce the real time traffic packets loss, at the same time guarantee the fairness for non real time traffic packets by determining the ratio of real time traffic inside the burst to be 50-60%, 30-40%, and 10-20% for high, normal, and low traffic loads respectively.

  20. Small-time Scale Network Traffic Prediction Based on Complex-valued Neural Network

    Science.gov (United States)

    Yang, Bin

    2017-07-01

    Accurate models play an important role in capturing the significant characteristics of the network traffic, analyzing the network dynamic, and improving the forecasting accuracy for system dynamics. In this study, complex-valued neural network (CVNN) model is proposed to further improve the accuracy of small-time scale network traffic forecasting. Artificial bee colony (ABC) algorithm is proposed to optimize the complex-valued and real-valued parameters of CVNN model. Small-scale traffic measurements data namely the TCP traffic data is used to test the performance of CVNN model. Experimental results reveal that CVNN model forecasts the small-time scale network traffic measurement data very accurately

  1. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Science.gov (United States)

    Zonglin, Li; Guangmin, Hu; Xingmiao, Yao; Dan, Yang

    2008-12-01

    Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation). The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  2. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Yang Dan

    2008-12-01

    Full Text Available Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation. The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  3. An analysis of network traffic classification for botnet detection

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2015-01-01

    Botnets represent one of the most serious threats to the Internet security today. This paper explores how can network traffic classification be used for accurate and efficient identification of botnet network activity at local and enterprise networks. The paper examines the effectiveness of detec......Botnets represent one of the most serious threats to the Internet security today. This paper explores how can network traffic classification be used for accurate and efficient identification of botnet network activity at local and enterprise networks. The paper examines the effectiveness...

  4. Poisson Packet Traffic Generation Based on Empirical Data

    Directory of Open Access Journals (Sweden)

    Andrej Kos

    2003-10-01

    Full Text Available An algorithm for generating equivalent Poisson packet traffic based on empirical traffic data is presented in this paper. Two steps are required in order to produce equivalent Poisson packet traffic. Real traffic trace is analyzed in the first step. In the second step, a new equivalent synthetic Poisson traffic is generated in such a way that the first order statistical parameters remain unchanged. New packet inter-arrival time series are produced in a random manner using negative exponential probability distribution with a known mean. New packet size series are also produced in a random manner. However, due to specified minimum and maximum packet sizes, a truncated exponential probability distribution is applied.

  5. Determining optimal speed limits in traffic networks

    Directory of Open Access Journals (Sweden)

    Mansour Hadji Hosseinlou

    2015-07-01

    Full Text Available Determining the speed limit of road transport systems has a significant role in the speed management of vehicles. In most cases, setting a speed limit is considered as a trade-off between reducing travel time on one hand and reducing road accidents on the other, and the two factors of vehicle fuel consumption and emission rate of air pollutants have been neglected. This paper aims to evaluate optimal speed limits in traffic networks in a way that economized societal costs are incurred. In this study, experimental and field data as well as data from simulations are used to determine how speed is related to the emission of pollutants, fuel consumption, travel time, and the number of accidents. This paper also proposes a simple model to calculate the societal costs of travel and relate them to speed. As a case study, using emission test results on cars manufactured domestically and by simulating the suburban traffic flow by Aimsun software, the total societal costs of the Shiraz-Marvdasht motorway, which is one of the most traversed routes in Iran, have been estimated. The results of the study show that from a societal perspective, the optimal speed would be 73 km/h, and from a road user perspective, it would be 82 km/h (in 2011, the average speed of the passing vehicles on that motorway was 82 km/h. The experiments in this paper were run on three different vehicles with different types of fuel. In a comparative study, the results show that the calculated speed limit is lower than the optimal speed limits in Sweden, Norway, and Australia.

  6. Developing a New HSR Switching Node (SwitchBox for Improving Traffic Performance in HSR Networks

    Directory of Open Access Journals (Sweden)

    Nguyen Xuan Tien

    2016-01-01

    Full Text Available High availability is crucial for industrial Ethernet networks as well as Ethernet-based control systems such as automation networks and substation automation systems (SAS. Since standard Ethernet does not support fault tolerance capability, the high availability of Ethernet networks can be increased by using redundancy protocols. Various redundancy protocols for Ethernet networks have been developed and standardized, such as rapid spanning tree protocol (RSTP, media redundancy protocol (MRP, parallel redundancy protocol (PRP, high-availability seamless redundancy (HSR and others. RSTP and MRP have switchover delay drawbacks. PRP provides zero recovery time, but requires a duplicate network infrastructure. HSR operation is similar to PRP, but HSR uses a single network. However, the standard HSR protocol is mainly applied to ring-based topologies and generates excessively unnecessary redundant traffic in the network. In this paper, we develop a new switching node for the HSR protocol, called SwitchBox, which is used in HSR networks in order to support any network topology and significantly reduce redundant network traffic, including unicast, multicast and broadcast traffic, compared with standard HSR. By using the SwitchBox, HSR not only provides seamless communications with zero switchover time in case of failure, but it is also easily applied to any network topology and significantly reduces unnecessary redundant traffic in HSR networks.

  7. Wavelength converter placement in optical networks with dynamic traffic

    DEFF Research Database (Denmark)

    Buron, Jakob Due; Ruepp, Sarah Renée; Wessing, Henrik

    2008-01-01

    We evaluate the connection provisioning performance of GMPLS-controlled wavelength routed networks under dynamic traffic load and using three different wavelength converter placement heuristics. Results show that a simple uniform placement heuristic matches the performance of complex heuristics...... under dynamic traffic assumptions....

  8. Cooperative driving in mixed traffic networks - Optimizing for performance

    NARCIS (Netherlands)

    Calvert, S.C.; Broek, T.H.A. van den; Noort, M. van

    2012-01-01

    This paper discusses a cooperative adaptive cruise control application and its effects on the traffic system. In previous work this application has been tested on the road, and traffic simulation has been used to scale up the results of the field test to larger networks and more vehicles. The

  9. Signal Processing Algorithms for Down-Stream Traffic in Next Generation 10 Gbit/s Fixed-Grid Passive Optical Networks

    Directory of Open Access Journals (Sweden)

    Rameez Asif

    2014-01-01

    Full Text Available We have analyzed the impact of digital and optical signal processing algorithms, that is, Volterra equalization (VE, digital backpropagation (BP, and optical phase conjugation with nonlinearity module (OPC-NM, in next generation 10 Gbit/s (also referred to as XG DP-QPSK long haul WDM (fixed-grid passive optical network (PON without midspan repeaters over 120 km standard single mode fiber (SMF link for downstream signals. Due to the compensation of optical Kerr effects, the sensitivity penalty is improved by 2 dB by implementing BP algorithm, 1.5 dB by VE algorithm, and 2.69 dB by OPC-NM. Moreover, with the implementation of NL equalization technique, we are able to get the transmission distance of 126.6 km SMF for the 1 : 1024 split ratio at 5 GHz channel spacing in the nonlinear region.

  10. Robustness of Interrelated Traffic Networks to Cascading Failures

    Science.gov (United States)

    Su, Zhen; Li, Lixiang; Peng, Haipeng; Kurths, Jürgen; Xiao, Jinghua; Yang, Yixian

    2014-06-01

    The vulnerability to real-life networks against small initial attacks has been one of outstanding challenges in the study of interrelated networks. We study cascading failures in two interrelated networks S and B composed from dependency chains and connectivity links respectively. This work proposes a realistic model for cascading failures based on the redistribution of traffic flow. We study the Barabási-Albert networks (BA) and Erdős-Rényi graphs (ER) with such structure, and found that the efficiency sharply decreases with increasing percentages of the dependency nodes for removing a node randomly. Furthermore, we study the robustness of interrelated traffic networks, especially the subway and bus network in Beijing. By analyzing different attacking strategies, we uncover that the efficiency of the city traffic system has a non-equilibrium phase transition at low capacity of the networks. This explains why the pressure of the traffic overload is relaxed by singly increasing the number of small buses during rush hours. We also found that the increment of some buses may release traffic jam caused by removing a node of the bus network randomly if the damage is limited. However, the efficiencies to transfer people flow will sharper increase when the capacity of the subway network αS > α0.

  11. Delayed Correlations in Inter-Domain Network Traffic

    OpenAIRE

    Rojkova, Viktoria; Kantardzic, Mehmed

    2007-01-01

    To observe the evolution of network traffic correlations we analyze the eigenvalue spectra and eigenvectors statistics of delayed correlation matrices of network traffic counts time series. Delayed correlation matrix D is composed of the correlations between one variable in the multivariable time series and another at a time delay \\tau . Inverse participation ratio (IPR) of eigenvectors of D deviates substantially from the IPR of eigenvectors of the equal time correlation matrix C. We relate ...

  12. Performance Modeling for Heterogeneous Wireless Networks with Multiservice Overflow Traffic

    DEFF Research Database (Denmark)

    Huang, Qian; Ko, King-Tim; Iversen, Villy Bæk

    2009-01-01

    Performance modeling is important for the purpose of developing efficient dimensioning tools for large complicated networks. But it is difficult to achieve in heterogeneous wireless networks, where different networks have different statistical characteristics in service and traffic models....... Multiservice loss analysis based on multi-dimensional Markov chain becomes intractable in these networks due to intensive computations required. This paper focuses on performance modeling for heterogeneous wireless networks based on a hierarchical overlay infrastructure. A method based on decomposition...... of the correlated traffic is used to achieve an approximate performance modeling for multiservice in hierarchical heterogeneous wireless networks with overflow traffic. The accuracy of the approximate performance obtained by our proposed modeling is verified by simulations....

  13. Algorithm for queueing networks with multi-rate traffic

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk; King-Tim, Ko

    2011-01-01

    In this paper we present a new algorithm for evaluating queueing networks with multi-rate traffic. The detailed state space of a node is evaluated by explicit formulæ. We consider reversible nodes with multi-rate traffic and find the state probabilities by taking advantage of local balance. Theory...... is reversibility which implies that the arrival process and departure process are identical processes, for example state-dependent Poisson processes. This property is equivalent to reversibility. Due to product form, an open network with multi-rate traffic is easy to evaluate by convolution algorithms because...

  14. INTELLIGENT TRAFFIC-SAFETY MIRROR BY USING WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Peter Danišovič

    2014-03-01

    Full Text Available This article is focused on the problematic of traffic safety, dealing with the problem of car intersections with blocked view crossing by a special wireless sensor network (WSN proposed for the traffic monitoring, concretely for vehicle’s detection at places, where it is necessary. Some ultra-low-power TI products were developed due to this reason: microcontroller MSP430F2232, 868MHz RF transceiver CC1101 and LDO voltage regulator TPS7033. The WSN consist of four network nodes supplied with the special safety lightings which serve the function of intelligent traffic safety mirror.

  15. Network-wide BGP route prediction for traffic engineering

    Science.gov (United States)

    Feamster, Nick; Rexford, Jennifer

    2002-07-01

    The Internet consists of about 13,000 Autonomous Systems (AS's) that exchange routing information using the Border Gateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS's. However, BGP is a complicated, policy-based protocol that does not include any direct support for traffic engineering. In previous work, we have demonstrated that network operators can adapt the flow of traffic in an efficient and predictable fashion through careful adjustments to the BGP policies running on their edge routers. Nevertheless, many details of the BGP protocol and decision process make predicting the effects of these policy changes difficult. In this paper, we describe a tool that predicts traffic flow at network exit points based on the network topology, the import policy associated with each BGP session, and the routing advertisements received from neighboring AS's. We present a linear-time algorithm that computes a network-wide view of the best BGP routes for each destination prefix given a static snapshot of the network state, without simulating the complex details of BGP message passing. We describe how to construct this snapshot using the BGP routing tables and router configuration files available from operational routers. We verify the accuracy of our algorithm by applying our tool to routing and configuration data from AT&T's commercial IP network. Our route prediction techniques help support the operation of large IP backbone networks, where interdomain routing is an important aspect of traffic engineering.

  16. FPGA Based Real-time Network Traffic Analysis using Traffic Dispersion Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Khan, F; Gokhale, M; Chuah, C N

    2010-03-26

    The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. The core challenge is in addressing high amounts of traffic diversity found in today's networks. The problem becomes more challenging if a quick detection is required as in the case of identifying malicious network behavior or new applications like peer-to-peer traffic that have potential to quickly throttle the network bandwidth or cause significant damage. Recently, Traffic Dispersion Graphs (TDGs) have been introduced as a viable candidate for NTC. The TDGs work by forming a network wide communication graphs that embed characteristic patterns of underlying network applications. However, these patterns need to be quickly evaluated for mounting real-time response against them. This paper addresses these concerns and presents a novel solution for real-time analysis of Traffic Dispersion Metrics (TDMs) in the TDGs. We evaluate the dispersion metrics of interest and present a dedicated solution on an FPGA for their analysis. We also present analytical measures and empirically evaluate operating effectiveness of our design. The mapped design on Virtex-5 device can process 7.4 million packets/second for a TDG comprising of 10k flows at very high accuracies of over 96%.

  17. Traffic Management in ATM Networks Over Satellite Links

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Goyal, Mukul; Fahmy, Sonia; Vandalore, Bobby; vonDeak, Thomas

    1999-01-01

    This report presents a survey of the traffic management Issues in the design and implementation of satellite Asynchronous Transfer Mode (ATM) networks. The report focuses on the efficient transport of Transmission Control Protocol (TCP) traffic over satellite ATM. First, a reference satellite ATM network architecture is presented along with an overview of the service categories available in ATM networks. A delay model for satellite networks and the major components of delay and delay variation are described. A survey of design options for TCP over Unspecified Bit Rate (UBR), Guaranteed Frame Rate (GFR) and Available Bit Rate (ABR) services in ATM is presented. The main focus is on traffic management issues. Several recommendations on the design options for efficiently carrying data services over satellite ATM networks are presented. Most of the results are based on experiments performed on Geosynchronous (GEO) latencies. Some results for Low Earth Orbits (LEO) and Medium Earth Orbit (MEO) latencies are also provided.

  18. Cooperative Learning for Distributed In-Network Traffic Classification

    Science.gov (United States)

    Joseph, S. B.; Loo, H. R.; Ismail, I.; Andromeda, T.; Marsono, M. N.

    2017-04-01

    Inspired by the concept of autonomic distributed/decentralized network management schemes, we consider the issue of information exchange among distributed network nodes to network performance and promote scalability for in-network monitoring. In this paper, we propose a cooperative learning algorithm for propagation and synchronization of network information among autonomic distributed network nodes for online traffic classification. The results show that network nodes with sharing capability perform better with a higher average accuracy of 89.21% (sharing data) and 88.37% (sharing clusters) compared to 88.06% for nodes without cooperative learning capability. The overall performance indicates that cooperative learning is promising for distributed in-network traffic classification.

  19. Adaptive traffic control systems for urban networks

    Directory of Open Access Journals (Sweden)

    Radivojević Danilo

    2017-01-01

    Full Text Available Adaptive traffic control systems represent complex, but powerful tool for improvement of traffic flow conditions in locations or zones where applied. Many traffic agencies, especially those that have a large number of signalized intersections with high variability of the traffic demand, choose to apply some of the adaptive traffic control systems. However, those systems are manufactured and offered by multiple vendors (companies that are competing for the market share. Due to that fact, besides the information available from the vendors themselves, or the information from different studies conducted on different continents, very limited amount of information is available about the details how those systems are operating. The reason for that is the protecting of the intellectual property from plagiarism. The primary goal of this paper is to make a brief analysis of the functionalities, characteristics, abilities and results of the most recognized, but also less known adaptive traffic control systems to the professional public and other persons with interest in this subject.

  20. Routing of Internal MANET Traffic over External Networks

    Directory of Open Access Journals (Sweden)

    Vinh Pham

    2009-01-01

    Full Text Available Many have proposed to connect Mobile Ad Hoc Networks (MANETs to a wired backbone Internet access network. This paper demonstrates that a wired backbone network can be utilized for more than just providing access to the global Internet. Traffic between mobile nodes in the ad hoc network may also be routed via this backbone network to achieve higher throughput, and to reduce the load in the ad hoc network. This is referred to as transit routing. This paper proposes a cost metric algorithm that facilitates transit routing for some of the traffic flows between nodes in the MANET. The algorithm aims at carrying out transit routing for a flow only when it leads to improvements of the performance. The proposal is implemented and tested in the ns-2 network simulator, and the simulation results are promising.

  1. Uncovering transportation networks from traffic flux by compressed sensing

    Science.gov (United States)

    Tang, Si-Qi; Shen, Zhesi; Wang, Wen-Xu; Di, Zengru

    2015-08-01

    Transportation and communication networks are ubiquitous in nature and society. Uncovering the underlying topology as well as link weights, is fundamental to understanding traffic dynamics and designing effective control strategies to facilitate transmission efficiency. We develop a general method for reconstructing transportation networks from detectable traffic flux data using the aid of a compressed sensing algorithm. Our approach enables full reconstruction of network topology and link weights for both directed and undirected networks from relatively small amounts of data compared to the network size. The limited data requirement and certain resistance to noise allows our method to achieve real-time network reconstruction. We substantiate the effectiveness of our method through systematic numerical tests with respect to several different network structures and transmission strategies. We expect our approach to be widely applicable in a variety of transportation and communication systems.

  2. Traffic networks as information systems a viability approach

    CERN Document Server

    Aubin, Jean-Pierre

    2017-01-01

    This authored monograph covers a viability to approach to traffic management by advising to vehicles circulated on the network the velocity they should follow for satisfying global traffic conditions;. It presents an investigation of three structural innovations: The objective is to broadcast at each instant and at each position the advised celerity to vehicles, which could be read by auxiliary speedometers or used by cruise control devices. Namely, 1. Construct regulation feedback providing at each time and position advised velocities (celerities) for minimizing congestion or other requirements. 2. Taking into account traffic constraints of different type, the first one being to remain on the roads, to stop at junctions, etc. 3. Use information provided by the probe vehicles equipped with GPS to the traffic regulator; 4. Use other global traffic measures of vehicles provided by different types of sensors; These results are based on convex analysis, intertemporal optimization and viability theory as mathemati...

  3. Sensor Location Problem Optimization for Traffic Network with Different Spatial Distributions of Traffic Information.

    Science.gov (United States)

    Bao, Xu; Li, Haijian; Qin, Lingqiao; Xu, Dongwei; Ran, Bin; Rong, Jian

    2016-10-27

    To obtain adequate traffic information, the density of traffic sensors should be sufficiently high to cover the entire transportation network. However, deploying sensors densely over the entire network may not be realistic for practical applications due to the budgetary constraints of traffic management agencies. This paper describes several possible spatial distributions of traffic information credibility and proposes corresponding different sensor information credibility functions to describe these spatial distribution properties. A maximum benefit model and its simplified model are proposed to solve the traffic sensor location problem. The relationships between the benefit and the number of sensors are formulated with different sensor information credibility functions. Next, expanding models and algorithms in analytic results are performed. For each case, the maximum benefit, the optimal number and spacing of sensors are obtained and the analytic formulations of the optimal sensor locations are derived as well. Finally, a numerical example is proposed to verify the validity and availability of the proposed models for solving a network sensor location problem. The results show that the optimal number of sensors of segments with different model parameters in an entire freeway network can be calculated. Besides, it can also be concluded that the optimal sensor spacing is independent of end restrictions but dependent on the values of model parameters that represent the physical conditions of sensors and roads.

  4. A Wavelet Analysis-Based Dynamic Prediction Algorithm to Network Traffic

    Directory of Open Access Journals (Sweden)

    Meng Fan-Bo

    2016-01-01

    Full Text Available Network traffic is a significantly important parameter for network traffic engineering, while it holds highly dynamic nature in the network. Accordingly, it is difficult and impossible to directly predict traffic amount of end-to-end flows. This paper proposes a new prediction algorithm to network traffic using the wavelet analysis. Firstly, network traffic is converted into the time-frequency domain to capture time-frequency feature of network traffic. Secondly, in different frequency components, we model network traffic in the time-frequency domain. Finally, we build the prediction model about network traffic. At the same time, the corresponding prediction algorithm is presented to attain network traffic prediction. Simulation results indicates that our approach is promising.

  5. Online Incremental Learning for High Bandwidth Network Traffic Classification

    Directory of Open Access Journals (Sweden)

    H. R. Loo

    2016-01-01

    Full Text Available Data stream mining techniques are able to classify evolving data streams such as network traffic in the presence of concept drift. In order to classify high bandwidth network traffic in real-time, data stream mining classifiers need to be implemented on reconfigurable high throughput platform, such as Field Programmable Gate Array (FPGA. This paper proposes an algorithm for online network traffic classification based on the concept of incremental k-means clustering to continuously learn from both labeled and unlabeled flow instances. Two distance measures for incremental k-means (Euclidean and Manhattan distance are analyzed to measure their impact on the network traffic classification in the presence of concept drift. The experimental results on real datasets show that the proposed algorithm exhibits consistency, up to 94% average accuracy for both distance measures, even in the presence of concept drifts. The proposed incremental k-means classification using Manhattan distance can classify network traffic 3 times faster than Euclidean distance at 671 thousands flow instances per second.

  6. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  7. Baselining Network-Wide Traffic by Time-Frequency Constrained Stable Principal Component Pursuit

    OpenAIRE

    Hu, Kai; Wang, Zhe; Yin, Baolin

    2013-01-01

    The Internet traffic analysis is important to network management,and extracting the baseline traffic patterns is especially helpful for some significant network applications.In this paper, we study on the baseline problem of the traffic matrix satisfying a refined traffic matrix decomposition model,since this model extends the assumption of the baseline traffic component to characterize its smoothness, and is more realistic than the existing traffic matrix models. We develop a novel baseline ...

  8. Algorithm for queueing networks with multi-rate traffic

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk; Ko, King-Tim

    2011-01-01

    In this paper we present a new algorithm for evaluating queueing networks with multi-rate traffic. The detailed state space of a node is evaluated by explicit formulæ. We consider reversible nodes with multi-rate traffic and find the state probabilities by taking advantage of local balance. Theory...... is reversibility which implies that the arrival process and departure process are identical processes, for example state-dependent Poisson processes. This property is equivalent to reversibility. Due to product form, an open network with multi-rate traffic is easy to evaluate by convolution algorithms because...... the nodes behave as independent nodes. For closed queueing networks with multiple servers in every node and multi-rate services we may apply multidimensional convolution algorithm to aggregate the nodes so that we end up with two nodes, the aggregated node and a single node, for which we can calculate...

  9. Studies of Next Generation Air Traffic Control Specialists: Why Be an Air Traffic Controller?

    Science.gov (United States)

    2011-08-01

    example, the job security and stability that appealed to “ Baby Boomers ” might be less important to “Gen-X” and “ Millennials ,” who are said to be looking...controllers, recruited from Gen-X and Millennials , than to the “Post-Strike” generation (largely Baby Boomers ) and non-material factors such as the...air traffic coNtrol SpecialiStS: Why Be aN air traffic coNtroller? “Gen-X,” “Gen-Y,” “ Baby Boomer ,” “ Millennial ,” “The Greatest Generation”: Labels

  10. Realistic computer network simulation for network intrusion detection dataset generation

    Science.gov (United States)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  11. A model of traffic signs recognition with convolutional neural network

    Science.gov (United States)

    Hu, Haihe; Li, Yujian; Zhang, Ting; Huo, Yi; Kuang, Wenqing

    2016-10-01

    In real traffic scenes, the quality of captured images are generally low due to some factors such as lighting conditions, and occlusion on. All of these factors are challengeable for automated recognition algorithms of traffic signs. Deep learning has provided a new way to solve this kind of problems recently. The deep network can automatically learn features from a large number of data samples and obtain an excellent recognition performance. We therefore approach this task of recognition of traffic signs as a general vision problem, with few assumptions related to road signs. We propose a model of Convolutional Neural Network (CNN) and apply the model to the task of traffic signs recognition. The proposed model adopts deep CNN as the supervised learning model, directly takes the collected traffic signs image as the input, alternates the convolutional layer and subsampling layer, and automatically extracts the features for the recognition of the traffic signs images. The proposed model includes an input layer, three convolutional layers, three subsampling layers, a fully-connected layer, and an output layer. To validate the proposed model, the experiments are implemented using the public dataset of China competition of fuzzy image processing. Experimental results show that the proposed model produces a recognition accuracy of 99.01 % on the training dataset, and yield a record of 92% on the preliminary contest within the fourth best.

  12. A First Look into SCADA Network Traffic

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Sadre, R.; Pras, Aiko

    Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of critical infrastructures, such as water distribution facilities. These networks provide automated processes that ensure the correct functioning of these infrastructures, in a operation much

  13. A latency analysis for M2M and OG-like traffic patterns in different HSPA core network configurations

    Directory of Open Access Journals (Sweden)

    M. V. Popović

    2014-11-01

    Full Text Available In this paper we present an analysis intended to reveal possible impacts of core network features on latency for modelled M2M and Online Gaming traffic. Simulations were performed in a live 3G/HSPA network. Test traffic simulating multiplayer real-time games and M2M applications was generated on 10 mobile phones in parallel, sending data to a remote server. APNs with different combinations of hardware and features (proxy server, different GGSNs and firewalls, usage of Service Awareness feature were chosen. The traffic was recorded on the Gn interface in the mobile core. The goal of experiments was to evaluate any eventually significant variation of average recorded RTTs in the core part of mobile network that would clearly indicate either the impact of used APN on delay for a specific traffic pattern, or selectivity of the APN towards different traffic patterns.

  14. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  15. Optimization of TTEthernet Networks to Support Best-Effort Traffic

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul

    2014-01-01

    This paper focuses on the optimization of the TTEthernet communication protocol, which offers three traffic classes: time-triggered (TT), sent according to static schedules, rate-constrained (RC) that has bounded end-to-end latency, and best-effort (BE), the classic Ethernet traffic, with no timing...... guarantees. In our earlier work we have proposed an optimization approach named DOTTS that performs the routing, scheduling and packing / fragmenting of TT and RC messages, such that the TT and RC traffic is schedulable. Although backwards compatibility with classic Ethernet networks is one of TTEthernet......’s strong points, there is little research on this topic. However, in this paper, we extend our DOTTS optimization approach to optimize TTEthernet networks, such that not only the TT and RC messages are schedulable, but we also maximize the available bandwidth for BE messages. The proposed optimization has...

  16. Resource and power management in next generation networks

    OpenAIRE

    Limani Fazliu, Zana

    2017-01-01

    The limits of today's cellular communication systems are constantly being tested by the exponential increase in mobile data traffic, a trend which is poised to continue well into the next decade. Densification of cellular networks, by overlaying smaller cells, i.e., micro, pico and femtocells, over the traditional macrocell, is seen as an inevitable step in enabling future networks to support the expected increases in data rate demand. Next generation networks will most certainly be more hete...

  17. Energy Saving: Scaling Network Energy Efficiency Faster than Traffic Growth

    NARCIS (Netherlands)

    Chen, Y.; Blume, O.; Gati, A.; Capone, A.; Wu, C.E.; Barth, U.; Marzetta, T.; Zhang, H.; Xu, S.

    2013-01-01

    As the mobile traffic is expected to continue its exponential growth in the near future, energy efficiency has gradually become a must criterion for wireless network design. Three fundamental questions need to be answered before the detailed design could be carried out, namely what energy efficiency

  18. Towards Mining Latent Client Identifiers from Network Traffic

    Directory of Open Access Journals (Sweden)

    Jain Sakshi

    2016-04-01

    Full Text Available Websites extensively track users via identifiers that uniquely map to client machines or user accounts. Although such tracking has desirable properties like enabling personalization and website analytics, it also raises serious concerns about online user privacy, and can potentially enable illicit surveillance by adversaries who broadly monitor network traffic.

  19. Traffic Analysis for Real-Time Communication Networks onboard Ships

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Nielsen, Jens Frederik Dalsgaard; Jørgensen, N.

    1998-01-01

    The paper presents a novel method for establishing worst case estimates of queue lenghts and transmission delays in networks of interconnected segments each of ring topology as defined by the ATOMOS project for marine automation. A non probalistic model for describing traffic is introduced as well...

  20. Traffic Analysis for Real-Time Communication Networks onboard Ships

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Nielsen, Jens Frederik Dalsgaard; Jørgensen, N.

    The paper presents a novel method for establishing worst case estimates of queue lenghts and transmission delays in networks of interconnected segments each of ring topology as defined by the ATOMOS project for marine automation. A non probalistic model for describing traffic is introduced as well...

  1. Simulation of traffic capacity of inland waterway network

    NARCIS (Netherlands)

    Chen, L.; Mou, J.; Ligteringen, H.

    2013-01-01

    The inland waterborne transportation is viewed as an economic, safe and environmentally friendly alternative to the congested road network. The traffic capacity are the critical indicator of the inland shipping performance. Actually, interacted under the complicated factors, it is challenging to

  2. Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms

    Science.gov (United States)

    2014-03-27

    which represent potentially insecure mechanisms for authentication and authorization. 9 An example of a hacker penetrating network security at a...transport most application 35 traffic such as Lightweight Directory Access Protocol ( LDAP ), HTTP, HyperText Transfer Protocol Secure (HTTPS), POP3...Department of Homeland Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 DPI deep packet inspection

  3. The effects of traffic structure on application and network performance

    CERN Document Server

    Aikat, Jay; Smith, F Donelson

    2012-01-01

    Over the past three decades, the Internet's rapid growth has spurred the development of new applications in mobile computing, digital music, online video, gaming and social networks. These applications rely heavily upon various underlying network protocols and mechanisms to enable, maintain and enhance their Internet functionalityThe Effects of Traffic Structure on Application and Network Performance provides the necessary tools for maximizing the network efficiency of any Internet application, and presents ground-breaking research that will influence how these applications are built in the fu

  4. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    When it comes to discussing the future of electronic communication, social networking is the buzzword. The Internet has become a platform where new social networks emerge and the Internet it itself support the more traditional computer supported communication. The way users build and verifies...

  5. Toward an optimal convolutional neural network for traffic sign recognition

    Science.gov (United States)

    Habibi Aghdam, Hamed; Jahani Heravi, Elnaz; Puig, Domenec

    2015-12-01

    Convolutional Neural Networks (CNN) beat the human performance on German Traffic Sign Benchmark competition. Both the winner and the runner-up teams trained CNNs to recognize 43 traffic signs. However, both networks are not computationally efficient since they have many free parameters and they use highly computational activation functions. In this paper, we propose a new architecture that reduces the number of the parameters 27% and 22% compared with the two networks. Furthermore, our network uses Leaky Rectified Linear Units (ReLU) as the activation function that only needs a few operations to produce the result. Specifically, compared with the hyperbolic tangent and rectified sigmoid activation functions utilized in the two networks, Leaky ReLU needs only one multiplication operation which makes it computationally much more efficient than the two other functions. Our experiments on the Gertman Traffic Sign Benchmark dataset shows 0:6% improvement on the best reported classification accuracy while it reduces the overall number of parameters 85% compared with the winner network in the competition.

  6. Routing optimization in networks based on traffic gravitational field model

    Science.gov (United States)

    Liu, Longgeng; Luo, Guangchun

    2017-04-01

    For research on the gravitational field routing mechanism on complex networks, we further analyze the gravitational effect of paths. In this study, we introduce the concept of path confidence degree to evaluate the unblocked reliability of paths that it takes the traffic state of all nodes on the path into account from the overall. On the basis of this, we propose an improved gravitational field routing protocol considering all the nodes’ gravities on the path and the path confidence degree. In order to evaluate the transmission performance of the routing strategy, an order parameter is introduced to measure the network throughput by the critical value of phase transition from a free-flow phase to a jammed phase, and the betweenness centrality is used to evaluate the transmission performance and traffic congestion of the network. Simulation results show that compared with the shortest-path routing strategy and the previous gravitational field routing strategy, the proposed algorithm improves the network throughput considerably and effectively balances the traffic load within the network, and all nodes in the network are utilized high efficiently. As long as γ ≥ α, the transmission performance can reach the maximum and remains unchanged for different α and γ, which ensures that the proposed routing protocol is high efficient and stable.

  7. Application of growing hierarchical SOM for visualisation of network forensics traffic data.

    Science.gov (United States)

    Palomo, E J; North, J; Elizondo, D; Luque, R M; Watson, T

    2012-08-01

    Digital investigation methods are becoming more and more important due to the proliferation of digital crimes and crimes involving digital evidence. Network forensics is a research area that gathers evidence by collecting and analysing network traffic data logs. This analysis can be a difficult process, especially because of the high variability of these attacks and large amount of data. Therefore, software tools that can help with these digital investigations are in great demand. In this paper, a novel approach to analysing and visualising network traffic data based on growing hierarchical self-organising maps (GHSOM) is presented. The self-organising map (SOM) has been shown to be successful for the analysis of highly-dimensional input data in data mining applications as well as for data visualisation in a more intuitive and understandable manner. However, the SOM has some problems related to its static topology and its inability to represent hierarchical relationships in the input data. The GHSOM tries to overcome these limitations by generating a hierarchical architecture that is automatically determined according to the input data and reflects the inherent hierarchical relationships among them. Moreover, the proposed GHSOM has been modified to correctly treat the qualitative features that are present in the traffic data in addition to the quantitative features. Experimental results show that this approach can be very useful for a better understanding of network traffic data, making it easier to search for evidence of attacks or anomalous behaviour in a network environment. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

    Directory of Open Access Journals (Sweden)

    Dalibor Uhlir

    2015-05-01

    Full Text Available Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node, SGSN (Serving GPRS Support Node, F5 or MSP (Multi Service Proxy. Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

  9. Evaluation Study of a Wireless Multimedia Traffic-Oriented Network Model

    Science.gov (United States)

    Vasiliadis, D. C.; Rizos, G. E.; Vassilakis, C.

    2008-11-01

    In this paper, a wireless multimedia traffic-oriented network scheme over a fourth generation system (4-G) is presented and analyzed. We conducted an extensive evaluation study for various mobility configurations in order to incorporate the behavior of the IEEE 802.11b standard over a test-bed wireless multimedia network model. In this context, the Quality of Services (QoS) over this network is vital for providing a reliable high-bandwidth platform for data-intensive sources like video streaming. Therefore, the main issues concerned in terms of QoS were the metrics for bandwidth of both dropped and lost packets and their mean packet delay under various traffic conditions. Finally, we used a generic distance-vector routing protocol which was based on an implementation of Distributed Bellman-Ford algorithm. The performance of the test-bed network model has been evaluated by using the simulation environment of NS-2.

  10. On the distribution of calls in a wireless network driven by fluid traffic

    NARCIS (Netherlands)

    Ule, Aljaz; Boucherie, Richardus J.

    2003-01-01

    This note develops a modelling approach for wireless networks driven by fluid traffic models. Introducing traffic sets that follow movement of subscribers, the wireless network with time-varying rates is transformed into a stationary network at these traffic sets, which yields that the distribution

  11. On the Distribution of CAlls in a Wireless Network driven by Fluid Traffic

    NARCIS (Netherlands)

    Ule, A.; Boucherie, R.J.

    2003-01-01

    This note develops a modelling approach for wireless networks driven by fluid traffic models. Introducing traffic sets that follow movement of subscribers, the wireless network with time-varying rates is transformed into a stationary network at these traffic sets, which yields that the distribution

  12. On the distribution of customers in a wireless network driven by fluid traffic

    NARCIS (Netherlands)

    Ule, A.; Boucherie, R.J.

    2000-01-01

    This note develops a modelling approach for wireless networks driven byfluid traffic models. Introducing traffic sets that follow movement ofsubscribers, the wireless network with time-varying rates is transformedinto a stationary network at these traffic sets, which yields that thedistribution of

  13. Traffic volume estimation using network interpolation techniques.

    Science.gov (United States)

    2013-12-01

    Kriging method is a frequently used interpolation methodology in geography, which enables estimations of unknown values at : certain places with the considerations of distances among locations. When it is used in transportation field, network distanc...

  14. Generic Traffic Descriptors in Managing Service Quality in BISDN/ATM Network

    Directory of Open Access Journals (Sweden)

    Ivan Bošnjak

    2002-03-01

    Full Text Available Traffic models for multiservice broadband networks differsignificantly regarding simple analytic models applicable intelephone traffic and circuit-switch network. The paper presentsa clear analysis of standardised traffic descriptors andquality parameters of the main services in BISDNIATM. Trafficdescriptors have been associated with the basic values andconcepts developed within generic traffic theory. Part systematisationof traffic parameters has been performed as basis for formalisedgeneralised description of parameters and effectivequality management of A TM services.

  15. Efficient traffic grooming in SONET/WDM BLSR Networks

    Energy Technology Data Exchange (ETDEWEB)

    Awwal, A S; Billah, A B; Wang, B

    2004-04-02

    In this paper, we study traffic grooming in SONET/WDM BLSR networks under the uniform all-to-all traffic model with an objective to reduce total network costs (wavelength and electronic multiplexing costs), in particular, to minimize the number of ADMs while using the optimal number of wavelengths. We derive a new tighter lower bound for the number of wavelengths when the number of nodes is a multiple of 4. We show that this lower bound is achievable. All previous ADM lower bounds except perhaps that in were derived under the assumption that the magnitude of the traffic streams (r) is one unit (r = 1) with respect to the wavelength capacity granularity g. We then derive new, more general and tighter lower bounds for the number of ADMs subject to that the optimal number of wavelengths is used, and propose heuristic algorithms (circle construction algorithm and circle grooming algorithm) that try to minimize the number of ADMs while using the optimal number of wavelengths in BLSR networks. Both the bounds and algorithms are applicable to any value of r and for different wavelength granularity g. Performance evaluation shows that wherever applicable, our lower bounds are at least as good as existing bounds and are much tighter than existing ones in many cases. Our proposed heuristic grooming algorithms perform very well with traffic streams of larger magnitude. The resulting number of ADMs required is very close to the corresponding lower bounds derived in this paper.

  16. Traffic Rules in Electronic Financial Transactions (EFT Networks

    Directory of Open Access Journals (Sweden)

    Vedran Batoš

    2002-01-01

    Full Text Available This paper presents the traffic rules in the EFT (ElectronicFinancial Transactions networks, based on the implementationof the solution called Gold-Net developed and implementedby Euronet Worldwide Inc. Following the traffic rulesin EFT networks, out of its worldwide experience, Gold-Netevolved a comprehensive and expandable EFT network solutiondesigned to meet an institution's needs today and in the future.It is an ITM (Integrated Transaction Management solution,modular and expandable, and consists of a comprehensiveEFT software modules with ATM and POS driving capabilities.The combination of ATM management and the onlineconnection form the intercept processing control module. Asthe marketplace grows, this solution ensures that an ente1prisemay position itself for future growth and expanded service offerings.

  17. Urban Traffic Signal System Control Structural Optimization Based on Network Analysis

    Directory of Open Access Journals (Sweden)

    Li Wang

    2013-01-01

    Full Text Available Advanced urban traffic signal control systems such as SCOOT and SCATS normally coordinate traffic network using multilevel hierarchical control mechanism. In this mechanism, several key intersections will be selected from traffic signal network and the network will be divided into different control subareas. Traditionally, key intersection selection and control subareas division are executed according to dynamic traffic counts and link length between intersections, which largely rely on traffic engineers’ experience. However, it omits important inherent characteristics of traffic network topology. In this paper, we will apply network analysis approach into these two aspects for traffic system control structure optimization. Firstly, the modified C-means clustering algorithm will be proposed to assess the importance of intersections in traffic network and furthermore determine the key intersections based on three indexes instead of merely on traffic counts in traditional methods. Secondly, the improved network community discovery method will be used to give more reasonable evidence in traffic control subarea division. Finally, to test the effectiveness of network analysis approach, a hardware-in-loop simulation environment composed of regional traffic control system, microsimulation software and signal controller hardware, will be built. Both traditional method and proposed approach will be implemented on simulation test bed to evaluate traffic operation performance indexes, for example, travel time, stop times, delay and average vehicle speed. Simulation results show that the proposed network analysis approach can improve the traffic control system operation performance effectively.

  18. Near real-time traffic routing

    Science.gov (United States)

    Yang, Chaowei (Inventor); Cao, Ying (Inventor); Xie, Jibo (Inventor); Zhou, Bin (Inventor)

    2012-01-01

    A near real-time physical transportation network routing system comprising: a traffic simulation computing grid and a dynamic traffic routing service computing grid. The traffic simulator produces traffic network travel time predictions for a physical transportation network using a traffic simulation model and common input data. The physical transportation network is divided into a multiple sections. Each section has a primary zone and a buffer zone. The traffic simulation computing grid includes multiple of traffic simulation computing nodes. The common input data includes static network characteristics, an origin-destination data table, dynamic traffic information data and historical traffic data. The dynamic traffic routing service computing grid includes multiple dynamic traffic routing computing nodes and generates traffic route(s) using the traffic network travel time predictions.

  19. The wireshark field guide analyzing and troubleshooting network traffic

    CERN Document Server

    Shimonski, Robert

    2013-01-01

    The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill

  20. Stream Traffic Communication in Packet Switched Networks,

    Science.gov (United States)

    1977-08-01

    Currently, the interconnection of surh networks [ McKe 74a] and the standardization of protocols [Pouz 75), (Hove 76) are each of considerable interest in the...clear that failures do occur in practice. Long term monitoring of the ARPANET [ McKe 74) shows a mean time between failures (MTBF) of 431 hours for Lines...D. C.) [ McKe 74) McKenzie, A. A. Letter to S. D. Crocker. 16 Janu- ary 1974. [ McKe 74a] McKenzie, A. M. "Some Computer Network Intercon- nection

  1. Traffic Based Optimization of Spectrum Sensing in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Changhua Yao

    2014-01-01

    Full Text Available We propose a more practical spectrum sensing optimization problem in cognitive radio networks (CRN, by considering the data traffic of second user (SU. Compared with most existing work, we do not assume that SU always has packets to transmit; instead, we use the actual data transmitted per second rather than the channel capacity as the achievable throughput, to reformulate the Sensing-Throughput Tradeoff problem. We mathematically analyze the problem of optimal sensing time to maximize the achievable throughput, based on the data traffic of SU. Our model is more general because the traditional Sensing-Throughput Tradeoff model can be seen as a special case of our model. We also prove that the throughput is a concave function of sensing time and there is only one optimal sensing time value which is determined by the data traffic. Simulation results show that the proposed approach outperforms existing methods.

  2. Emulation of realistic network traffic patterns on an eight-node data vortex interconnection network subsystem

    Science.gov (United States)

    Small, Benjamin A.; Shacham, Assaf; Bergman, Keren; Athikulwongse, Krit; Hawkins, Cory; Wills, D. Scott

    2004-11-01

    e demonstrate the feasibility of the data vortex interconnection network architecture for use in supercomputing by emulating realistic network traffic on an eight-node subnetwork. The evaluation workload uses memory accesses from the Barnes-Hut application in the SLPASH-2 parallel computing benchmark suite, which was extracted by using the M5 multiprocessor system simulator. We confirm that traffic is routed correctly and efficiently.

  3. Evaluation and Simulation of Common Video Conference Traffics in Communication Networks

    Directory of Open Access Journals (Sweden)

    Farhad faghani

    2014-01-01

    Full Text Available Multimedia traffics are the basic traffics in data communication networks. Especially Video conferences are the most desirable traffics in huge networks(wired, wireless, …. Traffic modeling can help us to evaluate the real networks. So, in order to have good services in data communication networks which provide multimedia services, QoS will be very important .In this research we tried to have an exact traffic model design and simulation to overcome QoS challenges. Also, we predict bandwidth by Kalman filter in Ethernet networks.

  4. Dynamic Network Traffic Flow Prediction Model based on Modified Quantum-Behaved Particle Swarm Optimization

    OpenAIRE

    Hongying Jin; Linhao Li

    2013-01-01

    This paper aims at effectively predicting the dynamic network traffic flow based on quantum-behaved particle swarm optimization algorithm. Firstly, the dynamic network traffic flow prediction problem is analyzed through formal description. Secondly, the structure of the network traffic flow prediction model is given. In this structure, Users can used a computer to start the traffic flow prediction process, and data collecting module can collect and return the data through the destination devi...

  5. Heterogeneous Cellular Networks with Spatio-Temporal Traffic: Delay Analysis and Scheduling

    OpenAIRE

    Zhong, Yi; Quek, Tony Q. S.; Ge, Xiaohu

    2016-01-01

    Emergence of new types of services has led to various traffic and diverse delay requirements in fifth generation (5G) wireless networks. Meeting diverse delay requirements is one of the most critical goals for the design of 5G wireless networks. Though the delay of point-to-point communications has been well investigated, the delay of multi-point to multi-point communications has not been thoroughly studied since it is a complicated function of all links in the network. In this work, we propo...

  6. Traffic sign recognition based on deep convolutional neural network

    Science.gov (United States)

    Yin, Shi-hao; Deng, Ji-cai; Zhang, Da-wei; Du, Jing-yuan

    2017-11-01

    Traffic sign recognition (TSR) is an important component of automated driving systems. It is a rather challenging task to design a high-performance classifier for the TSR system. In this paper, we propose a new method for TSR system based on deep convolutional neural network. In order to enhance the expression of the network, a novel structure (dubbed block-layer below) which combines network-in-network and residual connection is designed. Our network has 10 layers with parameters (block-layer seen as a single layer): the first seven are alternate convolutional layers and block-layers, and the remaining three are fully-connected layers. We train our TSR network on the German traffic sign recognition benchmark (GTSRB) dataset. To reduce overfitting, we perform data augmentation on the training images and employ a regularization method named "dropout". The activation function we employ in our network adopts scaled exponential linear units (SELUs), which can induce self-normalizing properties. To speed up the training, we use an efficient GPU to accelerate the convolutional operation. On the test dataset of GTSRB, we achieve the accuracy rate of 99.67%, exceeding the state-of-the-art results.

  7. Efficiency at maximum power of motor traffic on networks

    Science.gov (United States)

    Golubeva, N.; Imparato, A.

    2014-06-01

    We study motor traffic on Bethe networks subject to hard-core exclusion for both tightly coupled one-state machines and loosely coupled two-state machines that perform work against a constant load. In both cases we find an interaction-induced enhancement of the efficiency at maximum power (EMP) as compared to noninteracting motors. The EMP enhancement occurs for a wide range of network and single-motor parameters and is due to a change in the characteristic load-velocity relation caused by phase transitions in the system. Using a quantitative measure of the trade-off between the EMP enhancement and the corresponding loss in the maximum output power we identify parameter regimes where motor traffic systems operate efficiently at maximum power without a significant decrease in the maximum power output due to jamming effects.

  8. Analysis of Road Traffic Network Cascade Failures with Coupled Map Lattice Method

    Directory of Open Access Journals (Sweden)

    Yanan Zhang

    2015-01-01

    Full Text Available In recent years, there is growing literature concerning the cascading failure of network characteristics. The object of this paper is to investigate the cascade failures on road traffic network, considering the aeolotropism of road traffic network topology and road congestion dissipation in traffic flow. An improved coupled map lattice (CML model is proposed. Furthermore, in order to match the congestion dissipation, a recovery mechanism is put forward in this paper. With a real urban road traffic network in Beijing, the cascading failures are tested using different attack strategies, coupling strengths, external perturbations, and attacked road segment numbers. The impacts of different aspects on road traffic network are evaluated based on the simulation results. The findings confirmed the important roles that these characteristics played in the cascading failure propagation and dissipation on road traffic network. We hope these findings are helpful to find out the optimal road network topology and avoid cascading failure on road network.

  9. New Heuristic Algorithm for Dynamic Traffic in WDM Optical Networks

    Directory of Open Access Journals (Sweden)

    Arturo Benito Rodríguez Garcia

    2015-12-01

    Full Text Available The results and comparison of the simulation of a new heuristic algorithm called Snake One are presented. The comparison is made with three heuristic algorithms, Genetic Algorithms, Simulated Annealing, and Tabu Search, using blocking probability and network utilization as standard indicators. The simulation was made on the WDM NSFNET under dynamic traffic conditions. The results show a substantial decrease of blocking, but this causes a relative growth of network utilization. There are also load intervals at which its performance improves, decreasing the number of blocked requests.

  10. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Directory of Open Access Journals (Sweden)

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  11. A Network Traffic Prediction Model Based on Quantum-Behaved Particle Swarm Optimization Algorithm and Fuzzy Wavelet Neural Network

    OpenAIRE

    Kun Zhang; Zhao Hu; Xiao-Ting Gan; Jian-Bo Fang

    2016-01-01

    Due to the fact that the fluctuation of network traffic is affected by various factors, accurate prediction of network traffic is regarded as a challenging task of the time series prediction process. For this purpose, a novel prediction method of network traffic based on QPSO algorithm and fuzzy wavelet neural network is proposed in this paper. Firstly, quantum-behaved particle swarm optimization (QPSO) was introduced. Then, the structure and operation algorithms of WFNN are presented. The pa...

  12. Traffic Generator (TrafficGen) Version 1.4.2: Users Guide

    Science.gov (United States)

    2016-06-01

    specific ports and flows describing the start time, stop time, and specific traffic pattern to send. The variety of patterns MGEN offers enables the... traffic flows are represented by horizontal bars indicating the start time, stop time, and specific traffic pattern that will be sent. Traffic flows can...communication flows overlaid on a topographical map . TrafficGen interacts with SDT3D by sending node link commands via TCP or UDP to the IP address and port

  13. Ant colony optimization algorithm for signal coordination of oversaturated traffic networks.

    Science.gov (United States)

    2010-05-01

    Traffic congestion is a daily and growing problem of the modern era in mostly all major cities in the world. : Increasing traffic demand strains the existing transportation system, leading to oversaturated network : conditions, especially at peak hou...

  14. Heterogeneous delivering capability promotes traffic efficiency in complex networks

    Science.gov (United States)

    Zhu, Yan-Bo; Guan, Xiang-Min; Zhang, Xue-Jun

    2015-12-01

    Traffic is one of the most fundamental dynamical processes in networked systems. With the homogeneous delivery capability of nodes, the global dynamic routing strategy proposed by Ling et al. [Phys. Rev. E81, 016113 (2010)] adequately uses the dynamic information during the process and thus it can reach a quite high network capacity. In this paper, based on the global dynamic routing strategy, we proposed a heterogeneous delivery allocation strategy of nodes on scale-free networks with consideration of nodes degree. It is found that the network capacity as well as some other indexes reflecting transportation efficiency are further improved. Our work may be useful for the design of more efficient routing strategies in communication or transportation systems.

  15. Game theoretic analysis of congestion, safety and security networks, air traffic and emergency departments

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both way...

  16. A Unified Monitoring Framework for Energy Consumption and Network Traffic

    Directory of Open Access Journals (Sweden)

    Florentin Clouet

    2015-08-01

    Full Text Available Providing experimenters with deep insight about the effects of their experiments is a central feature of testbeds. In this paper, we describe Kwapi, a framework designed in the context of the Grid'5000 testbed, that unifies measurements for both energy consumption and network traffic. Because all measurements are taken at the infrastructure level (using sensors in power and network equipment, using this framework has no dependencies on the experiments themselves. Initially designed for OpenStack infrastructures, the Kwapi framework allows monitoring and reporting of energy consumption of distributed platforms. In this article, we present the extension of Kwapi to network monitoring, and outline how we overcame several challenges: scaling to a testbed the size of Grid'5000 while still providing high-frequency measurements; providing long-term loss-less storage of measurements; handling operational issues when deploying such a tool on a real infrastructure.

  17. An Architectural Concept for Intrusion Tolerance in Air Traffic Networks

    Science.gov (United States)

    Maddalon, Jeffrey M.; Miner, Paul S.

    2003-01-01

    The goal of an intrusion tolerant network is to continue to provide predictable and reliable communication in the presence of a limited num ber of compromised network components. The behavior of a compromised network component ranges from a node that no longer responds to a nod e that is under the control of a malicious entity that is actively tr ying to cause other nodes to fail. Most current data communication ne tworks do not include support for tolerating unconstrained misbehavio r of components in the network. However, the fault tolerance communit y has developed protocols that provide both predictable and reliable communication in the presence of the worst possible behavior of a limited number of nodes in the system. One may view a malicious entity in a communication network as a node that has failed and is behaving in an arbitrary manner. NASA/Langley Research Center has developed one such fault-tolerant computing platform called SPIDER (Scalable Proces sor-Independent Design for Electromagnetic Resilience). The protocols and interconnection mechanisms of SPIDER may be adapted to large-sca le, distributed communication networks such as would be required for future Air Traffic Management systems. The predictability and reliabi lity guarantees provided by the SPIDER protocols have been formally v erified. This analysis can be readily adapted to similar network stru ctures.

  18. A hybrid queuing strategy for network traffic on scale-free networks

    Science.gov (United States)

    Cai, Kai-Quan; Yu, Lu; Zhu, Yan-Bo

    2017-02-01

    In this paper, a hybrid queuing strategy (HQS) is proposed in traffic dynamics model on scale-free networks, where the delivery priority of packets in the queue is related to their distance to destination and the queue length of next jump. We compare the performance of the proposed HQS with that of the traditional first-in-first-out (FIFO) queuing strategy and the shortest-remaining-path-first (SRPF) queuing strategy proposed by Du et al. It is observed that the network traffic efficiency utilizing HQS with suitable value of parameter h can be further improved in the congestion state. Our work provides new insights for the understanding of the networked-traffic systems.

  19. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi...

  20. Flexible Next Generation Communication Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Demestichas

    2013-12-01

    Full Text Available The increasing bandwidth demand of the end-users makes the need for efficient resource management more compelling in next generation communication networks. Nowadays, the mobile communications scenery is characterized by the continuous growth of new services, the provision of which poses the need for higher data rates to guarantee satisfactory quality of experience for the end-users. The advent of evolved mobile communication networks (such as LTE - Long Term Evolution promises to encounter this demand by offering increased capacity, high data rates, seamless mobility and low latency. Nonetheless, during this evolutionary process, the backhaul part of mobile networks has received less attention. This paper discusses on ways for further evolution of mobile networks by rendering backhaul connectivity more flexible, robust and self-aware.

  1. EFFECTIVE BANDWIDTH FOR SELF-SIMILAR TRAFFIC IN ATM NETWORK

    Directory of Open Access Journals (Sweden)

    Linawati Linawati

    2009-05-01

    Full Text Available This paper proposes a new approach to estimate the effective bandwidth for self-similar traffic in ATM network. In this approach we use the tail distribution of queue length based on FBM model. This approach is derived from the inequalities for Mills’ ratio. Then a comparison with Norros and Trinh&Miki schemes are analysed. The results demonstrate reasonable agreement between numerical and simulation results and between all schemes. Their bandwidth estimation tends closer for CLP improvement.

  2. Traffic Congestion Evaluation and Signal Control Optimization Based on Wireless Sensor Networks: Model and Algorithms

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2012-01-01

    Full Text Available This paper presents the model and algorithms for traffic flow data monitoring and optimal traffic light control based on wireless sensor networks. Given the scenario that sensor nodes are sparsely deployed along the segments between signalized intersections, an analytical model is built using continuum traffic equation and develops the method to estimate traffic parameter with the scattered sensor data. Based on the traffic data and principle of traffic congestion formation, we introduce the congestion factor which can be used to evaluate the real-time traffic congestion status along the segment and to predict the subcritical state of traffic jams. The result is expected to support the timing phase optimization of traffic light control for the purpose of avoiding traffic congestion before its formation. We simulate the traffic monitoring based on the Mobile Century dataset and analyze the performance of traffic light control on VISSIM platform when congestion factor is introduced into the signal timing optimization model. The simulation result shows that this method can improve the spatial-temporal resolution of traffic data monitoring and evaluate traffic congestion status with high precision. It is helpful to remarkably alleviate urban traffic congestion and decrease the average traffic delays and maximum queue length.

  3. Discovering vesicle traffic network constraints by model checking.

    Science.gov (United States)

    Shukla, Ankit; Bhattacharyya, Arnab; Kuppusamy, Lakshmanan; Srivas, Mandayam; Thattai, Mukund

    2017-01-01

    A eukaryotic cell contains multiple membrane-bound compartments. Transport vesicles move cargo between these compartments, just as trucks move cargo between warehouses. These processes are regulated by specific molecular interactions, as summarized in the Rothman-Schekman-Sudhof model of vesicle traffic. The whole structure can be represented as a transport graph: each organelle is a node, and each vesicle route is a directed edge. What constraints must such a graph satisfy, if it is to represent a biologically realizable vesicle traffic network? Graph connectedness is an informative feature: 2-connectedness is necessary and sufficient for mass balance, but stronger conditions are required to ensure correct molecular specificity. Here we use Boolean satisfiability (SAT) and model checking as a framework to discover and verify graph constraints. The poor scalability of SAT model checkers often prevents their broad application. By exploiting the special structure of the problem, we scale our model checker to vesicle traffic systems with reasonably large numbers of molecules and compartments. This allows us to test a range of hypotheses about graph connectivity, which can later be proved in full generality by other methods.

  4. Control of Networked Traffic Flow Distribution - A Stochastic Distribution System Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Hong [Pacific Northwest National Laboratory (PNNL); Aziz, H M Abdul [ORNL; Young, Stan [National Renewable Energy Laboratory (NREL); Patil, Sagar [Pacific Northwest National Laboratory (PNNL)

    2017-10-01

    Networked traffic flow is a common scenario for urban transportation, where the distribution of vehicle queues either at controlled intersections or highway segments reflect the smoothness of the traffic flow in the network. At signalized intersections, the traffic queues are controlled by traffic signal control settings and effective traffic lights control would realize both smooth traffic flow and minimize fuel consumption. Funded by the Energy Efficient Mobility Systems (EEMS) program of the Vehicle Technologies Office of the US Department of Energy, we performed a preliminary investigation on the modelling and control framework in context of urban network of signalized intersections. In specific, we developed a recursive input-output traffic queueing models. The queue formation can be modeled as a stochastic process where the number of vehicles entering each intersection is a random number. Further, we proposed a preliminary B-Spline stochastic model for a one-way single-lane corridor traffic system based on theory of stochastic distribution control.. It has been shown that the developed stochastic model would provide the optimal probability density function (PDF) of the traffic queueing length as a dynamic function of the traffic signal setting parameters. Based upon such a stochastic distribution model, we have proposed a preliminary closed loop framework on stochastic distribution control for the traffic queueing system to make the traffic queueing length PDF follow a target PDF that potentially realizes the smooth traffic flow distribution in a concerned corridor.

  5. A Study of Video Teleconferencing Traffic on a TCP/IP Network

    National Research Council Canada - National Science Library

    Carvey, Harlan

    1997-01-01

    ... of traffic generated by a video teleconferencing application. This information is useful in formulating accurate models to support the various classes of traffic that will dominate the broadband ISDN (B-ISDN or ATM...

  6. Dynamic traffic grooming for port number optimization in WDM optical mesh networks

    Science.gov (United States)

    Huang, Jun; Zeng, Qingji; Liu, Jimin; Xiao, Pengcheng; Liu, Hua; Xiao, Shilin

    2004-04-01

    In this paper, the objective was optimizing the port number with dynamic traffic grooming of SDH/SONET WDM mesh networks to give useful referenced data to networks design and the cost control of networks. The performances of different path select routing algorithms were evaluated in WDM grooming networks by considering traffic of different bandwidth requests. Finally, the results were presented and compared with in distributed-controlled WDM mesh networks.

  7. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    Science.gov (United States)

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-01

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels. PMID:26784204

  8. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety

    Directory of Open Access Journals (Sweden)

    Angelica Reyes-Muñoz

    2016-01-01

    Full Text Available The emergence of Body Sensor Networks (BSNs constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1 an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving that may cause traffic accidents is presented; (2 A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3 as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  9. Integration of Body Sensor Networks and Vehicular Ad-hoc Networks for Traffic Safety.

    Science.gov (United States)

    Reyes-Muñoz, Angelica; Domingo, Mari Carmen; López-Trinidad, Marco Antonio; Delgado, José Luis

    2016-01-15

    The emergence of Body Sensor Networks (BSNs) constitutes a new and fast growing trend for the development of daily routine applications. However, in the case of heterogeneous BSNs integration with Vehicular ad hoc Networks (VANETs) a large number of difficulties remain, that must be solved, especially when talking about the detection of human state factors that impair the driving of motor vehicles. The main contributions of this investigation are principally three: (1) an exhaustive review of the current mechanisms to detect four basic physiological behavior states (drowsy, drunk, driving under emotional state disorders and distracted driving) that may cause traffic accidents is presented; (2) A middleware architecture is proposed. This architecture can communicate with the car dashboard, emergency services, vehicles belonging to the VANET and road or street facilities. This architecture seeks on the one hand to improve the car driving experience of the driver and on the other hand to extend security mechanisms for the surrounding individuals; and (3) as a proof of concept, an Android real-time attention low level detection application that runs in a next-generation smartphone is developed. The application features mechanisms that allow one to measure the degree of attention of a driver on the base of her/his EEG signals, establish wireless communication links via various standard wireless means, GPRS, Bluetooth and WiFi and issue alarms of critical low driver attention levels.

  10. Radio resource management for mobile traffic offloading in heterogeneous cellular networks

    CERN Document Server

    Wu, Yuan; Huang, Jianwei; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooper...

  11. Characterization of Background Traffic in Hybrid Network Simulation

    National Research Council Canada - National Science Library

    Lauwens, Ben; Scheers, Bart; Van de Capelle, Antoine

    2006-01-01

    .... Two approaches are common: discrete event simulation and fluid approximation. A discrete event simulation generates a huge amount of events for a full-blown battlefield communication network resulting in a very long runtime...

  12. Piezoelectric Energy Generation from Vehicle Traffic with Technoeconomic Analysis

    Directory of Open Access Journals (Sweden)

    Hiba Najini

    2017-01-01

    Full Text Available This paper presents a technical simulation based system to support the concept of generating energy from road traffic using piezoelectric materials. The simulation based system design replicates a real life system implementation. It investigates practicality and feasibility using a real-time simulation platform known as MATLAB-Simulink. The system design structure was proposed considering factors involved with the field of material sciences for piezoelectric generator modeling and field of power electronics for additional components in producing a realist outcome. It also ensures ease of vehicle performance, as this system utilizes energy source derived as kinetic energy released from vehicles into electrical power output, that is, obtained by harnessing kinetic energy due to strain of vehicles over asphalt road surface. Due to the real-time simulation platform, the system simulation predicts the effective global carbon footprint. In addition to evaluating technical viability, a technoeconomical business analysis provides a strategic perspective. By using the simulation based power generation results, an estimation of implementation cost and payback time in real life (for United Arab Emirates was derived, hence validating and predicting real-time economic outcome. This is followed by a comparative study with other sources of renewable energy based on levelized energy cost factor that justifies the performance of the proposed system over other renewable energy sources, in support of providing an economical solution on reducing global carbon footprint.

  13. Intelligent Controlling Simulation of Traffic Flow in a Small City Network

    Science.gov (United States)

    Fouladvand, M. Ebrahim; Shaebani, M. Reza; Sadjadi, Zeinab

    2004-11-01

    We propose a two dimensional probabilistic cellular automata for the description of traffic flow in a small city network composed of two intersections. The traffic in the network is controlled by a set of traffic lights which can be operated both in fixed-time and a traffic responsive manner. Vehicular dynamics is simulated and the total delay experienced by the traffic is evaluated within specified time intervals. We investigate both decentralized and centralized traffic responsive schemes and in particular discuss the implementation of the green-wave strategy. Our investigations prove that the network delay strongly depends on the signalisation strategy. We show that in some traffic conditions, the application of the green-wave scheme may destructively lead to the increment of the global delay.

  14. Generating random networks and graphs

    CERN Document Server

    Coolen, Ton; Roberts, Ekaterina

    2017-01-01

    This book supports researchers who need to generate random networks, or who are interested in the theoretical study of random graphs. The coverage includes exponential random graphs (where the targeted probability of each network appearing in the ensemble is specified), growth algorithms (i.e. preferential attachment and the stub-joining configuration model), special constructions (e.g. geometric graphs and Watts Strogatz models) and graphs on structured spaces (e.g. multiplex networks). The presentation aims to be a complete starting point, including details of both theory and implementation, as well as discussions of the main strengths and weaknesses of each approach. It includes extensive references for readers wishing to go further. The material is carefully structured to be accessible to researchers from all disciplines while also containing rigorous mathematical analysis (largely based on the techniques of statistical mechanics) to support those wishing to further develop or implement the theory of rand...

  15. Understanding characteristics in multivariate traffic flow time series from complex network structure

    Science.gov (United States)

    Yan, Ying; Zhang, Shen; Tang, Jinjun; Wang, Xiaofei

    2017-07-01

    Discovering dynamic characteristics in traffic flow is the significant step to design effective traffic managing and controlling strategy for relieving traffic congestion in urban cities. A new method based on complex network theory is proposed to study multivariate traffic flow time series. The data were collected from loop detectors on freeway during a year. In order to construct complex network from original traffic flow, a weighted Froenius norm is adopt to estimate similarity between multivariate time series, and Principal Component Analysis is implemented to determine the weights. We discuss how to select optimal critical threshold for networks at different hour in term of cumulative probability distribution of degree. Furthermore, two statistical properties of networks: normalized network structure entropy and cumulative probability of degree, are utilized to explore hourly variation in traffic flow. The results demonstrate these two statistical quantities express similar pattern to traffic flow parameters with morning and evening peak hours. Accordingly, we detect three traffic states: trough, peak and transitional hours, according to the correlation between two aforementioned properties. The classifying results of states can actually represent hourly fluctuation in traffic flow by analyzing annual average hourly values of traffic volume, occupancy and speed in corresponding hours.

  16. Model for Detection and Classification of DDoS Traffic Based on Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    D. Peraković

    2017-06-01

    Full Text Available Detection of DDoS (Distributed Denial of Service traffic is of great importance for the availability protection of services and other information and communication resources. The research presented in this paper shows the application of artificial neural networks in the development of detection and classification model for three types of DDoS attacks and legitimate network traffic. Simulation results of developed model showed accuracy of 95.6% in classification of pre-defined classes of traffic.

  17. An Improved ARIMA-Based Traffic Anomaly Detection Algorithm for Wireless Sensor Networks

    OpenAIRE

    Qin Yu; Lyu Jibin; Lirui Jiang

    2016-01-01

    Traffic anomaly detection is emerging as a necessary component as wireless networks gain popularity. In this paper, based on the improved Autoregressive Integrated Moving Average (ARIMA) model, we propose a traffic anomaly detection algorithm for wireless sensor networks (WSNs) which considers the particular imbalanced, nonstationary properties of the WSN traffic and the limited energy and computing capacity of the wireless sensors at the same time. We systematically analyze the characteristi...

  18. On the existence of efficient solutions to vector optimization problem of traffic flow on network

    Directory of Open Access Journals (Sweden)

    T. A. Bozhanova

    2009-09-01

    Full Text Available We studied traffic flow models in vector-valued optimization statement where the flow is controlled at the nodes of network. We considered the case when an objective mapping possesses a weakened property of upper semicontinuity and made no assumptions on the interior of the ordering cone. The sufficient conditions for the existence of efficient controls of the traffic problems are derived. The existence of efficient solutions of vector optimization problem for traffic flow on network are also proved.

  19. On the existence of efficient solutions to vector optimization problem of traffic flow on network

    OpenAIRE

    T. A. Bozhanova

    2009-01-01

    We studied traffic flow models in vector-valued optimization statement where the flow is controlled at the nodes of network. We considered the case when an objective mapping possesses a weakened property of upper semicontinuity and made no assumptions on the interior of the ordering cone. The sufficient conditions for the existence of efficient controls of the traffic problems are derived. The existence of efficient solutions of vector optimization problem for traffic flow on network are also...

  20. Traffic Engineering of Peer-Assisted Content Delivery Network with Content-Oriented Incentive Mechanism

    National Research Council Canada - National Science Library

    MAKI, Naoya; NISHIO, Takayuki; SHINKUMA, Ryoichi; MORI, Tatsuya; KAMIYAMA, Noriaki; KAWAHARA, Ryoichi; TAKAHASHI, Tatsuro

    2012-01-01

    In content services where people purchase and download large-volume contents, minimizing network traffic is crucial for the service provider and the network operator since they want to lower the cost...

  1. Feasibility of Optical Packet Switched WDM Networks without Packet Synchronisation Under Bursty Traffic Conditions

    DEFF Research Database (Denmark)

    Fjelde, Tina; Hansen, Peter Bukhave; Kloch, Allan

    1999-01-01

    We show that complex packet synchronisation may be avoided in optical packetswitched networks. Detailed traffic analysis demonstrates that packet lossratios of 1e-10 are feasible under bursty traffic conditions for a highcapacity network consisting of asynchronously operated add-drop switch nodes...

  2. Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies

    Directory of Open Access Journals (Sweden)

    Maciej Szmit

    2012-01-01

    Full Text Available The traditional Holt-Winters method is used, among others, in behavioural analysis of network traffic for development of adaptive models for various types of traffic in sample computer networks. This paper is devoted to the application of extended versions of these models for development of predicted templates and intruder detection.

  3. Usage of Modified Holt-Winters Method in the Anomaly Detection of Network Traffic: Case Studies

    OpenAIRE

    Maciej Szmit; Anna Szmit

    2012-01-01

    The traditional Holt-Winters method is used, among others, in behavioural analysis of network traffic for development of adaptive models for various types of traffic in sample computer networks. This paper is devoted to the application of extended versions of these models for development of predicted templates and intruder detection.

  4. Traffic Dimensioning and Performance Modeling of 4G LTE Networks

    Science.gov (United States)

    Ouyang, Ye

    2011-01-01

    Rapid changes in mobile techniques have always been evolutionary, and the deployment of 4G Long Term Evolution (LTE) networks will be the same. It will be another transition from Third Generation (3G) to Fourth Generation (4G) over a period of several years, as is the case still with the transition from Second Generation (2G) to 3G. As a result,…

  5. MULTI-LEVEL NETWORK RESILIENCE: TRAFFIC ANALYSIS, ANOMALY DETECTION AND SIMULATION

    Directory of Open Access Journals (Sweden)

    Angelos Marnerides

    2011-06-01

    Full Text Available Traffic analysis and anomaly detection have been extensively used to characterize network utilization as well as to identify abnormal network traffic such as malicious attacks. However, so far, techniques for traffic analysis and anomaly detection have been carried out independently, relying on mechanisms and algorithms either in edge or in core networks alone. In this paper we propose the notion of multi-level network resilience, in order to provide a more robust traffic analysis and anomaly detection architecture, combining mechanisms and algorithms operating in a coordinated fashion both in the edge and in the core networks. This work is motivated by the potential complementarities between the research being developed at IIT Madras and Lancaster University. In this paper we describe the current work being developed at IIT Madras and Lancaster on traffic analysis and anomaly detection, and outline the principles of a multi-level resilience architecture.

  6. Systematic Hybrid Network Scheduling for Multiple Traffic Classes with Host Timing and Phase Constraints

    Science.gov (United States)

    Varadarajan, Srivatsan (Inventor); Hall, Brendan (Inventor); Smithgall, William Todd (Inventor); Bonk, Ted (Inventor); DeLay, Benjamin F. (Inventor)

    2017-01-01

    Systems and methods for systematic hybrid network scheduling for multiple traffic classes with host timing and phase constraints are provided. In certain embodiments, a method of scheduling communications in a network comprises scheduling transmission of virtual links pertaining to a first traffic class on a global schedule to coordinate transmission of the virtual links pertaining to the first traffic class across all transmitting end stations on the global schedule; and scheduling transmission of each virtual link pertaining to a second traffic class on a local schedule of the respective transmitting end station from which each respective virtual link pertaining to the second traffic class is transmitted such that transmission of each virtual link pertaining to the second traffic class is coordinated only at the respective end station from which each respective virtual link pertaining to the second traffic class is transmitted.

  7. File Detection On Network Traffic Using Approximate Matching

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial.Within this paper we present a new technique for network trac analysis based on approximate matching (a.k.a fuzzy hashing which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive conguration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10-4 and 10-5 and an algorithm throughput of over 650 Mbit/s.

  8. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  9. Forecasting of Congestion in Traffic Neural Network Modelling Using Duffing Holmes Oscillator

    Science.gov (United States)

    Mrgole, Anamarija L.; Čelan, Marko; Mesarec, Beno

    2017-10-01

    Forecasting of congestion in traffic with Neural Network is an innovative and new process of identification and detection of chaotic features in time series analysis. With the use of Duffing Holmes Oscillator, we estimate the emergence of traffic flow congestion when the traffic load on a specific section of the road and in a specific time period is close to exceeding the capacity of the road infrastructure. The orientated model is validated in six locations with a specific requirement. The paper points out the issue of importance of traffic flow forecasting and simulations for preventing or rerouting possible short term traffic flow congestions.

  10. Impact of Bimodal Traffic on Latency in Optical Burst Switching Networks

    Directory of Open Access Journals (Sweden)

    Yuhua Chen

    2008-01-01

    Full Text Available This paper analyzes the impact of bimodal traffic composition on latency in optical burst switching networks. In particular, it studies the performance degradation to short-length packets caused by longer packets, both of which are part of a heterogeneous traffic model. The paper defines a customer satisfaction index for each of the classes of traffic, and a composite satisfaction index. The impact of higher overall utilization of the network as well as that of the ratio of the traffic mix on each of the customer satisfaction indices is specifically addressed.

  11. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  12. Assessing the Structural, Driver and Economic Impacts of Traffic Pole Mounted Wind Power Generator and Solar Panel Hybrid System

    Science.gov (United States)

    2012-06-01

    This project evaluates the physical and economic feasibility of using existing traffic infrastructure to mount wind power : generators. Some possible places to mount a light weight wind generator and solar panel hybrid system are: i) Traffic : signal...

  13. Comparative study about social support network among familiar physicians and traffic officers, México

    OpenAIRE

    Aranda B., Carolina; Instituto de Investigación en Salud Ocupacional, Universidad de Guadalajara, México; Torres L., Teresa; Instituto de Investigación en Salud Ocupacional, Universidad de Guadalajara, México; Salazar E., José; Instituto de Investigación en Salud Ocupacional, Universidad de Guadalajara, México; Pando M., Manuel; Instituto de Investigación en Salud Ocupacional, Universidad de Guadalajara, México; Aldrete R., María Guadalupe; Instituto de Investigación en Salud Ocupacional, Universidad de Guadalajara, México

    2014-01-01

    The social support is the process that occurs between people that make up the social network of a subject. Actions such as listening, estimate, assess, and so on, are behaviors that occur among individuals who make up the network. The aim of this study analyze the situation of social support and social support networks on family physicians and traffic agents of a city in Mexico. 197 physicians and 875 traffic agents participated voluntarily with an informed consent. The information was collec...

  14. Modelling Altitude Information in Two-Dimensional Traffic Networks for Electric Mobility Simulation

    OpenAIRE

    Diogo Santos; José Pinto; Rossetti, Rosaldo J. F.; Eugénio Oliveira

    2016-01-01

    Elevation data is important for electric vehicle simulation. However, traffic simulators are often two-dimensional and do not offer the capability of modelling urban networks taking elevation into account. Specifically, SUMO - Simulation of Urban Mobility, a popular microscopic traffic simulator, relies on networks previously modelled with elevation data as to provide this information during simulations. This work tackles the problem of adding elevation data to urban network models - particul...

  15. Next Generation Network Routing and Control Plane

    DEFF Research Database (Denmark)

    Fu, Rong

    proved, the dominating Border Gateway Protocol (BGP) cannot address all the issues that in inter-domain QoS routing. Thus a new protocol or network architecture has to be developed to be able to carry the inter-domain traffic with the QoS and TE consideration. Moreover, the current network control also......-domain. It is a routing component that flexibly supports path computation with different requirements, constraints and areas. It is also can be seen as part of NGN transport control plane, which integrates with the other functions. In the aspect of resource control, an NGN release Resource and Admission Control Functions...... of Service classes. Under the NGN context, there are plenty of proposals intending to accommodate the issues listed above. Path Computation Elements (PCE) proposed by IETF designs suitable network architecture that aiming at compute the QoS based paths for traffic transportation through intra- and inter...

  16. Learning Traffic as Images: A Deep Convolutional Neural Network for Large-Scale Transportation Network Speed Prediction.

    Science.gov (United States)

    Ma, Xiaolei; Dai, Zhuang; He, Zhengbing; Ma, Jihui; Wang, Yong; Wang, Yunpeng

    2017-04-10

    This paper proposes a convolutional neural network (CNN)-based method that learns traffic as images and predicts large-scale, network-wide traffic speed with a high accuracy. Spatiotemporal traffic dynamics are converted to images describing the time and space relations of traffic flow via a two-dimensional time-space matrix. A CNN is applied to the image following two consecutive steps: abstract traffic feature extraction and network-wide traffic speed prediction. The effectiveness of the proposed method is evaluated by taking two real-world transportation networks, the second ring road and north-east transportation network in Beijing, as examples, and comparing the method with four prevailing algorithms, namely, ordinary least squares, k-nearest neighbors, artificial neural network, and random forest, and three deep learning architectures, namely, stacked autoencoder, recurrent neural network, and long-short-term memory network. The results show that the proposed method outperforms other algorithms by an average accuracy improvement of 42.91% within an acceptable execution time. The CNN can train the model in a reasonable time and, thus, is suitable for large-scale transportation networks.

  17. Towards User-centric Video Transmission in Next Generation Mobile Networks

    OpenAIRE

    El Essaili, Ali

    2014-01-01

    The focus of this thesis is to design, implement and evaluate novel user-centric approaches for the distribution of the limited wireless network resources across multiple users in a mobile cell. The first part of this thesis is concerned with the uplink distribution of user-generated video content over fourth generation mobile networks. The second part explores the benefit of QoE-based traffic and resource management in the mobile network in the context of adaptive HTTP downlink video deliver...

  18. Traffic modeling in the integrated cellular ad hoc network system

    Science.gov (United States)

    Yamanaka, Sachiko; Shimohara, Katsunori

    2005-10-01

    We present the modeling and evaluation in the integrated cellular and ad hoc network system. The system is modeled using queueing theory and we derive some characteristic values. As regards a system model of two cells, M channels are assigned to each cell and a relay station is set in the overlapped area of two cells. New calls in cellA can be relayed to cellB if the channels in cellA are all busy and the mobile stations are in the covered area by a relay station. Handoff calls select the channels of the cell that the number of empty channels are more in the two cells. If the channels of the both cells are all busy, handoff calls can wait in a queue with the capacity Q while mobile stations are in the handoff area. However, so as not to make handoff calls possess channels prior to new calls, we manage it with the method being different from the other researches. This system is more flexible than cellular networks, the bias of traffic gets smaller and it leads to an efficient channel using. We model and evaluate our system by assuming that the dwelling time is distributed with non-exponential distribution as well as exponential one. In numerical results, we compare the characteristic values in our system with those in non-relaying system, see how the characteristic values are affected when the covered area by a relay station changes, and verify the effectiveness of our system.

  19. Understanding structure of urban traffic network based on spatial-temporal correlation analysis

    Science.gov (United States)

    Yang, Yanfang; Jia, Limin; Qin, Yong; Han, Shixiu; Dong, Honghui

    2017-08-01

    Understanding the structural characteristics of urban traffic network comprehensively can provide references for improving road utilization rate and alleviating traffic congestion. This paper focuses on the spatial-temporal correlations between different pairs of traffic series and proposes a complex network-based method of constructing the urban traffic network. In the network, the nodes represent road segments, and an edge between a pair of nodes is added depending on the result of significance test for the corresponding spatial-temporal correlation. Further, a modified PageRank algorithm, named the geographical weight-based PageRank algorithm (GWPA), is proposed to analyze the spatial distribution of important segments in the road network. Finally, experiments are conducted by using three kinds of traffic series collected from the urban road network in Beijing. Experimental results show that the urban traffic networks constructed by three traffic variables all indicate both small-world and scale-free characteristics. Compared with the results of PageRank algorithm, GWPA is proved to be valid in evaluating the importance of segments and identifying the important segments with small degree.

  20. Vehicular traffic flow through a series of signals with cycle time generated by a logistic map

    Science.gov (United States)

    Nagatani, Takashi; Sugiyama, Naoki

    2013-02-01

    We study the dynamical behavior of vehicular traffic through a series of traffic signals. The vehicular traffic is controlled with the use of the cycle time generated by a logistic map. Each signal changes periodically with a cycle time, and the cycle time varies from signal to signal. The nonlinear dynamic model of the vehicular motion is presented by a nonlinear map including the logistic map. The vehicular traffic exhibits very complex behavior on varying both the cycle time and the logistic-map parameter a. For a>3, the arrival time shows a linear dependence on the cycle time. Also, the dependence of vehicular motion on parameter a is clarified.

  1. Migration of optical core network to next generation networks - Carrier Grade Ethernet Optical Transport Network

    Science.gov (United States)

    Glamočanin, D.

    2017-05-01

    In order to maintain the continuity of the telecom operators’ network construction, while monitoring development needs, increasing customers’ demands and application of technological improvements, it is necessary to migrate optical transport core network to the next generation networks - Carrier Grade Ethernet Optical Transport Network (OTN CE). The primary objective of OTN CE is to realize an environment that is based solely on the switching in the optical domain, i.e. the realization of transparent optical networks and optical switching to the second layer of ISO / OSI model. The realization of such a network provides opportunities for further development of existing, but also technologically more demanding, new services. It is also a prerequisite to provide higher scalability, reliability, security and quality of QoS service, as well as prerequisites for the establishment of SLA (Service Level Agreement) for existing services, especially traffic in real time. This study aims to clarify the proposed model, which has the potential to be eventually adjusted in accordance with new scientific knowledge in this field as well as market requirements.

  2. Spatio-temporal propagation of traffic jams in urban traffic networks

    OpenAIRE

    Jiang, Yinan; Kang, Rui; Li, Daqing; Guo, Shengmin; Havlin, Shlomo

    2017-01-01

    Since the first reported traffic jam about a century ago, traffic congestion has been intensively studied with various methods ranging from macroscopic to microscopic viewpoint. However, due to the population growth and fast civilization, traffic congestion has become significantly worse not only leading to economic losses, but also causes environment damages. Without understanding of jams spatio-temporal propagation behavior in a city, it is impossible to develop efficient mitigation strateg...

  3. ENTVis: A Visual Analytic Tool for Entropy-Based Network Traffic Anomaly Detection.

    Science.gov (United States)

    Zhou, Fangfang; Huang, Wei; Zhao, Ying; Shi, Yang; Liang, Xing; Fan, Xiaoping

    2015-01-01

    Entropy-based traffic metrics have received substantial attention in network traffic anomaly detection because entropy can provide fine-grained metrics of traffic distribution characteristics. However, some practical issues--such as ambiguity, lack of detailed distribution information, and a large number of false positives--affect the application of entropy-based traffic anomaly detection. In this work, we introduce a visual analytic tool called ENTVis to help users understand entropy-based traffic metrics and achieve accurate traffic anomaly detection. ENTVis provides three coordinated views and rich interactions to support a coherent visual analysis on multiple perspectives: the timeline group view for perceiving situations and finding hints of anomalies, the Radviz view for clustering similar anomalies in a period, and the matrix view for understanding traffic distributions and diagnosing anomalies in detail. Several case studies have been performed to verify the usability and effectiveness of our method. A further evaluation was conducted via expert review.

  4. On the Use of Machine Learning for Identifying Botnet Network Traffic

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2016-01-01

    contemporary approaches use machine learning techniques for identifying malicious traffic. This paper presents a survey of contemporary botnet detection methods that rely on machine learning for identifying botnet network traffic. The paper provides a comprehensive overview on the existing scientific work thus...... contributing to the better understanding of capabilities, limitations and opportunities of using machine learning for identifying botnet traffic. Furthermore, the paper outlines possibilities for the future development of machine learning-based botnet detection systems....

  5. Alternative method of highway traffic safety analysis for developing countries using delphi technique and Bayesian network.

    Science.gov (United States)

    Mbakwe, Anthony C; Saka, Anthony A; Choi, Keechoo; Lee, Young-Jae

    2016-08-01

    Highway traffic accidents all over the world result in more than 1.3 million fatalities annually. An alarming number of these fatalities occurs in developing countries. There are many risk factors that are associated with frequent accidents, heavy loss of lives, and property damage in developing countries. Unfortunately, poor record keeping practices are very difficult obstacle to overcome in striving to obtain a near accurate casualty and safety data. In light of the fact that there are numerous accident causes, any attempts to curb the escalating death and injury rates in developing countries must include the identification of the primary accident causes. This paper, therefore, seeks to show that the Delphi Technique is a suitable alternative method that can be exploited in generating highway traffic accident data through which the major accident causes can be identified. In order to authenticate the technique used, Korea, a country that underwent similar problems when it was in its early stages of development in addition to the availability of excellent highway safety records in its database, is chosen and utilized for this purpose. Validation of the methodology confirms the technique is suitable for application in developing countries. Furthermore, the Delphi Technique, in combination with the Bayesian Network Model, is utilized in modeling highway traffic accidents and forecasting accident rates in the countries of research. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING

    Directory of Open Access Journals (Sweden)

    Parisa Bazmi

    2016-11-01

    Full Text Available Named Data Networking (NDN is a new Internet architecture which has been proposed to eliminate TCP/IP Internet architecture restrictions. This architecture is abstracting away the notion of host and working based on naming datagrams. However, one of the major challenges of NDN is supporting QoS-aware forwarding strategy so as to forward Interest packets intelligently over multiple paths based on the current network condition. In this paper, Neural Network (NN Based Traffic-aware Forwarding strategy (NNTF is introduced in order to determine an optimal path for Interest forwarding. NN is embedded in NDN routers to select next hop dynamically based on the path overload probability achieved from the NN. This solution is characterized by load balancing and QoS-awareness via monitoring the available path and forwarding data on the traffic-aware shortest path. The performance of NNTF is evaluated using ndnSIM which shows the efficiency of this scheme in terms of network QoS improvementof17.5% and 72% reduction in network delay and packet drop respectively.

  7. High-speed and high-fidelity system and method for collecting network traffic

    Science.gov (United States)

    Weigle, Eric H [Los Alamos, NM

    2010-08-24

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  8. Rapid Protoyping Software for Developing Next-Generation Air Traffic Management Algorithms Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Research on next-generation air traffic control systems are being conducted at several laboratories. Most of this work is being carried out using custom software. In...

  9. Rapid Protoyping Software for Developing Next-Generation Air Traffic Management Algorithms Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Research on next-generation air traffic management systems is being conducted at several laboratories using custom software. In order to provide a more uniform...

  10. Estimation of Carbon Dioxide Emissions Generated by Building and Traffic in Taichung City

    Directory of Open Access Journals (Sweden)

    Chou-Tsang Chang

    2018-01-01

    Full Text Available The emissions of carbon dioxide generated by urban traffic is generally reflected by urban size. In order to discuss the traffic volume generated in developed buildings and road crossings in a single urban block, with the metropolitan area in Taichung, Taiwan as an example, this study calculates the mutual relationship between the carbon dioxide generated by the traffic volume and building development scale, in order to research energy consumption and relevance. In this research, the entire-day traffic volume of an important road crossing is subject to statistical analysis to obtain the prediction formula of total passenger car units in the main road crossing within 24 h. Then, the total CO2 emissions generated by the traffic volume in the entire year is calculated according to the investigation data of peak traffic hours within 16 blocks and the influential factors of the development scale of 95 buildings are counted. Finally, this research found that there is a passenger car unit of 4.72 generated in each square meter of land in the urban block every day, 0.99 in each square meter of floor area in the building and the average annual total CO2 emissions of each passenger car unit is 41.4 kgCO2/yr. In addition, the basic information of an integrated road system and traffic volume is used to present a readable urban traffic hot map, which can calculate a distribution map of passenger car units within one day in Taichung. This research unit can be used to forecast the development scale of various buildings in future urban blocks, in order to provide an effective approach to estimate the carbon dioxide generated by the traffic volume.

  11. Traffic properties for stochastic routings on scale-free networks

    CERN Document Server

    Hayashi, Yukio

    2011-01-01

    For realistic scale-free networks, we investigate the traffic properties of stochastic routing inspired by a zero-range process known in statistical physics. By parameters $\\alpha$ and $\\delta$, this model controls degree-dependent hopping of packets and forwarding of packets with higher performance at more busy nodes. Through a theoretical analysis and numerical simulations, we derive the condition for the concentration of packets at a few hubs. In particular, we show that the optimal $\\alpha$ and $\\delta$ are involved in the trade-off between a detour path for $\\alpha 0$; In the low-performance regime at a small $\\delta$, the wandering path for $\\alpha 0$ and $\\alpha < 0$ is small, neither the wandering long path with short wait trapped at nodes ($\\alpha = -1$), nor the short hopping path with long wait trapped at hubs ($\\alpha = 1$) is advisable. A uniformly random walk ($\\alpha = 0$) yields slightly better performance. We also discuss the congestion phenomena in a more complicated situation with pack...

  12. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection

    Directory of Open Access Journals (Sweden)

    Gabriel Arquelau Pimenta Rodrigues

    2017-10-01

    Full Text Available Any network connected to the Internet is subject to cyber attacks. Strong security measures, forensic tools, and investigators contribute together to detect and mitigate those attacks, reducing the damages and enabling reestablishing the network to its normal operation, thus increasing the cybersecurity of the networked environment. This paper addresses the use of a forensic approach with Deep Packet Inspection to detect anomalies in the network traffic. As cyber attacks may occur on any layer of the TCP/IP networking model, Deep Packet Inspection is an effective way to reveal suspicious content in the headers or the payloads in any packet processing layer, excepting of course situations where the payload is encrypted. Although being efficient, this technique still faces big challenges. The contributions of this paper rely on the association of Deep Packet Inspection with forensics analysis to evaluate different attacks towards a Honeynet operating in a network laboratory at the University of Brasilia. In this perspective, this work could identify and map the content and behavior of attacks such as the Mirai botnet and brute-force attacks targeting various different network services. Obtained results demonstrate the behavior of automated attacks (such as worms and bots and non-automated attacks (brute-force conducted with different tools. The data collected and analyzed is then used to generate statistics of used usernames and passwords, IP and services distribution, among other elements. This paper also discusses the importance of network forensics and Chain of Custody procedures to conduct investigations and shows the effectiveness of the mentioned techniques in evaluating different attacks in networks.

  13. Minimal-Intrusion Traffic Monitoring And Analysis In Mission-Critical Communication Networks

    Directory of Open Access Journals (Sweden)

    Alberto Domingo Ajenjo

    2003-10-01

    Full Text Available A good knowledge of expected and actual traffic patterns is an essential tool for network planning, design and operation in deployed, mission-critical applications. This paper describes those needs, and explains the Traffic Monitoring and Analysis Platform (TMAP concept, as developed in support of NATO deployed military headquarters Communications and Information Systems. It shows how a TMAP was deployed to a real NATO exercise, to prove the concept and baseline the traffic needs per application, per user community and per time of day. Then, it analyses the obtained results and derives conclusions on how to integrate traffic monitoring and analysis platforms in future deployments.

  14. Entropy Based Analysis of DNS Query Traffic in the Campus Network

    Directory of Open Access Journals (Sweden)

    Dennis Arturo Ludeña Romaña

    2008-10-01

    Full Text Available We carried out the entropy based study on the DNS query traffic from the campus network in a university through January 1st, 2006 to March 31st, 2007. The results are summarized, as follows: (1 The source IP addresses- and query keyword-based entropies change symmetrically in the DNS query traffic from the outside of the campus network when detecting the spam bot activity on the campus network. On the other hand (2, the source IP addresses- and query keywordbased entropies change similarly each other when detecting big DNS query traffic caused by prescanning or distributed denial of service (DDoS attack from the campus network. Therefore, we can detect the spam bot and/or DDoS attack bot by only watching DNS query access traffic.

  15. Traffic Control Algorithm Offering Multi-Class Fairness in PON Based Access Networks

    Science.gov (United States)

    Okumura, Yasuyuki

    This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and UDP (User Datagram Protocol) traffic flows show that the algorithm increases the throughput of TCP, improves the fairness between the two protocols, and solves the congestion problem at the SNI.

  16. Self-control of traffic lights and vehicle flows in urban road networks

    Science.gov (United States)

    Lämmer, Stefan; Helbing, Dirk

    2008-04-01

    Based on fluid-dynamic and many-particle (car-following) simulations of traffic flows in (urban) networks, we study the problem of coordinating incompatible traffic flows at intersections. Inspired by the observation of self-organized oscillations of pedestrian flows at bottlenecks, we propose a self-organization approach to traffic light control. The problem can be treated as a multi-agent problem with interactions between vehicles and traffic lights. Specifically, our approach assumes a priority-based control of traffic lights by the vehicle flows themselves, taking into account short-sighted anticipation of vehicle flows and platoons. The considered local interactions lead to emergent coordination patterns such as 'green waves' and achieve an efficient, decentralized traffic light control. While the proposed self-control adapts flexibly to local flow conditions and often leads to non-cyclical switching patterns with changing service sequences of different traffic flows, an almost periodic service may evolve under certain conditions and suggests the existence of a spontaneous synchronization of traffic lights despite the varying delays due to variable vehicle queues and travel times. The self-organized traffic light control is based on an optimization and a stabilization rule, each of which performs poorly at high utilizations of the road network, while their proper combination reaches a superior performance. The result is a considerable reduction not only in the average travel times, but also of their variation. Similar control approaches could be applied to the coordination of logistic and production processes.

  17. Classification and Prediction of Traffic Flow Based on Real Data Using Neural Networks

    Science.gov (United States)

    Pamuła, Teresa

    2012-12-01

    This paper presents a method of classification of time series of traffic flow, on the section of the main road leading into the city of Gliwice. Video detectors recorded traffic volume data was used, covering the period of one year in 5-minute intervals - from June 2011 to May 2012. In order to classify the data a statistical analysis was performed, which resulted in the proposition of splitting the daily time series into four classes. The series were smoothed to obtain hourly flow rates. The classification was performed using neural networks with different structures and using a variable number of input data. The purpose of classification is the prediction of traffic flow rates in the afternoon basing on the morning traffic and the assessment of daily traffic volumes for a particular day of the week. The results can be utilized by intelligent urban traffic management systems.

  18. Optimization of a Traffic Control Scheme for a Post-Disaster Urban Road Network

    Directory of Open Access Journals (Sweden)

    Zengzhen Shao

    2017-12-01

    Full Text Available Traffic control of urban road networks during emergency rescues is conducive to rapid rescue in the affected areas. However, excessive control will lead to negative impacts on the normal traffic order. We propose a novel model to optimize the traffic control scheme during the post-disaster emergency rescue period named PD-TCM (post-disaster traffic control model. In this model, the vertex and edge betweenness indexes of urban road networks are introduced to evaluate the controllability of the road sections. The gravity field model is also used to adjust the travel time function of different road sections in the control and diverging domains. Experimental results demonstrate that the proposed model can obtain the optimal traffic control scheme efficiently, which gives it the ability to meet the demand of emergency rescues as well as reducing the disturbances caused by controls.

  19. A Network Traffic Prediction Model Based on Quantum-Behaved Particle Swarm Optimization Algorithm and Fuzzy Wavelet Neural Network

    Directory of Open Access Journals (Sweden)

    Kun Zhang

    2016-01-01

    Full Text Available Due to the fact that the fluctuation of network traffic is affected by various factors, accurate prediction of network traffic is regarded as a challenging task of the time series prediction process. For this purpose, a novel prediction method of network traffic based on QPSO algorithm and fuzzy wavelet neural network is proposed in this paper. Firstly, quantum-behaved particle swarm optimization (QPSO was introduced. Then, the structure and operation algorithms of WFNN are presented. The parameters of fuzzy wavelet neural network were optimized by QPSO algorithm. Finally, the QPSO-FWNN could be used in prediction of network traffic simulation successfully and evaluate the performance of different prediction models such as BP neural network, RBF neural network, fuzzy neural network, and FWNN-GA neural network. Simulation results show that QPSO-FWNN has a better precision and stability in calculation. At the same time, the QPSO-FWNN also has better generalization ability, and it has a broad prospect on application.

  20. Enabling Energy-Efficient and Backhaul-aware Next Generation Heterogeneous Networks

    OpenAIRE

    Prasad, Athul

    2015-01-01

    Heterogeneous networks have been firmly established as the direction in which next-generation cellular networks are evolving. We consider the dense deployment of small cells to provide enhanced capacity, while the macro cells provide wide area coverage. With the development of dual connectivity technology, deploying small cells on dedicated carriers has become an attractive option, with enhanced flexibility for splitting traffic within the network. The power consumption and latency requiremen...

  1. Analysis of harmful emissions generated by road traffic in the city of Zagreb and proposals of measures

    Directory of Open Access Journals (Sweden)

    Jasna GOLUBIĆ

    2013-01-01

    Full Text Available The total number of registered road motor vehicles in Croatia in 2008 was 2,021,936 out of which 20.5% were registered in the city of Zagreb. Due to improper engine operating conditions, relatively low speeds (below 80km/h, large number of vehicles, high percentage of defective vehicles, poor fuel quality, the highest effect on air pollution in the city of Zagreb is generated by road motor vehicles. If air pollution in the city is analyzed from 2001 to 2009, it may be concluded that the biggest problem lies in the pollution by nitrogen oxides, airborne particles and ground-level ozone, which means that taking these pollution parameters in consideration the air was of Category II, i.e. moderately polluted. The most endangered city areas are the industrial zones and traffic nodes. Numerous European cities have been undertaking activities in order to reduce air pollution, which include also the introduction of new standards for new vehicles, improvement of fuel quality, fuel and vehicle taxing, usage of alternative fuels, etc. The city of Zagreb is no exception and since the current traffic system has not been solved in an optimal manner and since there is a lot of room for improvements in technical, technological and ecological sense, this paper will analyze the impact of road traffic on air pollution and offer proposals of measures to establish a sustainable traffic system of the City of Zagreb. Some of the proposals for reducing the harmful emissions from road traffic in the city of Zagreb include: reconstruction of the road network (emphasis on intersections, introduction of the traffic-dependent control of light signalized intersections, usage of intelligent transport systems for guiding and better organization of traffic, “Park-and-ride” system, etc. The traffic system of the city of Zagreb can be optimized without the construction of new roads by introducing intelligent traffic control with possible organizational changes and

  2. Generative adversarial networks for brain lesion detection

    Science.gov (United States)

    Alex, Varghese; Safwan, K. P. Mohammed; Chennamsetty, Sai Saketh; Krishnamurthi, Ganapathy

    2017-02-01

    Manual segmentation of brain lesions from Magnetic Resonance Images (MRI) is cumbersome and introduces errors due to inter-rater variability. This paper introduces a semi-supervised technique for detection of brain lesion from MRI using Generative Adversarial Networks (GANs). GANs comprises of a Generator network and a Discriminator network which are trained simultaneously with the objective of one bettering the other. The networks were trained using non lesion patches (n=13,000) from 4 different MR sequences. The network was trained on BraTS dataset and patches were extracted from regions excluding tumor region. The Generator network generates data by modeling the underlying probability distribution of the training data, (PData). The Discriminator learns the posterior probability P (Label Data) by classifying training data and generated data as "Real" or "Fake" respectively. The Generator upon learning the joint distribution, produces images/patches such that the performance of the Discriminator on them are random, i.e. P (Label Data = GeneratedData) = 0.5. During testing, the Discriminator assigns posterior probability values close to 0.5 for patches from non lesion regions, while patches centered on lesion arise from a different distribution (PLesion) and hence are assigned lower posterior probability value by the Discriminator. On the test set (n=14), the proposed technique achieves whole tumor dice score of 0.69, sensitivity of 91% and specificity of 59%. Additionally the generator network was capable of generating non lesion patches from various MR sequences.

  3. Characterization of traffic-generated pollutants in Bucharest

    Energy Technology Data Exchange (ETDEWEB)

    Raducan, G. [University of Bucharest, Faculty of Physics, Department of Atmospheric Physics, Magurele, Bucharest (Romania)]. E-mail: gabi_raducan@yahoo.com; Stefan, S. [University of Bucharest, Faculty of Physics, Department of Atmospheric Physics, Magurele, Bucharest (Romania)

    2009-01-15

    European Union Council directive 96/62/EC on ambient air quality assessment and management requires the development of action plans for zones where the concentrations of pollutants in ambient air exceed limit values. In the urban areas the limit values are exceeded, especially due to the traffic. In this paper, we analyzed the temporal variability levels of concentration of NO{sub X}, O{sub 3} and SO{sub 2} in two street canyons. The distribution of concentrations proves that traffic is the most important source of NO{sub X}, this pollutant being emitted during running of the vehicle engines. The level of pollution within U2 street is 25% less than U1 street, even though the measured traffic within U2 street is 50% less than within U1 street. This happen because the streets geometry and locations are different. [Spanish] La directiva 96/62/EC del Consejo de la Union Europea sobre determinacion y manejo de la calidad del aire ambiental establece que deben existir planes de accion para las zonas donde la concentracion de contaminantes excede los valores limite. En las areas urbanas dichos valores limite se rebasan en especial debido al trafico. En este trabajo analizamos la variabilidad temporal de los niveles de concentracion de NO{sub X}, O{sub 3} y SO{sub 2} en dos canones urbanos. La distribucion de las concentraciones demuestra que el trafico es la fuente mas importante de NO{sub X}, contaminante que se emite por la operacion de los motores vehiculares. El nivel de contaminacion en la calle U2 es 25% menor que el de la calle U1, aun cuando el trafico cuantificado en la calle U2 es 50% menor que el de la U1. Esto se debe a que la geometria y la ubicacion de las calles es diferente.

  4. A Survey on Urban Traffic Management System Using Wireless Sensor Networks.

    Science.gov (United States)

    Nellore, Kapileswar; Hancke, Gerhard P

    2016-01-27

    Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  5. A Survey on Urban Traffic Management System Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kapileswar Nellore

    2016-01-01

    Full Text Available Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  6. Energy-Saving Mechanism in WDM/TDM-PON Based on Upstream Network Traffic

    Directory of Open Access Journals (Sweden)

    Paola Garfias

    2014-08-01

    Full Text Available One of the main challenges of Passive Optical Networks (PONs is the resource (bandwidth and wavelength management. Since it has been shown that access networks consume a significant part of the overall energy of the telecom networks, the resource management schemes should also consider energy minimization strategies. To sustain the increased bandwidth demand of emerging applications in the access section of the network, it is expected that next generation optical access networks will adopt the wavelength division/time division multiplexing (WDM/TDM technique to increase PONs capacity. Compared with traditional PONs, the architecture of a WDM/TDM-PON requires more transceivers/receivers, hence they are expected to consume more energy. In this paper, we focus on the energy minimization in WDM/TDM-PONs and we propose an energy-efficient Dynamic Bandwidth and Wavelength Allocation mechanism whose objective is to turn off, whenever possible, the unnecessary upstream traffic receivers at the Optical Line Terminal (OLT. We evaluate our mechanism in different scenarios and show that the proper use of upstream channels leads to relevant energy savings. Our proposed energy-saving mechanism is able to save energy at the OLT while maintaining the introduced penalties in terms of packet delay and cycle time within an acceptable range. We might highlight the benefits of our proposal as a mechanism that maximizes the channel utilization. Detailed implementation of the proposed algorithm is presented, and simulation results are reported to quantify energy savings and effects on network performance on different network scenarios.

  7. Low Cost Wireless Network Camera Sensors for Traffic Monitoring

    Science.gov (United States)

    2012-07-01

    Many freeways and arterials in major cities in Texas are presently equipped with video detection cameras to : collect data and help in traffic/incident management. In this study, carefully controlled experiments determined : the throughput and output...

  8. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  9. Energy-aware Traffic Engineering in Hybrid SDN/IP Backbone Networks

    OpenAIRE

    Wei, Yunkai; Zhang, XiaoNing; Xie, Lei; Leng, Supeng

    2016-01-01

    Software Defined Networking (SDN) can effectively improve the performance of traffic engineering and has promising application foreground in backbone networks. Therefore, new energy saving schemes must take SDN into account, which is extremely important considering the rapidly increasing energy consumption from Telecom and ISP networks. At the same time, the introduction of SDN in a current network must be incremental in most cases, for both technical and economic reasons. During this period,...

  10. Dynamic Traffic Congestion Simulation and Dissipation Control Based on Traffic Flow Theory Model and Neural Network Data Calibration Algorithm

    OpenAIRE

    Wang, Li; Lin, Shimin; Yang, Jingfeng; Zhang, Nanfeng; Yang, Ji; Li, Yong; Zhou, Handong; Yang, Feng; Li, Zhifu

    2017-01-01

    Traffic congestion is a common problem in many countries, especially in big cities. At present, China’s urban road traffic accidents occur frequently, the occurrence frequency is high, the accident causes traffic congestion, and accidents cause traffic congestion and vice versa. The occurrence of traffic accidents usually leads to the reduction of road traffic capacity and the formation of traffic bottlenecks, causing the traffic congestion. In this paper, the formation and propagation of tra...

  11. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  12. The Influence of Traffic Networks on the Supply-Demand Balance of Tourism: A Case Study of Jiangsu Province, China

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2014-01-01

    Full Text Available The purpose of this research is to address the impact of traffic networks on the supply-demand balance of tourism and to determine if it is necessary to incorporate the traffic flow data for nodes to determine the significant influences and impacts of traffic networks on tourism. For this purpose, a road network was established for Jiangsu province, and the topological parameters of this network and the tourism degree of coordination among each prefectural city were calculated as well. The results demonstrate that the inclusion of the spatial structure of the traffic network was not necessary for determining the supply-demand balance for tourism; thus, the collection of traffic flow data is required to perform further research. As a side result, it has been determined that the circuit routes are relatively absent from the Jiangsu traffic network, which might hinder tourism, and tourism resources are undersupplied to most prefectural cities in Jiangsu.

  13. Generating Attributed Networks with Communities

    National Research Council Canada - National Science Library

    Largeron, Christine; Mougel, Pierre-Nicolas; Rabbany, Reihaneh; Zaïane, Osmar R

    2015-01-01

    .... When nodes are described with a set of attributes we have an attributed network. Nodes and their relationships tend to naturally form into communities or clusters, and discovering these communities is paramount to many applications...

  14. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  15. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  16. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  17. CO-GENERATION AND OPERATING NETWORK CELLS

    DEFF Research Database (Denmark)

    Nielsen, John Eli

    2008-01-01

    In Denmark several thousands of generators are connected to the distribution system (10 kV and 0.4 kV). The production from these generators many times exceeds the load. The generators can be divided into two types, Wind turbines and CHP generators. These generators have one thing in common, the ...... concept in along these lines is the “Network Cell”....

  18. A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder

    Directory of Open Access Journals (Sweden)

    Xiaoling Tao

    2016-03-01

    Full Text Available Data fusion is usually performed prior to classification in order to reduce the input space. These dimensionality reduction techniques help to decline the complexity of the classification model and thus improve the classification performance. The traditional supervised methods demand labeled samples, and the current network traffic data mostly is not labeled. Thereby, better learners will be built by using both labeled and unlabeled data, than using each one alone. In this paper, a novel network traffic data fusion approach based on Fisher and deep auto-encoder (DFA-F-DAE is proposed to reduce the data dimensions and the complexity of computation. The experimental results show that the DFA-F-DAE improves the generalization ability of the three classification algorithms (J48, back propagation neural network (BPNN, and support vector machine (SVM by data dimensionality reduction. We found that the DFA-F-DAE remarkably improves the efficiency of big network traffic classification.

  19. An implementation of traffic light system using multi-hop Ad hoc networks

    KAUST Repository

    Ansari, Imran Shafique

    2009-08-01

    In ad hoc networks nodes cooperate with each other to form a temporary network without the aid of any centralized administration. No wired base station or infrastructure is supported, and each host communicates via radio packets. Each host must act as a router, since routes are mostly multi-hop, due to the limited power transmission set by government agencies, (e.g. the Federal Communication Commission (FCC), which is 1 Watt in Industrial Scientific and Medical (ISM) band. The natures of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance constraint. Therefore, radio resource and power management is an important issue of any wireless network. In this paper, a design for traffic light system employing ad hoc networks is proposed. The traffic light system runs automatically based on signals sent through a multi-hop ad hoc network of \\'n\\' number of nodes utilizing the Token Ring protocol, which is efficient for this application from the energy prospective. The experiment consists of a graphical user interface that simulates the traffic lights and laptops (which have wireless network adapters) are used to run the graphical user interface and are responsible for setting up the ad hoc network between them. The traffic light system has been implemented utilizing A Mesh Driver (which allows for more than one wireless device to be connected simultaneously) and Java-based client-server programs. © 2009 IEEE.

  20. NETWORK TRAFFIC FORCASTING IN INFORMATION-TELECOMMUNICATION SYSTEM OF PRYDNIPROVSK RAILWAYS BASED ON NEURO-FUZZY NETWORK

    Directory of Open Access Journals (Sweden)

    V. M. Pakhomovа

    2016-12-01

    Full Text Available Purpose. Continuous increase in network traffic in the information-telecommunication system (ITS of Prydniprovsk Railways leads to the need to determine the real-time network congestion and to control the data flows. One of the possible solutions is a method of forecasting the volume of network traffic (inbound and outbound using neural network technology that will prevent from server overload and improve the quality of services. Methodology. Analysis of current network traffic in ITS of Prydniprovsk Railways and preparation of sets: learning, test and validation ones was conducted as well as creation of neuro-fuzzy network (hybrid system in Matlab program and organization of the following phases on the appropriate sets: learning, testing, forecast adequacy analysis. Findings. For the fragment (Dnipropetrovsk – Kyiv in ITS of Prydniprovsk Railways we made a forecast (day ahead for volume of network traffic based on the hybrid system created in Matlab program; MAPE values are as follows: 6.9% for volume of inbound traffic; 7.7% for volume of outbound traffic. It was found that the average learning error of the hybrid system decreases in case of increase in: the number of inputs (from 2 to 4; the number of terms (from 2 to 5 of the input variable; learning sample power (from 20 to 100. A significant impact on the average learning error of the hybrid system is caused by the number of terms of its input variable. It was determined that the lowest value of the average learning error is provided by 4-input hybrid system, it ensures more accurate learning of the neuro-fuzzy network by the hybrid method. Originality. The work resulted in the dependences for the average hybrid system error of the network traffic volume forecasting for the fragment (Dnipropetrovsk-Kyiv in ITS Prydniprovsk Railways on: the number of its inputs, the number of input variable terms, the learning sample power for different learning methods. Practical value. Forecasting of

  1. Development of a Software Based Firewall System for Computer Network Traffic Control

    Directory of Open Access Journals (Sweden)

    Ikhajamgbe OYAKHILOME

    2009-12-01

    Full Text Available The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for hackers to sum access to an internal network, this pose great danger to the network and network resources. Our objective and major concern of network design was to build a secured network, based on software firewall that ensured the integrity and confidentiality of information on the network. We studied several mechanisms to achieve this; one of such mechanism is the implementation of firewall system as a network defence. Our developed firewall has the ability to determine which network traffic should be allowed in or out of the network. Part of our studied work was also channelled towards a comprehensive study of hardware firewall security system with the aim of developing this software based firewall system. Our software firewall goes a long way in protecting an internal network from external unauthorized traffic penetration. We included an anti virus software which is lacking in most firewalls.

  2. Optimal Traffic Allocation for Multi-Stream Aggregation in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    This paper investigates an optimal traffic rate allocation method for multi-stream aggregation over heterogeneous networks that deals with effective integration of two or more heterogeneous links for improved data throughput and enhanced quality of experience. The heterogeneity and the dynamic...... variations. Furthermore, services with different traffic characteristics in terms of quality of service requirements are considered. The simulation results show the advantages of our scheme with respect to efficient increase in data rate and delay performance compared to traditional schemes....

  3. Is CoV(t)-based Modeling Sufficient for Traffic Characterization in Network Links ?

    OpenAIRE

    Noirie, Ludovic; Post, Georg

    2008-01-01

    http://euronf.enst.fr/archive/164/EuroNFDeliverableDSEA641.pdf; International audience; For performance evaluation and dimensioning of packet-based networks, engineers need simple, efficient and realistic traffic models. The traffic volume on a packet link, observed at different time scales t, has previously been modeled as a stationary stochastic process based on the Coefficient of Variation CoV(t). In this paper we try to supply the missing information about the shape of the distribution fu...

  4. Generation of Source Data for Experiments with Network Attack Detection Software

    Science.gov (United States)

    Kotenko, Igor; Chechulin, Andrey; Branitskiy, Alexander

    2017-03-01

    The paper suggests a new approach for traffic generation and the architecture of the software tool for evaluation of attack detection and response mechanisms. To assess the proposed approach the automatic network attack detection and response mechanism Threshold Random Walk (TRW) was chosen and implemented. The results of evaluation of this mechanism by the proposed software tool are presented.

  5. A network centrality measure framework for analyzing urban traffic flow: A case study of Wuhan, China

    Science.gov (United States)

    Zhao, Shuangming; Zhao, Pengxiang; Cui, Yunfan

    2017-07-01

    In this paper, we propose an improved network centrality measure framework that takes into account both the topological characteristics and the geometric properties of a road network in order to analyze urban traffic flow in relation to different modes: intersection, road, and community, which correspond to point mode, line mode, and area mode respectively. Degree, betweenness, and PageRank centralities are selected as the analysis measures, and GPS-enabled taxi trajectory data is used to evaluate urban traffic flow. The results show that the mean value of the correlation coefficients between the modified degree, the betweenness, and the PageRank centralities and the traffic flow in all periods are higher than the mean value of the correlation coefficients between the conventional degree, the betweenness, the PageRank centralities and the traffic flow at different modes; this indicates that the modified measurements, for analyzing traffic flow, are superior to conventional centrality measurements. This study helps to shed light into the understanding of urban traffic flow in relation to different modes from the perspective of complex networks.

  6. Sensitivity Analysis of Wavelet Neural Network Model for Short-Term Traffic Volume Prediction

    Directory of Open Access Journals (Sweden)

    Jinxing Shen

    2013-01-01

    Full Text Available In order to achieve a more accurate and robust traffic volume prediction model, the sensitivity of wavelet neural network model (WNNM is analyzed in this study. Based on real loop detector data which is provided by traffic police detachment of Maanshan, WNNM is discussed with different numbers of input neurons, different number of hidden neurons, and traffic volume for different time intervals. The test results show that the performance of WNNM depends heavily on network parameters and time interval of traffic volume. In addition, the WNNM with 4 input neurons and 6 hidden neurons is the optimal predictor with more accuracy, stability, and adaptability. At the same time, a much better prediction record will be achieved with the time interval of traffic volume are 15 minutes. In addition, the optimized WNNM is compared with the widely used back-propagation neural network (BPNN. The comparison results indicated that WNNM produce much lower values of MAE, MAPE, and VAPE than BPNN, which proves that WNNM performs better on short-term traffic volume prediction.

  7. The improved degree of urban road traffic network: A case study of Xiamen, China

    Science.gov (United States)

    Wang, Shiguang; Zheng, Lili; Yu, Dexin

    2017-03-01

    The complex network theory is applied to the study of urban road traffic network topology, and we constructed a new measure to characterize an urban road network. It is inspiring to quantify the interaction more appropriately between nodes in complex networks, especially in the field of traffic. The measure takes into account properties of lanes (e.g. number of lanes, width, traffic direction). As much, it is a more comprehensive measure in comparison to previous network measures. It can be used to grasp the features of urban street network more clearly. We applied this measure to the road network in Xiamen, China. Based on a standard method from statistical physics, we examined in more detail the distribution of this new measure and found that (1) due to the limitation of space geographic attributes, traditional research conclusions acquired by using the original definition of degree to study the primal approach modeled urban street network are not very persuasive; (2) both of the direction of the network connection and the degree's odd or even classifications need to be analyzed specifically; (3) the improved degree distribution presents obvious hierarchy, and hierarchical values conform to the power-law distribution, and correlation of our new measure shows some significant segmentation of the urban road network.

  8. RESEARCH OF ENGINEERING TRAFFIC IN COMPUTER UZ NETWORK USING MPLS TE TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    V. M. Pakhomovа

    2014-12-01

    Full Text Available Purpose. In railway transport of Ukraine one requires the use of computer networks of different technologies: Ethernet, Token Bus, Token Ring, FDDI and others. In combined computer networks on the railway transport it is necessary to use packet switching technology in multiprotocol networks MPLS (MultiProtocol Label Switching more effectively. They are based on the use of tags. Packet network must transmit different types of traffic with a given quality of service. The purpose of the research is development a methodology for determining the sequence of destination flows for the considered fragment of computer network of UZ. Methodology. When optimizing traffic management in MPLS networks has the important role of technology traffic engineering (Traffic Engineering, TE. The main mechanism of TE in MPLS is the use of unidirectional tunnels (MPLS TE tunnel to specify the path of the specified traffic. The mathematical model of the problem of traffic engineering in computer network of UZ technology MPLS TE was made. Computer UZ network is represented with the directed graph, their vertices are routers of computer network, and each arc simulates communication between nodes. As an optimization criterion serves the minimum value of the maximum utilization of the TE-tunnel. Findings. The six options destination flows were determined; rational sequence of flows was found, at which the maximum utilization of TE-tunnels considered a simplified fragment of a computer UZ network does not exceed 0.5. Originality. The method of solving the problem of traffic engineering in Multiprotocol network UZ technology MPLS TE was proposed; for different classes its own way is laid, depending on the bandwidth and channel loading. Practical value. Ability to determine the values of the maximum coefficient of use of TE-tunnels in computer UZ networks based on developed software model «TraffEng». The input parameters of the model: number of routers, channel capacity, the

  9. Next Generation Reliable Transport Networks

    DEFF Research Database (Denmark)

    Zhang, Jiang

    of criticality and security, there are certain physical or logical segregation requirements between the avionic systems. Such segregations can be implemented on the proposed avionic networks with different hierarchies. In order to fulfill the segregation requirements, a tailored heuristic approach for solving...... the wavelength and fiber assignment problem is proposed and implemented for avionic optical transport networks. Simulation results give out resource consumptions and prove the efficiency of the proposed mechanisms. Finally, a Home Environment Service Knowledge Management system is proposed. Through ontology...... technologies, a knowledge base is constructed to represent the whole information of a home environment. By applying the reasoner tool, the proposed system manages to keep the consistency in a home environment and helps all software configure and update procedures across multiple vendors....

  10. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions in ...

  11. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  12. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect of...

  13. Trunk Reservation in Multi-service Networks with BPP Traffic

    DEFF Research Database (Denmark)

    Zheng, H.; Zhang, Qi; Iversen, Villy Bæk

    2006-01-01

    algorithm which allows for calculation of individual performance measures for each service, in particular the traffic congestion. The algorithm is numerically robust and requires a minimum of computer memory and computing time. The approximation is good when the services have equal mean service times....

  14. Integrated Control of Mixed Traffic Networks using Model Predictive Control

    NARCIS (Netherlands)

    Van den Berg, M.

    2010-01-01

    Motivation The growth of our road infrastructure cannot keep up with the growing mobility of people, and the corresponding increase in traffic demand. This results in daily congestion on the freeways. It is an illusion that the problem of congestion can be solved completely within a few years, but

  15. Traffic-aware Elastic Optical Networks to leverage Energy Savings

    DEFF Research Database (Denmark)

    Turus, Ioan; Fagertun, Anna Manolova; Dittmann, Lars

    2014-01-01

    Because of the static nature of the deployed optical networks, large energy wastage is experienced today in production networks such as Telecom networks . With power-adaptive optical interfaces and suitable grooming procedures, we propose the design of more energy efficient transport networks. Op...

  16. Design Issues for Traffic Management for the ATM UBR + Service for TCP Over Satellite Networks

    Science.gov (United States)

    Jain, Raj

    1999-01-01

    This project was a comprehensive research program for developing techniques for improving the performance of Internet protocols over Asynchronous Transfer Mode (ATM) based satellite networks. Among the service categories provided by ATM networks, the most commonly used category for data traffic is the unspecified bit rate (UBR) service. UBR allows sources to send data into the network without any feedback control. The project resulted in the numerous ATM Forum contributions and papers.

  17. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  18. Local control of traffic flows in networks: Self-organisation of phase synchronised dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Laemmer, Stefan; Donner, Reik [TU Dresden, Andreas-Schubert-Str. 23, 01062 Dresden (Germany); Helbing, Dirk [ETH Zuerich, Universitaetstr. 41, 8092 Zuerich (Switzerland)

    2008-07-01

    The effective control of flows in urban traffic networks is a subject of broad economic interest. During the last years, efforts have been made to develop decentralised control strategies that take only the actual state of present traffic conditions into account. In this contribution, we introduce a permeability model for the local control of conflicting material flows on networks, which incorporates a self-organisation of the flows. The dynamics of our model is studied under different situations, with a special emphasis on the development of a phase synchronised switching behaviour at the nodes of the traffic network. In order to improve the potential applicability of our concept, we discuss how a proper demand anticipation and the definition of a priority function can be used to further optimise the performance of the presented strategy.

  19. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  20. A Novel Biobjective Risk-Based Model for Stochastic Air Traffic Network Flow Optimization Problem.

    Science.gov (United States)

    Cai, Kaiquan; Jia, Yaoguang; Zhu, Yanbo; Xiao, Mingming

    2015-01-01

    Network-wide air traffic flow management (ATFM) is an effective way to alleviate demand-capacity imbalances globally and thereafter reduce airspace congestion and flight delays. The conventional ATFM models assume the capacities of airports or airspace sectors are all predetermined. However, the capacity uncertainties due to the dynamics of convective weather may make the deterministic ATFM measures impractical. This paper investigates the stochastic air traffic network flow optimization (SATNFO) problem, which is formulated as a weighted biobjective 0-1 integer programming model. In order to evaluate the effect of capacity uncertainties on ATFM, the operational risk is modeled via probabilistic risk assessment and introduced as an extra objective in SATNFO problem. Computation experiments using real-world air traffic network data associated with simulated weather data show that presented model has far less constraints compared to stochastic model with nonanticipative constraints, which means our proposed model reduces the computation complexity.

  1. Estimating Urban Traffic Patterns through Probabilistic Interconnectivity of Road Network Junctions.

    Directory of Open Access Journals (Sweden)

    Ed Manley

    Full Text Available The emergence of large, fine-grained mobility datasets offers significant opportunities for the development and application of new methodologies for transportation analysis. In this paper, the link between routing behaviour and traffic patterns in urban areas is examined, introducing a method to derive estimates of traffic patterns from a large collection of fine-grained routing data. Using this dataset, the interconnectivity between road network junctions is extracted in the form of a Markov chain. This representation encodes the probability of the successive usage of adjacent road junctions, encoding routes as flows between decision points rather than flows along road segments. This network of functional interactions is then integrated within a modified Markov chain Monte Carlo (MCMC framework, adapted for the estimation of urban traffic patterns. As part of this approach, the data-derived links between major junctions influence the movement of directed random walks executed across the network to model origin-destination journeys. The simulation process yields estimates of traffic distribution across the road network. The paper presents an implementation of the modified MCMC approach for London, United Kingdom, building an MCMC model based on a dataset of nearly 700000 minicab routes. Validation of the approach clarifies how each element of the MCMC framework contributes to junction prediction performance, and finds promising results in relation to the estimation of junction choice and minicab traffic distribution. The paper concludes by summarising the potential for the development and extension of this approach to the wider urban modelling domain.

  2. Modelling Altitude Information in Two-Dimensional Traffic Networks for Electric Mobility Simulation

    Directory of Open Access Journals (Sweden)

    Diogo Santos

    2016-06-01

    Full Text Available Elevation data is important for electric vehicle simulation. However, traffic simulators are often two-dimensional and do not offer the capability of modelling urban networks taking elevation into account. Specifically, SUMO - Simulation of Urban Mobility, a popular microscopic traffic simulator, relies on networks previously modelled with elevation data as to provide this information during simulations. This work tackles the problem of adding elevation data to urban network models - particularly for the case of the Porto urban network, in Portugal. With this goal in mind, a comparison between different altitude information retrieval approaches is made and a simple tool to annotate network models with altitude data is proposed. The work starts by describing the methodological approach followed during research and development, then describing and analysing its main findings. This description includes an in-depth explanation of the proposed tool. Lastly, this work reviews some related work to the subject.

  3. PLUS highway network analysis: Case of in-coming traffic burden in 2013

    Science.gov (United States)

    Asrah, Norhaidah Mohd; Djauhari, Maman Abdurachman; Mohamad, Ismail

    2017-05-01

    PLUS highway is the largest concessionary in Malaysia. The study on PLUS highway development, in order to overcome the demand for efficient road transportation, is crucial. If the highways have better interconnected network, it will help the economic activities such as trade to increase. If economic activities are increasing, the benefit will come to the people and state. In its turn, it will help the leaders to plan and conduct national development program. In this paper, network analysis approach will be used to study the in-coming traffic burden during the year of 2013. The highway network linking all the toll plazas is a dynamic network. The objective of this study is to learn and understand about highway network in terms of the in-coming traffic burden entering to each toll plazas along PLUS highway. For this purpose, the filtered network topology based on the forest of all possible minimum spanning trees is used. The in-coming traffic burden of a city is represented by the number of cars passing through the corresponding toll plaza. To interpret the filtered network, centrality measures such as degree centrality, betweenness centrality, closeness centrality, eigenvector centrality are used. An overall centrality will be proposed if those four measures are assumed to have the same role. Based on the results, some suggestions and recommendations for PLUS highway network development will be delivered to PLUS highway management.

  4. Analysis and Classification of Traffic in Wireless Sensor Network

    Science.gov (United States)

    2007-03-01

    length can be directly extracted from the Xsniffer output under the column “Len.” In the self-similarity discussion in Chapter V, two Mathcad scripts...processed through a Mathcad script as described in Chapter III to determine if the traffic is self-similar. 1. Direct Connection to Base Setup...analyzed using two Mathcad scripts for self- similarity characteristics. Variance time plots were constructed for both packet length and interarrival

  5. Communication and Networking Techniques for Traffic Safety Systems

    OpenAIRE

    Chisalita, Ioan

    2006-01-01

    Accident statistics indicate that every year a significant number of casualties and extensive property losses occur due to traffic accidents. Consequently, efforts are directed towards developing passive and active safety systems that help reduce the severity of crashes, or prevent vehicles from colliding with one another. To develop these systems, technologies such as sensor systems, computer vision and vehicular communication have been proposed. Safety vehicular communication is defined as ...

  6. Effect and Analysis of Sustainable Cell Rate using MPEG video Traffic in ATM Networks

    Directory of Open Access Journals (Sweden)

    Sakshi Kaushal

    2006-04-01

    Full Text Available The broadband networks inhibit the capability to carry multiple types of traffic – voice, video and data, but these services need to be controlled according to the traffic contract negotiated at the time of the connection to maintain desired Quality of service. Such control techniques use traffic descriptors to evaluate its performance and effectiveness. In case of Variable Bit Rate (VBR services, Peak Cell Rate (PCR and its Cell Delay Variation Tolerance (CDVTPCR are mandatory descriptors. In addition to these, ATM Forum proposed Sustainable Cell Rate (SCR and its Cell delay variation tolerance (CDVTSCR. In this paper, we evaluated the impact of specific SCR and CDVTSCR values on the Usage Parameter Control (UPC performance in case of measured MPEG traffic for improving the efficiency

  7. Predicting Traffic Flow in Local Area Networks by the Largest Lyapunov Exponent

    Directory of Open Access Journals (Sweden)

    Yan Liu

    2016-01-01

    Full Text Available The dynamics of network traffic are complex and nonlinear, and chaotic behaviors and their prediction, which play an important role in local area networks (LANs, are studied in detail, using the largest Lyapunov exponent. With the introduction of phase space reconstruction based on the time sequence, the high-dimensional traffic is projected onto the low dimension reconstructed phase space, and a reduced dynamic system is obtained from the dynamic system viewpoint. Then, a numerical method for computing the largest Lyapunov exponent of the low-dimensional dynamic system is presented. Further, the longest predictable time, which is related to chaotic behaviors in the system, is studied using the largest Lyapunov exponent, and the Wolf method is used to predict the evolution of the traffic in a local area network by both Dot and Interval predictions, and a reliable result is obtained by the presented method. As the conclusion, the results show that the largest Lyapunov exponent can be used to describe the sensitivity of the trajectory in the reconstructed phase space to the initial values. Moreover, Dot Prediction can effectively predict the flow burst. The numerical simulation also shows that the presented method is feasible and efficient for predicting the complex dynamic behaviors in LAN traffic, especially for congestion and attack in networks, which are the main two complex phenomena behaving as chaos in networks.

  8. VBR video traffic models

    CERN Document Server

    Tanwir, Savera

    2014-01-01

    There has been a phenomenal growth in video applications over the past few years. An accurate traffic model of Variable Bit Rate (VBR) video is necessary for performance evaluation of a network design and for generating synthetic traffic that can be used for benchmarking a network. A large number of models for VBR video traffic have been proposed in the literature for different types of video in the past 20 years. Here, the authors have classified and surveyed these models and have also evaluated the models for H.264 AVC and MVC encoded video and discussed their findings.

  9. Best response game of traffic on road network of non-signalized intersections

    Science.gov (United States)

    Yao, Wang; Jia, Ning; Zhong, Shiquan; Li, Liying

    2018-01-01

    This paper studies the traffic flow in a grid road network with non-signalized intersections. The nature of the drivers in the network is simulated such that they play an iterative snowdrift game with other drivers. A cellular automata model is applied to study the characteristics of the traffic flow and the evolution of the behaviour of the drivers during the game. The drivers use best-response as their strategy to update rules. Three major findings are revealed. First, the cooperation rate in simulation experiences staircase-shaped drop as cost to benefit ratio r increases, and cooperation rate can be derived analytically as a function of cost to benefit ratio r. Second, we find that higher cooperation rate corresponds to higher average speed, lower density and higher flow. This reveals that defectors deteriorate the efficiency of traffic on non-signalized intersections. Third, the system experiences more randomness when the density is low because the drivers will not have much opportunity to update strategy when the density is low. These findings help to show how the strategy of drivers in a traffic network evolves and how their interactions influence the overall performance of the traffic system.

  10. Visualization of Traffic Accidents

    Science.gov (United States)

    Wang, Jie; Shen, Yuzhong; Khattak, Asad

    2010-01-01

    Traffic accidents have tremendous impact on society. Annually approximately 6.4 million vehicle accidents are reported by police in the US and nearly half of them result in catastrophic injuries. Visualizations of traffic accidents using geographic information systems (GIS) greatly facilitate handling and analysis of traffic accidents in many aspects. Environmental Systems Research Institute (ESRI), Inc. is the world leader in GIS research and development. ArcGIS, a software package developed by ESRI, has the capabilities to display events associated with a road network, such as accident locations, and pavement quality. But when event locations related to a road network are processed, the existing algorithm used by ArcGIS does not utilize all the information related to the routes of the road network and produces erroneous visualization results of event locations. This software bug causes serious problems for applications in which accurate location information is critical for emergency responses, such as traffic accidents. This paper aims to address this problem and proposes an improved method that utilizes all relevant information of traffic accidents, namely, route number, direction, and mile post, and extracts correct event locations for accurate traffic accident visualization and analysis. The proposed method generates a new shape file for traffic accidents and displays them on top of the existing road network in ArcGIS. Visualization of traffic accidents along Hampton Roads Bridge Tunnel is included to demonstrate the effectiveness of the proposed method.

  11. Generating confidence intervals on biological networks

    Directory of Open Access Journals (Sweden)

    Stumpf Michael PH

    2007-11-01

    Full Text Available Abstract Background In the analysis of networks we frequently require the statistical significance of some network statistic, such as measures of similarity for the properties of interacting nodes. The structure of the network may introduce dependencies among the nodes and it will in general be necessary to account for these dependencies in the statistical analysis. To this end we require some form of Null model of the network: generally rewired replicates of the network are generated which preserve only the degree (number of interactions of each node. We show that this can fail to capture important features of network structure, and may result in unrealistic significance levels, when potentially confounding additional information is available. Methods We present a new network resampling Null model which takes into account the degree sequence as well as available biological annotations. Using gene ontology information as an illustration we show how this information can be accounted for in the resampling approach, and the impact such information has on the assessment of statistical significance of correlations and motif-abundances in the Saccharomyces cerevisiae protein interaction network. An algorithm, GOcardShuffle, is introduced to allow for the efficient construction of an improved Null model for network data. Results We use the protein interaction network of S. cerevisiae; correlations between the evolutionary rates and expression levels of interacting proteins and their statistical significance were assessed for Null models which condition on different aspects of the available data. The novel GOcardShuffle approach results in a Null model for annotated network data which appears better to describe the properties of real biological networks. Conclusion An improved statistical approach for the statistical analysis of biological network data, which conditions on the available biological information, leads to qualitatively different results

  12. Estimation and Control of Networked Distributed Parameter Systems: Application to Traffic Flow

    KAUST Repository

    Canepa, Edward

    2016-11-01

    The management of large-scale transportation infrastructure is becoming a very complex task for the urban areas of this century which are covering bigger geographic spaces and facing the inclusion of connected and self-controlled vehicles. This new system paradigm can leverage many forms of sensing and interaction, including a high-scale mobile sensing approach. To obtain a high penetration sensing system on urban areas more practical and scalable platforms are needed, combined with estimation algorithms suitable to the computational capabilities of these platforms. The purpose of this work was to develop a transportation framework that is able to handle different kinds of sensing data (e.g., connected vehicles, loop detectors) and optimize the traffic state on a defined traffic network. The framework estimates the traffic on road networks modeled by a family of Lighthill-Whitham-Richards equations. Based on an equivalent formulation of the problem using a Hamilton-Jacobi equation and using a semi-analytic formula, I will show that the model constraints resulting from the Hamilton-Jacobi equation are linear, albeit with unknown integer variables. This general framework solve exactly a variety of problems arising in transportation networks: traffic estimation, traffic control (including robust control), cybersecurity and sensor fault detection, or privacy analysis of users in probe-based traffic monitoring systems. This framework is very flexible, fast, and yields exact results. The recent advances in sensors (GPS, inertial measurement units) and microprocessors enable the development low-cost dedicated devices for traffic sensing in cities, 5 which are highly scalable, providing a feasible solution to cover large urban areas. However, one of the main problems to address is the privacy of the users of the transportation system, the framework presented here is a viable option to guarantee the privacy of the users by design.

  13. Self-Adapting Routing Overlay Network for Frequently Changing Application Traffic in Content-Based Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2014-01-01

    Full Text Available In the large-scale distributed simulation area, the topology of the overlay network cannot always rapidly adapt to frequently changing application traffic to reduce the overall traffic cost. In this paper, we propose a self-adapting routing strategy for frequently changing application traffic in content-based publish/subscribe system. The strategy firstly trains the traffic information and then uses this training information to predict the application traffic in the future. Finally, the strategy reconfigures the topology of the overlay network based on this predicting information to reduce the overall traffic cost. A predicting path is also introduced in this paper to reduce the reconfiguration numbers in the process of the reconfigurations. Compared to other strategies, the experimental results show that the strategy proposed in this paper could reduce the overall traffic cost of the publish/subscribe system in less reconfigurations.

  14. Pattern Recognition and Classification of Fatal Traffic Accidents in Israel A Neural Network Approach

    DEFF Research Database (Denmark)

    Prato, Carlo Giacomo; Gitelman, Victoria; Bekhor, Shlomo

    2011-01-01

    This article provides a broad picture of fatal traffic accidents in Israel to answer an increasing need of addressing compelling problems, designing preventive measures, and targeting specific population groups with the objective of reducing the number of traffic fatalities. The analysis focuses...... on 1,793 fatal traffic accidents occurred during the period between 2003 and 2006 and applies Kohonen and feed-forward back-propagation neural networks with the objective of extracting from the data typical patterns and relevant factors. Kohonen neural networks reveal five compelling accident patterns......: (1) single-vehicle accidents of young drivers, (2) multiple-vehicle accidents between young drivers, (3) accidents involving motorcyclists or cyclists, (4) accidents where elderly pedestrians crossed in urban areas, and (5) accidents where children and teenagers cross major roads in small urban areas...

  15. A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark

    Directory of Open Access Journals (Sweden)

    Yong Wang

    2016-02-01

    Full Text Available Currently, with the rapid increasing of data scales in network traffic classifications, how to select traffic features efficiently is becoming a big challenge. Although a number of traditional feature selection methods using the Hadoop-MapReduce framework have been proposed, the execution time was still unsatisfactory with numeral iterative computations during the processing. To address this issue, an efficient feature selection method for network traffic based on a new parallel computing framework called Spark is proposed in this paper. In our approach, the complete feature set is firstly preprocessed based on Fisher score, and a sequential forward search strategy is employed for subsets. The optimal feature subset is then selected using the continuous iterations of the Spark computing framework. The implementation demonstrates that, on the precondition of keeping the classification accuracy, our method reduces the time cost of modeling and classification, and improves the execution efficiency of feature selection significantly.

  16. Software defined multi-OLT passive optical network for flexible traffic allocation

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Zhang, Jiawei; Li, Hui

    2016-10-01

    With the rapid growth of 4G mobile network and vehicular network services mobile terminal users have increasing demand on data sharing among different radio remote units (RRUs) and roadside units (RSUs). Meanwhile, commercial video-streaming, video/voice conference applications delivered through peer-to-peer (P2P) technology are still keep on stimulating the sharp increment of bandwidth demand in both business and residential subscribers. However, a significant issue is that, although wavelength division multiplexing (WDM) and orthogonal frequency division multiplexing (OFDM) technology have been proposed to fulfil the ever-increasing bandwidth demand in access network, the bandwidth of optical fiber is not unlimited due to the restriction of optical component properties and modulation/demodulation technology, and blindly increase the wavelength cannot meet the cost-sensitive characteristic of the access network. In this paper, we propose a software defined multi-OLT PON architecture to support efficient scheduling of access network traffic. By introducing software defined networking technology and wavelength selective switch into TWDM PON system in central office, multiple OLTs can be considered as a bandwidth resource pool and support flexible traffic allocation for optical network units (ONUs). Moreover, under the configuration of the control plane, ONUs have the capability of changing affiliation between different OLTs under different traffic situations, thus the inter-OLT traffic can be localized and the data exchange pressure of the core network can be released. Considering this architecture is designed to be maximum following the TWDM PON specification, the existing optical distribution network (ODN) investment can be saved and conventional EPON/GPON equipment can be compatible with the proposed architecture. What's more, based on this architecture, we propose a dynamic wavelength scheduling algorithm, which can be deployed as an application on control plane

  17. Network traffic intelligence using a low interaction honeypot

    Science.gov (United States)

    Nyamugudza, Tendai; Rajasekar, Venkatesh; Sen, Prasad; Nirmala, M.; Madhu Viswanatham, V.

    2017-11-01

    Advancements in networking technology have seen more and more devices becoming connected day by day. This has given organizations capacity to extend their networks beyond their boundaries to remote offices and remote employees. However as the network grows security becomes a major challenge since the attack surface also increases. There is need to guard the network against different types of attacks like intrusion and malware through using different tools at different networking levels. This paper describes how network intelligence can be acquired through implementing a low-interaction honeypot which detects and track network intrusion. Honeypot allows an organization to interact and gather information about an attack earlier before it compromises the network. This process is important because it allows the organization to learn about future attacks of the same nature and allows them to develop counter measures. The paper further shows how honeypot-honey net based model for interruption detection system (IDS) can be used to get the best valuable information about the attacker and prevent unexpected harm to the network.

  18. Understanding the vulnerability of traffic networks by means of structured expert judgment elicitation

    NARCIS (Netherlands)

    Nogal, M.; Morales Napoles, O.; O'Connor, Alan

    2016-01-01

    There is a lack of consensus in relation to the operationality of important concepts and descriptors of traffic networks such as resilience and vulnerability. With the aim of determining a framework with mathematical sound to objectively define and delimit these concepts, the expert judgment

  19. Road safety and bicycle usage impacts of unbundling vehicular and cycle traffic in Dutch urban networks

    NARCIS (Netherlands)

    Schepers, Paul; Heinen, Eva; Methorst, Rob; Wegman, Fred

    2013-01-01

    Bicycle-motor vehicle crashes are concentrated along distributor roads where cyclists are exposed to greater volumes of high-speed motorists than they would experience on access roads. This study examined the road safety impact of network-level separation of vehicular and cycle traffic in Dutch

  20. Routing of guaranteed throughput traffic in a network-on-chip

    NARCIS (Netherlands)

    Kavaldjiev, N.K.; Smit, Gerardus Johannes Maria; Wolkotte, P.T.; Jansen, P.G.

    This paper examines the possibilities of providing throughput guarantees in a network-on-chip by appropriate traffic routing. A source routing function is used to find routes with specified throughput for the data streams in a streaming multiprocessor system-on-chip. The influence of the routing

  1. Efficient model predictive control for large-scale urban traffic networks

    NARCIS (Netherlands)

    Lin, S.

    2011-01-01

    Model Predictive Control is applied to control and coordinate large-scale urban traffic networks. However, due to the large scale or the nonlinear, non-convex nature of the on-line optimization problems solved, the MPC controllers become real-time infeasible in practice, even though the problem is

  2. Dynamic Flow Migration for Delay Constrained Traffic in Software-Defined Networks

    NARCIS (Netherlands)

    Berger, Andre; Gross, James; Danielis, Peter; Dán, György

    2017-01-01

    Various industrial control applications have stringent end-to-end latency requirements in the order of a few milliseconds. Software-defined networking (SDN) is a promising solution in order to meet these stringent requirements under varying traffic patterns, as it enables the flexible management of

  3. Downlink Performance of a Multi-Carrier MIMO System in a Bursty Traffic Cellular Network

    DEFF Research Database (Denmark)

    Nguyen, Hung Tuan; Kovacs, Istvan; Wang, Yuanye

    2011-01-01

    In this paper we analyse the downlink performance of a rank adaptive multiple input multiple output (MIMO) system in a busty traffic cellular network. A LTE-Advanced system with multiple component carriers was selected as a study case. To highlight the advantage of using MIMO techniques, we used...

  4. Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic

    NARCIS (Netherlands)

    Keim, Daniel A.; Pras, Aiko; Schönwälder, Jürgen; Wong, Pak Chung; Mansmann, Florian

    The Dagstuhl Seminar on Visualization and Monitoring of Network Traffic took place May 17-20, 2009 in Dagstuhl, Germany. Dagstuhl seminars promote personal interaction and open discussion of results as well as new ideas. Unlike at most conferences, the focus is not solely on the presentation of

  5. Traffic characteristics analysis in optical burst switching networks with optical label processing

    Directory of Open Access Journals (Sweden)

    Edson Moschim

    2007-03-01

    Full Text Available An analysis is carried out with burst-switching optical networks which use label processing consisting of orthogonal optical codes (OOC, considering traffic characteristics such as length/duration and arrival rate of bursts. Main results show that the use of OOC label processing influences on the decrease of burst loss probability, especially for short-lived bursts. Therefore, short bursts that would be blocked in conventional electronic processing networks are transmitted when the OOC label processing is used. Thus, an increase in the network use occurs as well as a decrease in the burst transmission latency, reaching a granularity close to packets networks.

  6. Control Policies Approaching HGI Performance in Heavy Traffic for Resource Sharing Networks

    OpenAIRE

    Budhiraja, Amarjit; Johnson, Dane

    2017-01-01

    We consider resource sharing networks of the form introduced in the work of Massouli\\'{e} and Roberts(2000) as models for Internet flows. The goal is to study the open problem, formulated in Harrison et al. (2014), of constructing simple form rate allocation policies for broad families of resource sharing networks with associated costs converging to the Hierarchical Greedy Ideal performance in the heavy traffic limit. We consider two types of cost criteria, an infinite horizon discounted cost...

  7. Feasibility of a Networked Air Traffic Infrastructure Validation Environment for Advanced NextGen Concepts

    Science.gov (United States)

    McCormack, Michael J.; Gibson, Alec K.; Dennis, Noah E.; Underwood, Matthew C.; Miller,Lana B.; Ballin, Mark G.

    2013-01-01

    Abstract-Next Generation Air Transportation System (NextGen) applications reliant upon aircraft data links such as Automatic Dependent Surveillance-Broadcast (ADS-B) offer a sweeping modernization of the National Airspace System (NAS), but the aviation stakeholder community has not yet established a positive business case for equipage and message content standards remain in flux. It is necessary to transition promising Air Traffic Management (ATM) Concepts of Operations (ConOps) from simulation environments to full-scale flight tests in order to validate user benefits and solidify message standards. However, flight tests are prohibitively expensive and message standards for Commercial-off-the-Shelf (COTS) systems cannot support many advanced ConOps. It is therefore proposed to simulate future aircraft surveillance and communications equipage and employ an existing commercial data link to exchange data during dedicated flight tests. This capability, referred to as the Networked Air Traffic Infrastructure Validation Environment (NATIVE), would emulate aircraft data links such as ADS-B using in-flight Internet and easily-installed test equipment. By utilizing low-cost equipment that is easy to install and certify for testing, advanced ATM ConOps can be validated, message content standards can be solidified, and new standards can be established through full-scale flight trials without necessary or expensive equipage or extensive flight test preparation. This paper presents results of a feasibility study of the NATIVE concept. To determine requirements, six NATIVE design configurations were developed for two NASA ConOps that rely on ADS-B. The performance characteristics of three existing in-flight Internet services were investigated to determine whether performance is adequate to support the concept. Next, a study of requisite hardware and software was conducted to examine whether and how the NATIVE concept might be realized. Finally, to determine a business case

  8. Radiology: "killer app" for next generation networks?

    Science.gov (United States)

    McNeill, Kevin M

    2004-03-01

    The core principles of digital radiology were well developed by the end of the 1980 s. During the following decade tremendous improvements in computer technology enabled realization of those principles at an affordable cost. In this decade work can focus on highly distributed radiology in the context of the integrated health care enterprise. Over the same period computer networking has evolved from a relatively obscure field used by a small number of researchers across low-speed serial links to a pervasive technology that affects nearly all facets of society. Development directions in network technology will ultimately provide end-to-end data paths with speeds that match or exceed the speeds of data paths within the local network and even within workstations. This article describes key developments in Next Generation Networks, potential obstacles, and scenarios in which digital radiology can become a "killer app" that helps to drive deployment of new network infrastructure.

  9. Optimal traffic control in highway transportation networks using linear programming

    KAUST Repository

    Li, Yanning

    2014-06-01

    This article presents a framework for the optimal control of boundary flows on transportation networks. The state of the system is modeled by a first order scalar conservation law (Lighthill-Whitham-Richards PDE). Based on an equivalent formulation of the Hamilton-Jacobi PDE, the problem of controlling the state of the system on a network link in a finite horizon can be posed as a Linear Program. Assuming all intersections in the network are controllable, we show that the optimization approach can be extended to an arbitrary transportation network, preserving linear constraints. Unlike previously investigated transportation network control schemes, this framework leverages the intrinsic properties of the Halmilton-Jacobi equation, and does not require any discretization or boolean variables on the link. Hence this framework is very computational efficient and provides the globally optimal solution. The feasibility of this framework is illustrated by an on-ramp metering control example.

  10. Hyper-Spectral Networking Concept of Operations and Future Air Traffic Management Simulations

    Science.gov (United States)

    Davis, Paul; Boisvert, Benjamin

    2017-01-01

    The NASA sponsored Hyper-Spectral Communications and Networking for Air Traffic Management (ATM) (HSCNA) project is conducting research to improve the operational efficiency of the future National Airspace System (NAS) through diverse and secure multi-band, multi-mode, and millimeter-wave (mmWave) wireless links. Worldwide growth of air transportation and the coming of unmanned aircraft systems (UAS) will increase air traffic density and complexity. Safe coordination of aircraft will require more capable technologies for communications, navigation, and surveillance (CNS). The HSCNA project will provide a foundation for technology and operational concepts to accommodate a significantly greater number of networked aircraft. This paper describes two of the HSCNA projects technical challenges. The first technical challenge is to develop a multi-band networking concept of operations (ConOps) for use in multiple phases of flight and all communication link types. This ConOps will integrate the advanced technologies explored by the HSCNA project and future operational concepts into a harmonized vision of future NAS communications and networking. The second technical challenge discussed is to conduct simulations of future ATM operations using multi-bandmulti-mode networking and technologies. Large-scale simulations will assess the impact, compared to todays system, of the new and integrated networks and technologies under future air traffic demand.

  11. Dynamic routing control in heterogeneous tactical networks with multiple traffic priorities

    Science.gov (United States)

    Fecko, Mariusz A.; Wong, Larry; Kang, Jaewong; Cichocki, Andrzej; Kaul, Vikram; Samtani, Sunil

    2012-05-01

    To efficiently use alternate paths during periods of congestion, we have devised prioritized Dynamic Routing Control Agent (pDRCA) that (1) selects best links to meet the bandwidth and delay requirements of traffic, (2) provides load-balancing and traffic prioritization when multiple topologies are available, and (3) handles changes in link quality and traffic demand, and link outages. pDRCA provides multiplatform load balancing to maximize SATCOM (both P2P and multi-point) and airborne links utilization. It influences link selection by configuring the cost metrics on a router's interface, which does not require any changes to the routing protocol itself. It supports service differentiation of multiple traffic priorities by providing more network resources to the highest priority flows. pDRCA does so by solving an optimization problem to find optimal links weights that increase throughput and decrease E2E delay; avoid congested, low quality, and long delay links; and exploit path diversity in the network. These optimal link weights are sent to the local agents to be configured on individual routers per traffic priority. The pDRCA optimization algorithm has been proven effective in improving application performance. We created a variety of different test scenarios by varying traffic profile and link behavior (stable links, varying capacity, and link outages). In the scenarios where high priority traffic experienced significant loss without pDRCA, the average loss was reduced from 49.5% to 13% and in some cases dropped to 0%. Currently, pDRCA is integrated with an open-source software router and priority queues on Linux as a component of Open Tactical Router (OTR), which is being developed by ONR DTCN program.

  12. Anticipation of Traffic Demands to Guarantee QoS in IP/Optical Networks

    Directory of Open Access Journals (Sweden)

    Carolina Pinart

    2010-09-01

    Full Text Available Traffic in the Internet backbone is expected to grow above a few Tbit/s in 2020. To cope with this, operators are moving to IP/optical network architectures, where IP is the convergence layer for all services. On the other hand, the quality of service (QoS requirements of future applications encompasses the individualization of services and the assurance of stricter quality parameters such as latency, jitter or capacity. In other words, future optical networks will not only transport more IP data, but they will also have to offer differentiated QoS requirements to services. Finally, some emerging applications, e.g., grid computing, need greater flexibility in the usage of network resources, which involves establishing and releasing connections as if they were virtualized resources controlled by other elements or layers. In this context, traffic-driven lightpath provisioning and service-plane approaches arise as very interesting candidate solutions to solve the main challenges described above. This work reviews the concepts of service-oriented and self-managed networks and relates them to propose an integrated approach to assure QoS by offering flow-aware networking in the sense that traffic demands will be anticipated in a suitable way, lightpaths will be established taking into account QoS information (i.e., impairments and complex services will be decomposed into optical connections so that the above techniques can be employed to assure QoS for any service.

  13. Threshold based AntNet algorithm for dynamic traffic routing of road networks

    Directory of Open Access Journals (Sweden)

    Ayman M. Ghazy

    2012-07-01

    Full Text Available Dynamic routing algorithms play an important role in road traffic routing to avoid congestion and to direct vehicles to better routes. AntNet routing algorithms have been applied, extensively and successfully, in data communication network. However, its application for dynamic routing on road networks is still considerably limited. This paper presents a modified version of the AntNet routing algorithm, called “Threshold based AntNet”, that has the ability to efficiently utilize a priori information of dynamic traffic routing, especially, for road networks. The modification exploits the practical and pre-known information for most road traffic networks, namely, the good travel times between sources and destinations. The values of those good travel times are manipulated as threshold values. This approach has proven to conserve tracking of good routes. According to the dynamic nature of the problem, the presented approach guards the agility of rediscovering a good route. Attaining the thresholds (good reported travel times, of a given source to destination route, permits for a better utilization of the computational resources, that, leads to better accommodation for the network changes. The presented algorithm introduces a new type of ants called “check ants”. It assists in preserving good routes and, better yet, exposes and discards the degraded ones. The threshold AntNet algorithm presents a new strategy for updating the routing information, supported by the backward ants.

  14. NASA's Next Generation Space Geodesy Network

    Science.gov (United States)

    Desai, S. D.; Gross, R. S.; Hilliard, L.; Lemoine, F. G.; Long, J. L.; Ma, C.; McGarry, J. F.; Merkowitz, S. M.; Murphy, D.; Noll, C. E.; hide

    2012-01-01

    NASA's Space Geodesy Project (SGP) is developing a prototype core site for a next generation Space Geodetic Network (SGN). Each of the sites in this planned network co-locate current state-of-the-art stations from all four space geodetic observing systems, GNSS, SLR, VLBI, and DORIS, with the goal of achieving modern requirements for the International Terrestrial Reference Frame (ITRF). In particular, the driving ITRF requirements for this network are 1.0 mm in accuracy and 0.1 mm/yr in stability, a factor of 10-20 beyond current capabilities. Development of the prototype core site, located at NASA's Geophysical and Astronomical Observatory at the Goddard Space Flight Center, started in 2011 and will be completed by the end of 2013. In January 2012, two operational GNSS stations, GODS and GOON, were established at the prototype site within 100 m of each other. Both stations are being proposed for inclusion into the IGS network. In addition, work is underway for the inclusion of next generation SLR and VLBI stations along with a modern DORIS station. An automated survey system is being developed to measure inter-technique vectorties, and network design studies are being performed to define the appropriate number and distribution of these next generation space geodetic core sites that are required to achieve the driving ITRF requirements. We present the status of this prototype next generation space geodetic core site, results from the analysis of data from the established geodetic stations, and results from the ongoing network design studies.

  15. BGen: A UML Behavior Network Generator Tool

    Science.gov (United States)

    Huntsberger, Terry; Reder, Leonard J.; Balian, Harry

    2010-01-01

    BGen software was designed for autogeneration of code based on a graphical representation of a behavior network used for controlling automatic vehicles. A common format used for describing a behavior network, such as that used in the JPL-developed behavior-based control system, CARACaS ["Control Architecture for Robotic Agent Command and Sensing" (NPO-43635), NASA Tech Briefs, Vol. 32, No. 10 (October 2008), page 40] includes a graph with sensory inputs flowing through the behaviors in order to generate the signals for the actuators that drive and steer the vehicle. A computer program to translate Unified Modeling Language (UML) Freeform Implementation Diagrams into a legacy C implementation of Behavior Network has been developed in order to simplify the development of C-code for behavior-based control systems. UML is a popular standard developed by the Object Management Group (OMG) to model software architectures graphically. The C implementation of a Behavior Network is functioning as a decision tree.

  16. USER EQUILIBRIUM AND SYSTEM OPTIMUM TRAFFIC ASSIGNMENTS; ISTANBUL ROAD NETWORK EXAMPLE

    Directory of Open Access Journals (Sweden)

    Banihan GÜNAY

    1996-03-01

    Full Text Available The concept of road networks and traffic flow equilibrium conditions are briefly reviewed and discussed. In order to see whether some benefits for the society (e.g. whole network by employing a System Optimum assignment approach can be achieved or not, an assessment study was carried out on the Ystanbul road network using the actual data gathered. As a result of the system optimising simulation, queuing times on the Bosphorus Bridge dropped by 12% and speed of an average car increased by 16%, compared to the results produced by the User Equilibrium assignment. Besides, the total system journey time was also reduced by about 4%.

  17. Micro-generation network connection (renewables)

    Energy Technology Data Exchange (ETDEWEB)

    Thornycroft, J.; Russell, T.; Curran, J.

    2003-07-01

    The drive to reduce emissions of carbon dioxide will result in an increase in the number of small generation units seeking connection to the electric power distribution network. The objectives of this study were to consider connection issues relating to micro-generation from renewables and their integration into the UK distribution network. The document is divided into two sections. The first section describes the present system which includes input from micro-generation, the technical impacts and the financial considerations. The second part discusses technical, financial and governance options for the future. A summary of preferred options and recommendations is given. The study was carried out by the Halcrow Group Ltd under contract to the DTI.

  18. Traffic Flow Prediction Model for Large-Scale Road Network Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhaosheng Yang

    2014-01-01

    Full Text Available To increase the efficiency and precision of large-scale road network traffic flow prediction, a genetic algorithm-support vector machine (GA-SVM model based on cloud computing is proposed in this paper, which is based on the analysis of the characteristics and defects of genetic algorithm and support vector machine. In cloud computing environment, firstly, SVM parameters are optimized by the parallel genetic algorithm, and then this optimized parallel SVM model is used to predict traffic flow. On the basis of the traffic flow data of Haizhu District in Guangzhou City, the proposed model was verified and compared with the serial GA-SVM model and parallel GA-SVM model based on MPI (message passing interface. The results demonstrate that the parallel GA-SVM model based on cloud computing has higher prediction accuracy, shorter running time, and higher speedup.

  19. Noise-Assisted Concurrent Multipath Traffic Distribution in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Narun Asvarujanon

    2013-01-01

    Full Text Available The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP, which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.

  20. Channel modeling for fifth generation cellular networks and wireless sensor networks

    Science.gov (United States)

    Torabi, Amir

    In view of exponential growth in data traffic demand, the wireless communications industry has aimed to increase the capacity of existing networks by 1000 times over the next 20 years. A combination of extreme cell densification, more bandwidth, and higher spectral efficiency is needed to support the data traffic requirements for fifth generation (5G) cellular communications. In this research, the potential improvements achieved by using three major 5G enabling technologies (i.e., small cells, millimeter-wave spectrum, and massive MIMO) in rural and urban environments are investigated. This work develops SPM and KA-based ray models to investigate the impact of geometrical parameters on terrain-based multiuser MIMO channel characteristic. Moreover, a new directional 3D channel model is developed for urban millimeter-wave (mmW) small cells. Path-loss, spatial correlation, coverage distance, and coherence length are studied in urban areas. Exploiting physical optics (PO) and geometric optics (GO) solutions, closed form expressions are derived for spatial correlation. Achievable spatial diversity is evaluated using horizontal and vertical linear arrays as well as planar 2D arrays. In another study, a versatile near-ground field prediction model is proposed to facilitate accurate wireless sensor network (WSN) simulations. Monte Carlo simulations are used to investigate the effects of antenna height, frequency of operation, polarization, and terrain dielectric and roughness properties on WSNs performance.

  1. Accelerating Network Traffic Analytics Using Query-DrivenVisualization

    Energy Technology Data Exchange (ETDEWEB)

    Bethel, E. Wes; Campbell, Scott; Dart, Eli; Stockinger, Kurt; Wu,Kesheng

    2006-07-29

    Realizing operational analytics solutions where large and complex data must be analyzed in a time-critical fashion entails integrating many different types of technology. This paper focuses on an interdisciplinary combination of scientific data management and visualization/analysis technologies targeted at reducing the time required for data filtering, querying, hypothesis testing and knowledge discovery in the domain of network connection data analysis. We show that use of compressed bitmap indexing can quickly answer queries in an interactive visual data analysis application, and compare its performance with two alternatives for serial and parallel filtering/querying on 2.5 billion records worth of network connection data collected over a period of 42 weeks. Our approach to visual network connection data exploration centers on two primary factors: interactive ad-hoc and multiresolution query formulation and execution over n dimensions and visual display of then-dimensional histogram results. This combination is applied in a case study to detect a distributed network scan and to then identify the set of remote hosts participating in the attack. Our approach is sufficiently general to be applied to a diverse set of data understanding problems as well as used in conjunction with a diverse set of analysis and visualization tools.

  2. A network traffic reduction method for cooperative positioning

    NARCIS (Netherlands)

    Das, Kallol; Wymeersch, Henk

    Cooperative positioning is suitable for applications where conventional positioning fails due to lack of connectivity with a sufficient number of reference nodes. In a dense network, as the number of cooperating devices increases, the number of packet exchanges also increases proportionally. This

  3. Diamond Networks with Bursty Traffic: Bounds on the Minimum Energy-Per-Bit

    CERN Document Server

    Shomorony, Ilan; Parvaresh, Farzad; Avestimehr, A Salman

    2012-01-01

    When data traffic in a wireless network is bursty, small amounts of data sporadically become available for transmission, at times that are unknown at the receivers, and an extra amount of energy must be spent at the transmitters to overcome this lack of synchronization between the network nodes. In practice, pre-defined header sequences are used with the purpose of synchronizing the different network nodes. However, in networks where relays must be used for communication, the overhead required for synchronizing the entire network may be very significant. In this work, we study the fundamental limits of energy-efficient communication in an asynchronous diamond network with two relays. We formalize the notion of relay synchronization by saying that a relay is synchronized if the conditional entropy of the arrival time of the source message given the received signals at the relay is small. We show that the minimum energy-per-bit for bursty traffic in diamond networks is achieved with a coding scheme where each r...

  4. Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Houli Duan

    2010-01-01

    Full Text Available We propose a new multiobjective control algorithm based on reinforcement learning for urban traffic signal control, named multi-RL. A multiagent structure is used to describe the traffic system. A vehicular ad hoc network is used for the data exchange among agents. A reinforcement learning algorithm is applied to predict the overall value of the optimization objective given vehicles' states. The policy which minimizes the cumulative value of the optimization objective is regarded as the optimal one. In order to make the method adaptive to various traffic conditions, we also introduce a multiobjective control scheme in which the optimization objective is selected adaptively to real-time traffic states. The optimization objectives include the vehicle stops, the average waiting time, and the maximum queue length of the next intersection. In addition, we also accommodate a priority control to the buses and the emergency vehicles through our model. The simulation results indicated that our algorithm could perform more efficiently than traditional traffic light control methods.

  5. Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network

    Science.gov (United States)

    Houli, Duan; Zhiheng, Li; Yi, Zhang

    2010-12-01

    We propose a new multiobjective control algorithm based on reinforcement learning for urban traffic signal control, named multi-RL. A multiagent structure is used to describe the traffic system. A vehicular ad hoc network is used for the data exchange among agents. A reinforcement learning algorithm is applied to predict the overall value of the optimization objective given vehicles' states. The policy which minimizes the cumulative value of the optimization objective is regarded as the optimal one. In order to make the method adaptive to various traffic conditions, we also introduce a multiobjective control scheme in which the optimization objective is selected adaptively to real-time traffic states. The optimization objectives include the vehicle stops, the average waiting time, and the maximum queue length of the next intersection. In addition, we also accommodate a priority control to the buses and the emergency vehicles through our model. The simulation results indicated that our algorithm could perform more efficiently than traditional traffic light control methods.

  6. Cooperation for next generation wireless networks

    OpenAIRE

    Antonopoulos, Angelos; Di Renzo, Marco; Lalos, Aristeidis; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos

    2015-01-01

    Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks, discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development. The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly in...

  7. Integrated coding-aware intra-ONU scheduling for passive optical networks with inter-ONU traffic

    Science.gov (United States)

    Li, Yan; Dai, Shifang; Wu, Weiwei

    2016-12-01

    Recently, with the soaring of traffic among optical network units (ONUs), network coding (NC) is becoming an appealing technique for improving the performance of passive optical networks (PONs) with such inter-ONU traffic. However, in the existed NC-based PONs, NC can only be implemented by buffering inter-ONU traffic at the optical line terminal (OLT) to wait for the establishment of coding condition, such passive uncertain waiting severely limits the effect of NC technique. In this paper, we will study integrated coding-aware intra-ONU scheduling in which the scheduling of inter-ONU traffic within each ONU will be undertaken by the OLT to actively facilitate the forming of coding inter-ONU traffic based on the global inter-ONU traffic distribution, and then the performance of PONs with inter-ONU traffic can be significantly improved. We firstly design two report message patterns and an inter-ONU traffic transmission framework as the basis for the integrated coding-aware intra-ONU scheduling. Three specific scheduling strategies are then proposed for adapting diverse global inter-ONU traffic distributions. The effectiveness of the work is finally evaluated by both theoretical analysis and simulations.

  8. Analyzing traffic layout using dynamic social network analysis.

    Science.gov (United States)

    2014-07-12

    it is essential to build, maintain, and use our transportation systems in a manner that meets our current : needs while addressing the social and economic needs of future generations. In todays world, : transportation congestion causes serious neg...

  9. Contribution to the Management of Traffic in Networks

    Directory of Open Access Journals (Sweden)

    Filip Chamraz

    2014-01-01

    Full Text Available The paper deals with Admission control methods (AC in IMS networks (IP multimedia subsystem as one of the elements that help ensure QoS (Quality of service. In the paper we are trying to choose the best AC method for selected IMS network to allow access to the greatest number of users. Of the large number of methods that were tested and considered good we chose two. The paper compares diffusion method and one of the measurement based method, specifically „Simple Sum“. Both methods estimate effective bandwidth to allow access for the greatest number of users/devices and allow them access to prepaid services or multimedia content.

  10. Prediction of road traffic death rate using neural networks optimised by genetic algorithm.

    Science.gov (United States)

    Jafari, Seyed Ali; Jahandideh, Sepideh; Jahandideh, Mina; Asadabadi, Ebrahim Barzegari

    2015-01-01

    Road traffic injuries (RTIs) are realised as a main cause of public health problems at global, regional and national levels. Therefore, prediction of road traffic death rate will be helpful in its management. Based on this fact, we used an artificial neural network model optimised through Genetic algorithm to predict mortality. In this study, a five-fold cross-validation procedure on a data set containing total of 178 countries was used to verify the performance of models. The best-fit model was selected according to the root mean square errors (RMSE). Genetic algorithm, as a powerful model which has not been introduced in prediction of mortality to this extent in previous studies, showed high performance. The lowest RMSE obtained was 0.0808. Such satisfactory results could be attributed to the use of Genetic algorithm as a powerful optimiser which selects the best input feature set to be fed into the neural networks. Seven factors have been known as the most effective factors on the road traffic mortality rate by high accuracy. The gained results displayed that our model is very promising and may play a useful role in developing a better method for assessing the influence of road traffic mortality risk factors.

  11. Comparison between genetic algorithm and self organizing map to detect botnet network traffic

    Science.gov (United States)

    Yugandhara Prabhakar, Shinde; Parganiha, Pratishtha; Madhu Viswanatham, V.; Nirmala, M.

    2017-11-01

    In Cyber Security world the botnet attacks are increasing. To detect botnet is a challenging task. Botnet is a group of computers connected in a coordinated fashion to do malicious activities. Many techniques have been developed and used to detect and prevent botnet traffic and the attacks. In this paper, a comparative study is done on Genetic Algorithm (GA) and Self Organizing Map (SOM) to detect the botnet network traffic. Both are soft computing techniques and used in this paper as data analytics system. GA is based on natural evolution process and SOM is an Artificial Neural Network type, uses unsupervised learning techniques. SOM uses neurons and classifies the data according to the neurons. Sample of KDD99 dataset is used as input to GA and SOM.

  12. CIPP: a versatile analytical model for VBR traffic in ATM networks

    Science.gov (United States)

    Manivasakan, R.; Desai, U. B.; Karandikar, Abhay

    1999-08-01

    Correlated Interarrival time Process (CIPP) has been proposed, for modeling both the composite arrival process of packets in broadband networks and the individual source modeling. The CIPP--a generalization of the Poisson process- - is a stationary counting process and is parameterized by a correlation parameter `p' which represents the degree of correlation in adjacent interarrivals in addition to `(lambda) ' the intensity of the process. In this paper, we present the performance modeling of VBR video traffic in ATM networks, using CIPP/M/1 queue. We first give the expressions for stationary distributions for CIPP/M/1 queue. The, we derive the queuing measures of interest. We simulate a queue with smoothed VBR video trace data as input (with exponential services) to compare with the theoretical measures derived above. Experimental results show that the CIPP/M/1 queue, models well with ATM multiplexer performance with the real world VBR video traffic input.

  13. A model to identify urban traffic congestion hotspots in complex networks

    CERN Document Server

    Solé-Ribalta, Albert; Arenas, Alex

    2016-01-01

    The rapid growth of population in urban areas is jeopardizing the mobility and air quality worldwide. One of the most notable problems arising is that of traffic congestion. With the advent of technologies able to sense real-time data about cities, and its public distribution for analysis, we are in place to forecast scenarios valuable for improvement and control. Here, we propose an idealized model, based on the critical phenomena arising in complex networks, that allows to analytically predict congestion hotspots in urban environments. Results on real cities' road networks, considering, in some experiments, real-traffic data, show that the proposed model is capable of identifying susceptible junctions that might becomes hotspots if mobility demand increases.

  14. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  15. INCITE: Edge-based Traffic Processing and Inference for High-Performance Networks

    Energy Technology Data Exchange (ETDEWEB)

    Baraniuk, Richard G.; Feng, Wu-chun; Cottrell, Les; Knightly, Edward; Nowak, Robert; Riedi, Rolf

    2005-06-20

    The INCITE (InterNet Control and Inference Tools at the Edge) Project developed on-line tools to characterize and map host and network performance as a function of space, time, application, protocol, and service. In addition to their utility for trouble-shooting problems, these tools will enable a new breed of applications and operating systems that are network aware and resource aware. Launching from the foundation provided our recent leading-edge research on network measurement, multifractal signal analysis, multiscale random fields, and quality of service, our effort consisted of three closely integrated research thrusts that directly attack several key networking challenges of DOE's SciDAC program. These are: Thrust 1, Multiscale traffic analysis and modeling techniques; Thrust 2, Inference and control algorithms for network paths, links, and routers, and Thrust 3, Data collection tools.

  16. Thunderstorm Impact on Denver Air Traffic Control Operations and the Role of NEXRAD (Next Generation Weather Radar)

    Science.gov (United States)

    1984-04-01

    The report describes the impact of thunderstorms on the Denver Air Traffic Control (ATC) operation and the potential role of the Next Generation Weather Radar (NEXRAD) in reducing that impact. : The investigation was conducted in two stages. First, d...

  17. An Efficient Tabu Search DSA Algorithm for Heterogeneous Traffic in Cellular Networks

    OpenAIRE

    Kamal, Hany; Coupechoux, Marceau; Godlewski, Philippe

    2010-01-01

    International audience; In this paper, we propose and analyze a TS (Tabu Search) algorithm for DSA (Dynamic Spectrum Access) in cellular networks. We consider a scenario where cellular operators share a common access band, and we focus on the strategy of one operator providing packet services to the end-users. We consider a soft interference requirement for the algorithm's design that suits the packet traffic context. The operator's objective is to maximize its reward while taking into accoun...

  18. A study of Time-varying Cost Parameter Estimation Methods in Traffic Networks for Mobile Robots

    OpenAIRE

    Das, Pragna; Xirgo, Lluís Ribas

    2015-01-01

    Industrial robust controlling systems built using automated guided vehicles (AGVs) requires planning which depends on cost parameters like time and energy of the mobile robots functioning in the system. This work addresses the problem of on-line traversal time identification and estimation for proper mobility of mobile robots on systems' traffic networks. Several filtering and estimation methods have been investigated with respect to proper identification of traversal time of arcs of systems'...

  19. 77 FR 3544 - Meeting and Webinar on the Active Traffic and Demand Management and Intelligent Network Flow...

    Science.gov (United States)

    2012-01-24

    ... Management and Intelligent Network Flow Optimization Operational Concepts; Notice of Public Meeting AGENCY... Traffic and Demand Management (ADTM) and Intelligent Network Flow Optimization (INFLO) operational... transportation network. Issued in Washington, DC, on the 18th day of January 2012. John Augustine, Managing...

  20. SmartCop: Enabling Smart Traffic Violations Ticketing in Vehicular Named Data Networks

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-01-01

    Full Text Available Recently, various applications for Vehicular Ad hoc Networks (VANETs have been proposed and smart traffic violation ticketing is one of them. On the other hand, the new Information-Centric Networking (ICN architectures have emerged and been investigated into VANETs, such as Vehicular Named Data Networking (VNDN. However, the existing applications in VANETs are not suitable for VNDN paradigm due to the dependency on a “named content” instead of a current “host-centric” approach. Thus, we need to design the emerging and new architectures for VNDN applications. In this paper, we propose a smart traffic violation ticketing (TVT system for VNDN, named as SmartCop, that enables a cop vehicle (CV to issue tickets for traffic violation(s to the offender(s autonomously, once they are in the transmission range of that CV. The ticket issuing delay, messaging cost, and percentage of violations detected for varying number of vehicles, violators, CVs, and vehicles speeds are estimated through simulations. In addition, we provide a road map of future research directions for enabling safe driving experience in future cars aided with VNDN technology.

  1. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  2. Model establishing and performance analysis of service stratum traffic in the integrated sensing network

    Science.gov (United States)

    Ge, Zhiqun; Wang, Ying; Zhang, Xiaolu; Zheng, Yu; Zhao, Xinqun; Sun, Xiaohan

    2017-01-01

    We propose a time-division hybrid-user data flow model scheme based on semi-Markov state-transition algorithm for multiclass business and service in Integrated Sensing Network (ISN). Two typical flow models, visual sense and auditory sense service models, are set up due to the real situation of service stratum traffic, respectively. The experimental system based on the Asynchronous Optical Packet Switching (AOPS) network simulation platform is established for the feasibility of the proposed data flow model. The results show that the proposed models achieve reasonable packet loss rate and delay time in the case of different business and service levels.

  3. A multiclass vehicular dynamic traffic flow model for main roads and dedicated lanes/roads of multimodal transport network

    Energy Technology Data Exchange (ETDEWEB)

    Sossoe, K.S., E-mail: kwami.sossoe@irt-systemx.fr [TECHNOLOGICAL RESEARCH INSTITUTE SYSTEMX (France); Lebacque, J-P., E-mail: jean-patrick.lebacque@ifsttar.fr [UPE/IFSTTAR-COSYS-GRETTIA (France)

    2015-03-10

    We present in this paper a model of vehicular traffic flow for a multimodal transportation road network. We introduce the notion of class of vehicles to refer to vehicles of different transport modes. Our model describes the traffic on highways (which may contain several lanes) and network transit for pubic transportation. The model is drafted with Eulerian and Lagrangian coordinates and uses a Logit model to describe the traffic assignment of our multiclass vehicular flow description on shared roads. The paper also discusses traffic streams on dedicated lanes for specific class of vehicles with event-based traffic laws. An Euler-Lagrangian-remap scheme is introduced to numerically approximate the model’s flow equations.

  4. Report on the Dagstuhl Seminar on Visualization and Monitoring of Network Traffic

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Daniel; Pras, Aiko; Schonwalder, Jurgen; Wong, Pak C.; Mansmann, Florian

    2011-01-26

    The Dagstuhl Seminar on Visualization and Monitoring of Network Traffic [1] took place May 17-20, 2009 in Dagstuhl, Germany. Dagstuhl seminars promote personal interaction and open discussion of results as well as new ideas. Unlike at most conferences, the focus is not solely on the presentation of established results but to equal parts on results, ideas, sketches, and open problems. The aim of this particular seminar was to bring together experts from the information visualization community and the networking community in order to discuss the state of the art of monitoring and visualization of network traffic. People from the different research communities involved jointly organized the seminar. The co-chairs of the seminar from the networking community were Aiko Pras (University of Twente) and Jürgen Schönwälder (Jacobs University Bremen). The co-chairs from the visualization community were Daniel A. Keim (University of Konstanz) and Pak Chung Wong (Pacific Northwest National Lab). Florian Mansmann (University of Konstanz) helped with producing this report. The seminar was organized and supported by Schloss Dagstuhl and the EC IST-EMANICS Network of Excellence [1].

  5. Determination of network origin-destination matrices using partial link traffic counts and virtual sensor information in an integrated corridor management framework.

    Science.gov (United States)

    2014-04-01

    Trip origin-destination (O-D) demand matrices are critical components in transportation network : modeling, and provide essential information on trip distributions and corresponding spatiotemporal : traffic patterns in traffic zones in vehicular netw...

  6. Biology Question Generation from a Semantic Network

    Science.gov (United States)

    Zhang, Lishan

    Science instructors need questions for use in exams, homework assignments, class discussions, reviews, and other instructional activities. Textbooks never have enough questions, so instructors must find them from other sources or generate their own questions. In order to supply instructors with biology questions, a semantic network approach was developed for generating open response biology questions. The generated questions were compared to professional authorized questions. To boost students' learning experience, adaptive selection was built on the generated questions. Bayesian Knowledge Tracing was used as embedded assessment of the student's current competence so that a suitable question could be selected based on the student's previous performance. A between-subjects experiment with 42 participants was performed, where half of the participants studied with adaptive selected questions and the rest studied with mal-adaptive order of questions. Both groups significantly improved their test scores, and the participants in adaptive group registered larger learning gains than participants in the control group. To explore the possibility of generating rich instructional feedback for machine-generated questions, a question-paragraph mapping task was identified. Given a set of questions and a list of paragraphs for a textbook, the goal of the task was to map the related paragraphs to each question. An algorithm was developed whose performance was comparable to human annotators. A multiple-choice question with high quality distractors (incorrect answers) can be pedagogically valuable as well as being much easier to grade than open-response questions. Thus, an algorithm was developed to generate good distractors for multiple-choice questions. The machine-generated multiple-choice questions were compared to human-generated questions in terms of three measures: question difficulty, question discrimination and distractor usefulness. By recruiting 200 participants from

  7. Trajectory Assessment and Modification Tools for Next Generation Air Traffic Management Operations

    Science.gov (United States)

    Brasil, Connie; Lee, Paul; Mainini, Matthew; Lee, Homola; Lee, Hwasoo; Prevot, Thomas; Smith, Nancy

    2011-01-01

    This paper reviews three Next Generation Air Transportation System (NextGen) based high fidelity air traffic control human-in-the-loop (HITL) simulations, with a focus on the expected requirement of enhanced automated trajectory assessment and modification tools to support future air traffic flow management (ATFM) planning positions. The simulations were conducted at the National Aeronautics and Space Administration (NASA) Ames Research Centers Airspace Operations Laboratory (AOL) in 2009 and 2010. The test airspace for all three simulations assumed the mid-term NextGenEn-Route high altitude environment utilizing high altitude sectors from the Kansas City and Memphis Air Route Traffic Control Centers. Trajectory assessment, modification and coordination decision support tools were developed at the AOL in order to perform future ATFM tasks. Overall tool usage results and user acceptability ratings were collected across three areas of NextGen operatoins to evaluate the tools. In addition to the usefulness and usability feedback, feasibility issues, benefits, and future requirements were also addressed. Overall, the tool sets were rated very useful and usable, and many elements of the tools received high scores and were used frequently and successfully. Tool utilization results in all three HITLs showed both user and system benefits including better airspace throughput, reduced controller workload, and highly effective communication protocols in both full Data Comm and mixed-equipage environments.

  8. A wireless sensor network for urban traffic characterization and trend monitoring.

    Science.gov (United States)

    Fernández-Lozano, J J; Martín-Guzmán, Miguel; Martín-Ávila, Juan; García-Cerezo, A

    2015-10-15

    Sustainable mobility requires a better management of the available infrastructure resources. To achieve this goal, it is necessary to obtain accurate data about road usage, in particular in urban areas. Although a variety of sensor alternates for urban traffic exist, they usually require extensive investments in the form of construction works for installation, processing means, etc. Wireless Sensor Networks (WSN) are an alternative to acquire urban traffic data, allowing for flexible, easy deployment. Together with the use of the appropriate sensors, like Bluetooth identification, and associate processing, WSN can provide the means to obtain in real time data like the origin-destination matrix, a key tool for trend monitoring which previously required weeks or months to be completed. This paper presents a system based on WSN designed to characterize urban traffic, particularly traffic trend monitoring through the calculation of the origin-destination matrix in real time by using Bluetooth identification. Additional sensors are also available integrated in different types of nodes. Experiments in real conditions have been performed, both for separate sensors (Bluetooth, ultrasound and laser), and for the whole system, showing the feasibility of this approach.

  9. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...... for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range...

  10. Time-delay neural network for audio monitoring of road traffic and vehicle classification

    Science.gov (United States)

    Nooralahiyan, Amir Y.; Lopez, Louis; Mckewon, Denis; Ahmadi, Masoud

    1997-02-01

    The aim of this research is to investigate the feasibility of developing a cost effective traffic monitoring detector for the purpose of reliable on-line vehicle classification to aid traffic management systems. The detector used was a directional microphone connected to a DAT recorder. The digital signal was preprocessed by LPC (Linear Predictive Coding) parameter conversion based on autocorrelation analysis. A Time Delay Neural Network (TDNN) was chosen to classify individual travelling vehicles based on their speed-independent acoustic signature. The network was trained and tested with real data for four types of vehicles. The paper provides a description of the TDNN architecture and training algorithm and an overview of the LPC pre-processing and feature extraction technique as applied to audio monitoring of road traffic. The performance of TDNN vehicle classification, convergence and accuracy for the training patterns are fully illustrated. In generalizing to a limited number of test patterns available, 100% accuracy in classification was achieved. The net was also robust to changes in the starting position of the acoustic waveforms with 86% accuracy for the same test data set.

  11. Optimized Virtual Machine Placement with Traffic-Aware Balancing in Data Center Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2016-01-01

    Full Text Available Virtualization has been an efficient method to fully utilize computing resources such as servers. The way of placing virtual machines (VMs among a large pool of servers greatly affects the performance of data center networks (DCNs. As network resources have become a main bottleneck of the performance of DCNs, we concentrate on VM placement with Traffic-Aware Balancing to evenly utilize the links in DCNs. In this paper, we first proposed a Virtual Machine Placement Problem with Traffic-Aware Balancing (VMPPTB and then proved it to be NP-hard and designed a Longest Processing Time Based Placement algorithm (LPTBP algorithm to solve it. To take advantage of the communication locality, we proposed Locality-Aware Virtual Machine Placement Problem with Traffic-Aware Balancing (LVMPPTB, which is a multiobjective optimization problem of simultaneously minimizing the maximum number of VM partitions of requests and minimizing the maximum bandwidth occupancy on uplinks of Top of Rack (ToR switches. We also proved it to be NP-hard and designed a heuristic algorithm (Least-Load First Based Placement algorithm, LLBP algorithm to solve it. Through extensive simulations, the proposed heuristic algorithm is proven to significantly balance the bandwidth occupancy on uplinks of ToR switches, while keeping the number of VM partitions of each request small enough.

  12. DECISION WITH ARTIFICIAL NEURAL NETWORKS IN DISCRETE EVENT SIMULATION MODELS ON A TRAFFIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Marília Gonçalves Dutra da Silva

    2016-04-01

    Full Text Available ABSTRACT This work aims to demonstrate the use of a mechanism to be applied in the development of the discrete-event simulation models that perform decision operations through the implementation of an artificial neural network. Actions that involve complex operations performed by a human agent in a process, for example, are often modeled in simplified form with the usual mechanisms of simulation software. Therefore, it was chosen a traffic system controlled by a traffic officer with a flow of vehicles and pedestrians to demonstrate the proposed solution. From a module built in simulation software itself, it was possible to connect the algorithm for intelligent decision to the simulation model. The results showed that the model elaborated responded as expected when it was submitted to actions, which required different decisions to maintain the operation of the system with changes in the flow of people and vehicles.

  13. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    Science.gov (United States)

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning

  14. A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique

    OpenAIRE

    Fatemeh. Dehghani; Shahram. Darooei

    2016-01-01

    Network on chip has emerged as a long-term and effective method in Multiprocessor System-on-Chip communications in order to overcome the bottleneck in bus based communication architectures. Efficiency and performance of network on chip is so dependent on the architecture and structure of the network. In this paper a new structure and architecture for adaptive traffic control in network on chip using Code Division Multiple Access technique is presented. To solve the problem of synchronous acce...

  15. Architectures and Design for Next-Generation Hybrid Circuit/Packet Networks

    Science.gov (United States)

    Vadrevu, Sree Krishna Chaitanya

    Internet traffic is increasing rapidly at an annual growth rate of 35% with aggregate traffic exceeding several Exabyte's per month. The traffic is also becoming heterogeneous in bandwidth and quality-of-service (QoS) requirements with growing popularity of cloud computing, video-on-demand (VoD), e-science, etc. Hybrid circuit/packet networks which can jointly support circuit and packet services along with the adoption of high-bit-rate transmission systems form an attractive solution to address the traffic growth. 10 Gbps and 40 Gbps transmission systems are widely deployed in telecom backbone networks such as Comcast, AT&T, etc., and network operators are considering migration to 100 Gbps and beyond. This dissertation proposes robust architectures, capacity migration strategies, and novel service frameworks for next-generation hybrid circuit/packet architectures. In this dissertation, we study two types of hybrid circuit/packet networks: a) IP-over-WDM networks, in which the packet (IP) network is overlaid on top of the circuit (optical WDM) network and b) Hybrid networks in which the circuit and packet networks are deployed side by side such as US DoE's ESnet. We investigate techniques to dynamically migrate capacity between the circuit and packet sections by exploiting traffic variations over a day, and our methods show that significant bandwidth savings can be obtained with improved reliability of services. Specifically, we investigate how idle backup circuit capacity can be used to support packet services in IP-over-WDM networks, and similarly, excess capacity in packet network to support circuit services in ESnet. Control schemes that enable our mechanisms are also discussed. In IP-over-WDM networks, with upcoming 100 Gbps and beyond, dedicated protection will induce significant under-utilization of backup resources. We investigate design strategies to loan idle circuit backup capacity to support IP/packet services. However, failure of backup circuits will

  16. Traffic accident reconstruction and an approach for prediction of fault rates using artificial neural networks: A case study in Turkey.

    Science.gov (United States)

    Can Yilmaz, Ali; Aci, Cigdem; Aydin, Kadir

    2016-08-17

    Currently, in Turkey, fault rates in traffic accidents are determined according to the initiative of accident experts (no speed analyses of vehicles just considering accident type) and there are no specific quantitative instructions on fault rates related to procession of accidents which just represents the type of collision (side impact, head to head, rear end, etc.) in No. 2918 Turkish Highway Traffic Act (THTA 1983). The aim of this study is to introduce a scientific and systematic approach for determination of fault rates in most frequent property damage-only (PDO) traffic accidents in Turkey. In this study, data (police reports, skid marks, deformation, crush depth, etc.) collected from the most frequent and controversial accident types (4 sample vehicle-vehicle scenarios) that consist of PDO were inserted into a reconstruction software called vCrash. Sample real-world scenarios were simulated on the software to generate different vehicle deformations that also correspond to energy-equivalent speed data just before the crash. These values were used to train a multilayer feedforward artificial neural network (MFANN), function fitting neural network (FITNET, a specialized version of MFANN), and generalized regression neural network (GRNN) models within 10-fold cross-validation to predict fault rates without using software. The performance of the artificial neural network (ANN) prediction models was evaluated using mean square error (MSE) and multiple correlation coefficient (R). It was shown that the MFANN model performed better for predicting fault rates (i.e., lower MSE and higher R) than FITNET and GRNN models for accident scenarios 1, 2, and 3, whereas FITNET performed the best for scenario 4. The FITNET model showed the second best results for prediction for the first 3 scenarios. Because there is no training phase in GRNN, the GRNN model produced results much faster than MFANN and FITNET models. However, the GRNN model had the worst prediction results. The

  17. Application of magnetic, geochemical and micro-morphological methods in environmental studies of urban pollution generated by road traffic

    OpenAIRE

    Bućko, Michał

    2012-01-01

    Road traffic is at present one of the major sources of environmental pollution in urban areas. Magnetic particles, heavy metals and others compounds generated by traffic can greatly affect ambient air quality and have direct implications for human health. The general aim of this research was to identify and characterize magnetic vehicle-derived particulates using magnetic, geochemical and micro-morphological methods. A combination of three different methods was used to discriminate sourc...

  18. A Space-Time Network-Based Modeling Framework for Dynamic Unmanned Aerial Vehicle Routing in Traffic Incident Monitoring Applications

    Directory of Open Access Journals (Sweden)

    Jisheng Zhang

    2015-06-01

    Full Text Available It is essential for transportation management centers to equip and manage a network of fixed and mobile sensors in order to quickly detect traffic incidents and further monitor the related impact areas, especially for high-impact accidents with dramatic traffic congestion propagation. As emerging small Unmanned Aerial Vehicles (UAVs start to have a more flexible regulation environment, it is critically important to fully explore the potential for of using UAVs for monitoring recurring and non-recurring traffic conditions and special events on transportation networks. This paper presents a space-time network- based modeling framework for integrated fixed and mobile sensor networks, in order to provide a rapid and systematic road traffic monitoring mechanism. By constructing a discretized space-time network to characterize not only the speed for UAVs but also the time-sensitive impact areas of traffic congestion, we formulate the problem as a linear integer programming model to minimize the detection delay cost and operational cost, subject to feasible flying route constraints. A Lagrangian relaxation solution framework is developed to decompose the original complex problem into a series of computationally efficient time-dependent and least cost path finding sub-problems. Several examples are used to demonstrate the results of proposed models in UAVs’ route planning for small and medium-scale networks.

  19. TCP with source traffic shaping (TCP-STS): an approach for network congestion reduction

    Science.gov (United States)

    Elaywe, Ali H.; Kamal, Ahmed E.

    2002-07-01

    The Transmission Control Protocol (TCP), provides flow control functions which are based on the window mechanism. Packet losses are detected by various mechanisms, such as timeouts and duplicate acknowledgements, and are then recovered from using different techniques. A problem that arises with the use of window based mechanisms is that the availability of a large number of credits at the source may cause a source to flood the network with back-to-back packets, which may drive the network into congestion, especially if multiple sources become active at the same time. In this paper we propose a new approach for congestion reduction. The approach works by shaping the traffic at the TCP source, such that the basic TCP flow control mechanism is still preserved, but the packet transmissions are spaced in time in order to prevent a sudden surge of traffic from overflowing the routers' buffers. Simulation results show that this technique can result in an improved network performance, in terms of reduced mean delay, delay variance, and packet dropping ratio.

  20. Prediction of Ship Traffic Flow Based on BP Neural Network and Markov Model

    Directory of Open Access Journals (Sweden)

    Lv Pengfei

    2016-01-01

    Full Text Available This paper discusses the distribution regularity of ship arrival and departure and the method of prediction of ship traffic flow. Depict the frequency histograms of ships arriving to port every day and fit the curve of the frequency histograms with a variety of distribution density function by using the mathematical statistic methods based on the samples of ship-to-port statistics of Fangcheng port nearly a year. By the chi-square testing: the fitting with Negative Binomial distribution and t-Location Scale distribution are superior to normal distribution and Logistic distribution in the branch channel; the fitting with Logistic distribution is superior to normal distribution, Negative Binomial distribution and t-Location Scale distribution in main channel. Build the BP neural network and Markov model based on BP neural network model to forecast ship traffic flow of Fangcheng port. The new prediction model is superior to BP neural network model by comparing the relative residuals of predictive value, which means the new model can improve the prediction accuracy.

  1. Temporal Classification Error Compensation of Convolutional Neural Network for Traffic Sign Recognition

    Science.gov (United States)

    Yoon, Seungjong; Kim, Eungtae

    2017-02-01

    In this paper, we propose the method that classifies the traffic signs by using Convolutional Neural Network(CNN) and compensates the error rate of CNN using the temporal correlation between adjacent successive frames. Instead of applying a conventional CNN architecture with more layers, Temporal Classification Error Compensation(TCEC) is proposed to improve the error rate in the architecture which has less nodes and layers than a conventional CNN. Experimental results show that the complexity of the proposed method could be reduced by 50% compared with that of the conventional CNN with same layers, and the error rate could be improved by about 3%.

  2. A Practical Method for Multilevel Classification and Accounting of Traffic in Computer Networks

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Pedersen, Jens Myrup

    the service provider (as Facebook, YouTube, or Google). Furthermore, Deep Packet Inspection (DPI), which seems to be the most accurate technique, in addition to the extensive needs for resources, often cannot be used by ISPs in their networks due to privacy or legal reasons. Techniques based on Machine......, SSH, and Telnet. Within each application group we identify a number of behaviors -- for example, for HTTP, we selected file transfer, web browsing, web radio, and unknown. Our system built based on the method provides also traffic accounting and it was tested on 2 datasets. The classification results...

  3. A sensor network architecture for urban traffic state estimation with mixed eulerian/lagrangian sensing based on distributed computing

    KAUST Repository

    Canepa, Edward S.

    2014-01-01

    This article describes a new approach to urban traffic flow sensing using decentralized traffic state estimation. Traffic sensor data is generated both by fixed traffic flow sensor nodes and by probe vehicles equipped with a short range transceiver. The data generated by these sensors is sent to a local coordinator node, that poses the problem of estimating the local state of traffic as a mixed integer linear program (MILP). The resulting optimization program is then solved by the nodes in a distributed manner, using branch-and-bound methods. An optimal amount of noise is then added to the maps before dissemination to a central database. Unlike existing probe-based traffic monitoring systems, this system does not transmit user generated location tracks nor any user presence information to a centralized server, effectively preventing privacy attacks. A simulation of the system performance on computer-generated traffic data shows that the system can be implemented with currently available technology. © 2014 Springer International Publishing Switzerland.

  4. Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

    Directory of Open Access Journals (Sweden)

    Dan Tang

    2014-01-01

    Full Text Available The low-rate denial of service (LDoS attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.

  5. Achieving Passive Localization with Traffic Light Schedules in Urban Road Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiang Niu

    2016-10-01

    Full Text Available Localization is crucial for the monitoring applications of cities, such as road monitoring, environment surveillance, vehicle tracking, etc. In urban road sensor networks, sensors are often sparely deployed due to the hardware cost. Under this sparse deployment, sensors cannot communicate with each other via ranging hardware or one-hop connectivity, rendering the existing localization solutions ineffective. To address this issue, this paper proposes a novel Traffic Lights Schedule-based localization algorithm (TLS, which is built on the fact that vehicles move through the intersection with a known traffic light schedule. We can first obtain the law by binary vehicle detection time stamps and describe the law as a matrix, called a detection matrix. At the same time, we can also use the known traffic light information to construct the matrices, which can be formed as a collection called a known matrix collection. The detection matrix is then matched in the known matrix collection for identifying where sensors are located on urban roads. We evaluate our algorithm by extensive simulation. The results show that the localization accuracy of intersection sensors can reach more than 90%. In addition, we compare it with a state-of-the-art algorithm and prove that it has a wider operational region.

  6. Combination Adaptive Traffic Algorithm and Coordinated Sleeping in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2014-12-01

    Full Text Available Wireless sensor network (WSN uses a battery as its primary power source, so that WSN will be limited to battery power for long operations. The WSN should be able to save the energy consumption in order to operate in a long time.WSN has the potential to be the future of wireless communications solutions. WSN are small but has a variety of functions that can help human life. WSN has the wide variety of sensors and can communicate quickly making it easier for people to obtain information accurately and quickly. In this study, we combine adaptive traffic algorithms and coordinated sleeping as power‐efficient WSN solution. We compared the performance of our proposed ideas combination adaptive traffic and coordinated sleeping algorithm with non‐adaptive scheme. From the simulation results, our proposed idea has good‐quality data transmission and more efficient in energy consumption, but it has higher delay than that of non‐adaptive scheme. Keywords:WSN,adaptive traffic,coordinated sleeping,beacon order,superframe order.

  7. Visualizing Network Traffic to Understand the Performance of Massively Parallel Simulations

    KAUST Repository

    Landge, A. G.

    2012-12-01

    The performance of massively parallel applications is often heavily impacted by the cost of communication among compute nodes. However, determining how to best use the network is a formidable task, made challenging by the ever increasing size and complexity of modern supercomputers. This paper applies visualization techniques to aid parallel application developers in understanding the network activity by enabling a detailed exploration of the flow of packets through the hardware interconnect. In order to visualize this large and complex data, we employ two linked views of the hardware network. The first is a 2D view, that represents the network structure as one of several simplified planar projections. This view is designed to allow a user to easily identify trends and patterns in the network traffic. The second is a 3D view that augments the 2D view by preserving the physical network topology and providing a context that is familiar to the application developers. Using the massively parallel multi-physics code pF3D as a case study, we demonstrate that our tool provides valuable insight that we use to explain and optimize pF3D-s performance on an IBM Blue Gene/P system. © 1995-2012 IEEE.

  8. Network-Wide Traffic Anomaly Detection and Localization Based on Robust Multivariate Probabilistic Calibration Model

    Directory of Open Access Journals (Sweden)

    Yuchong Li

    2015-01-01

    Full Text Available Network anomaly detection and localization are of great significance to network security. Compared with the traditional methods of host computer, single link and single path, the network-wide anomaly detection approaches have distinctive advantages with respect to detection precision and range. However, when facing the actual problems of noise interference or data loss, the network-wide anomaly detection approaches also suffer significant performance reduction or may even become unavailable. Besides, researches on anomaly localization are rare. In order to solve the mentioned problems, this paper presents a robust multivariate probabilistic calibration model for network-wide anomaly detection and localization. It applies the latent variable probability theory with multivariate t-distribution to establish the normal traffic model. Not only does the algorithm implement network anomaly detection by judging whether the sample’s Mahalanobis distance exceeds the threshold, but also it locates anomalies by contribution analysis. Both theoretical analysis and experimental results demonstrate its robustness and wider use. The algorithm is applicable when dealing with both data integrity and loss. It also has a stronger resistance over noise interference and lower sensitivity to the change of parameters, all of which indicate its performance stability.

  9. The guitar chord-generating algorithm based on complex network

    Science.gov (United States)

    Ren, Tao; Wang, Yi-fan; Du, Dan; Liu, Miao-miao; Siddiqi, Awais

    2016-02-01

    This paper aims to generate chords for popular songs automatically based on complex network. Firstly, according to the characteristics of guitar tablature, six chord networks of popular songs by six pop singers are constructed and the properties of all networks are concluded. By analyzing the diverse chord networks, the accompaniment regulations and features are shown, with which the chords can be generated automatically. Secondly, in terms of the characteristics of popular songs, a two-tiered network containing a verse network and a chorus network is constructed. With this network, the verse and chorus can be composed respectively with the random walk algorithm. Thirdly, the musical motif is considered for generating chords, with which the bad chord progressions can be revised. This method can make the accompaniments sound more melodious. Finally, a popular song is chosen for generating chords and the new generated accompaniment sounds better than those done by the composers.

  10. Automatic Generation of Least-Possible-Impact Traffic Management Initiatives Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Weather accounts for 70% of the annual cost of air traffic delays and cancellations, of which about 60% are estimated to be avoidable. Traffic Management Initiatives...

  11. Advancing interconnect density for spiking neural network hardware implementations using traffic-aware adaptive network-on-chip routers.

    Science.gov (United States)

    Carrillo, Snaider; Harkin, Jim; McDaid, Liam; Pande, Sandeep; Cawley, Seamus; McGinley, Brian; Morgan, Fearghal

    2012-09-01

    The brain is highly efficient in how it processes information and tolerates faults. Arguably, the basic processing units are neurons and synapses that are interconnected in a complex pattern. Computer scientists and engineers aim to harness this efficiency and build artificial neural systems that can emulate the key information processing principles of the brain. However, existing approaches cannot provide the dense interconnect for the billions of neurons and synapses that are required. Recently a reconfigurable and biologically inspired paradigm based on network-on-chip (NoC) and spiking neural networks (SNNs) has been proposed as a new method of realising an efficient, robust computing platform. However, the use of the NoC as an interconnection fabric for large-scale SNNs demands a good trade-off between scalability, throughput, neuron/synapse ratio and power consumption. This paper presents a novel traffic-aware, adaptive NoC router, which forms part of a proposed embedded mixed-signal SNN architecture called EMBRACE (EMulating Biologically-inspiRed ArChitectures in hardwarE). The proposed adaptive NoC router provides the inter-neuron connectivity for EMBRACE, maintaining router communication and avoiding dropped router packets by adapting to router traffic congestion. Results are presented on throughput, power and area performance analysis of the adaptive router using a 90 nm CMOS technology which outperforms existing NoCs in this domain. The adaptive behaviour of the router is also verified on a Stratix II FPGA implementation of a 4 × 2 router array with real-time traffic congestion. The presented results demonstrate the feasibility of using the proposed adaptive NoC router within the EMBRACE architecture to realise large-scale SNNs on embedded hardware. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Modeling and Simulation of Road Traffic Noise Using Artificial Neural Network and Regression.

    Science.gov (United States)

    Honarmand, M; Mousavi, S M

    2014-04-01

    Modeling and simulation of noise pollution has been done in a large city, where the population is over 2 millions. Two models of artificial neural network and regression were developed to predict in-city road traffic noise pollution with using the data of noise measurements and vehicle counts at three points of the city for a period of 12 hours. The MATLAB and DATAFIT softwares were used for simulation. The predicted results of noise level were compared with the measured noise levels in three stations. The values of normalized bias, sum of squared errors, mean of squared errors, root mean of squared errors, and squared correlation coefficient calculated for each model show the results of two models are suitable, and the predictions of artificial neural network are closer to the experimental data.

  13. Reliable Path Selection Problem in Uncertain Traffic Network after Natural Disaster

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2013-01-01

    Full Text Available After natural disaster, especially for large-scale disasters and affected areas, vast relief materials are often needed. In the meantime, the traffic networks are always of uncertainty because of the disaster. In this paper, we assume that the edges in the network are either connected or blocked, and the connection probability of each edge is known. In order to ensure the arrival of these supplies at the affected areas, it is important to select a reliable path. A reliable path selection model is formulated, and two algorithms for solving this model are presented. Then, adjustable reliable path selection model is proposed when the edge of the selected reliable path is broken. And the corresponding algorithms are shown to be efficient both theoretically and numerically.

  14. Improved network convergence and quality of service by strict priority queuing of routing traffic

    Science.gov (United States)

    Balandin, Sergey; Heiner, Andreas P.

    2002-07-01

    During the transient period after a link failure the network cannot guarantee the agreed service levels to user data. This is due to the fact that forwarding tables in the network are inconsistent. Moreover, link states can inadvertently be advertised wrong due to protocol time outs, which may result in persistent route flaps. Reducing the probability of wrongly advertised link states, and the time during which the forwarding tables are inconsistent, is therefore of eminent importance to provide consistent and high level QoS to user data. By queuing routing traffic in a queue with strict priority over all other (data) queues, i.e. assigning the highest priority in a Differentiated Services model, we were able to reduce the probability of routing data loss to almost zero, and reduce flooding times almost to their theoretical limit. The quality of service provided to user traffic was considerable higher than without the proposed modification. The scheme is independent of the routing protocol, and can be used with most differentiated service models. It is compatible with the current OSPF standard, and can be used in conjunction with other improvements in the protocol with similar objectives.

  15. Energy-Saving Traffic Scheduling in Hybrid Software Defined Wireless Rechargeable Sensor Networks.

    Science.gov (United States)

    Wei, Yunkai; Ma, Xiaohui; Yang, Ning; Chen, Yijin

    2017-09-15

    Software Defined Wireless Rechargeable Sensor Networks (SDWRSNs) are an inexorable trend for Wireless Sensor Networks (WSNs), including Wireless Rechargeable Sensor Network (WRSNs). However, the traditional network devices cannot be completely substituted in the short term. Hybrid SDWRSNs, where software defined devices and traditional devices coexist, will last for a long time. Hybrid SDWRSNs bring new challenges as well as opportunities for energy saving issues, which is still a key problem considering that the wireless chargers are also exhaustible, especially in some rigid environment out of the main supply. Numerous energy saving schemes for WSNs, or even some works for WRSNs, are no longer suitable for the new features of hybrid SDWRSNs. To solve this problem, this paper puts forward an Energy-saving Traffic Scheduling (ETS) algorithm. The ETS algorithm adequately considers the new characters in hybrid SDWRSNs, and takes advantage of the Software Defined Networking (SDN) controller's direct control ability on SDN nodes and indirect control ability on normal nodes. The simulation results show that, comparing with traditional Minimum Transmission Energy (MTE) protocol, ETS can substantially improve the energy efficiency in hybrid SDWRSNs for up to 20-40% while ensuring feasible data delay.

  16. Energy-Saving Traffic Scheduling in Hybrid Software Defined Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yunkai Wei

    2017-09-01

    Full Text Available Software Defined Wireless Rechargeable Sensor Networks (SDWRSNs are an inexorable trend for Wireless Sensor Networks (WSNs, including Wireless Rechargeable Sensor Network (WRSNs. However, the traditional network devices cannot be completely substituted in the short term. Hybrid SDWRSNs, where software defined devices and traditional devices coexist, will last for a long time. Hybrid SDWRSNs bring new challenges as well as opportunities for energy saving issues, which is still a key problem considering that the wireless chargers are also exhaustible, especially in some rigid environment out of the main supply. Numerous energy saving schemes for WSNs, or even some works for WRSNs, are no longer suitable for the new features of hybrid SDWRSNs. To solve this problem, this paper puts forward an Energy-saving Traffic Scheduling (ETS algorithm. The ETS algorithm adequately considers the new characters in hybrid SDWRSNs, and takes advantage of the Software Defined Networking (SDN controller’s direct control ability on SDN nodes and indirect control ability on normal nodes. The simulation results show that, comparing with traditional Minimum Transmission Energy (MTE protocol, ETS can substantially improve the energy efficiency in hybrid SDWRSNs for up to 20–40% while ensuring feasible data delay.

  17. Energy-Saving Traffic Scheduling in Hybrid Software Defined Wireless Rechargeable Sensor Networks

    Science.gov (United States)

    Wei, Yunkai; Ma, Xiaohui; Yang, Ning; Chen, Yijin

    2017-01-01

    Software Defined Wireless Rechargeable Sensor Networks (SDWRSNs) are an inexorable trend for Wireless Sensor Networks (WSNs), including Wireless Rechargeable Sensor Network (WRSNs). However, the traditional network devices cannot be completely substituted in the short term. Hybrid SDWRSNs, where software defined devices and traditional devices coexist, will last for a long time. Hybrid SDWRSNs bring new challenges as well as opportunities for energy saving issues, which is still a key problem considering that the wireless chargers are also exhaustible, especially in some rigid environment out of the main supply. Numerous energy saving schemes for WSNs, or even some works for WRSNs, are no longer suitable for the new features of hybrid SDWRSNs. To solve this problem, this paper puts forward an Energy-saving Traffic Scheduling (ETS) algorithm. The ETS algorithm adequately considers the new characters in hybrid SDWRSNs, and takes advantage of the Software Defined Networking (SDN) controller’s direct control ability on SDN nodes and indirect control ability on normal nodes. The simulation results show that, comparing with traditional Minimum Transmission Energy (MTE) protocol, ETS can substantially improve the energy efficiency in hybrid SDWRSNs for up to 20–40% while ensuring feasible data delay. PMID:28914816

  18. Deep neural network for traffic sign recognition systems: An analysis of spatial transformers and stochastic optimisation methods.

    Science.gov (United States)

    Arcos-García, Álvaro; Álvarez-García, Juan A; Soria-Morillo, Luis M

    2018-01-31

    This paper presents a Deep Learning approach for traffic sign recognition systems. Several classification experiments are conducted over publicly available traffic sign datasets from Germany and Belgium using a Deep Neural Network which comprises Convolutional layers and Spatial Transformer Networks. Such trials are built to measure the impact of diverse factors with the end goal of designing a Convolutional Neural Network that can improve the state-of-the-art of traffic sign classification task. First, different adaptive and non-adaptive stochastic gradient descent optimisation algorithms such as SGD, SGD-Nesterov, RMSprop and Adam are evaluated. Subsequently, multiple combinations of Spatial Transformer Networks placed at distinct positions within the main neural network are analysed. The recognition rate of the proposed Convolutional Neural Network reports an accuracy of 99.71% in the German Traffic Sign Recognition Benchmark, outperforming previous state-of-the-art methods and also being more efficient in terms of memory requirements. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    Science.gov (United States)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure

  20. Power Optimization Techniques for Next Generation Wireless Networks

    OpenAIRE

    Ratheesh R; Vetrivelan P

    2016-01-01

    The massive data traffic and the need for high speed wireless communication is increasing day by day corresponds to an exponential increase in the consumption of power by Information and Communication Technology (ICT) sector. Reducing consumption of power in wireless network is a challenging topic and has attracted the attention of researches around the globe. Many techniques like multiple-input multiple-output (MIMO), cognitive radio, cooperative heterogeneous communications and new netwo...

  1. System and method for generating a relationship network

    Science.gov (United States)

    Franks, Kasian [Kensington, CA; Myers, Cornelia A [St. Louis, MO; Podowski, Raf M [Pleasant Hill, CA

    2011-07-26

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  2. Amplified CWDM-based Next Generation Broadband Access Networks

    Science.gov (United States)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  3. An Interference-Aware Traffic-Priority-Based Link Scheduling Algorithm for Interference Mitigation in Multiple Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Thien T. T. Le

    2016-12-01

    Full Text Available Currently, wireless body area networks (WBANs are effectively used for health monitoring services. However, in cases where WBANs are densely deployed, interference among WBANs can cause serious degradation of network performance and reliability. Inter-WBAN interference can be reduced by scheduling the communication links of interfering WBANs. In this paper, we propose an interference-aware traffic-priority-based link scheduling (ITLS algorithm to overcome inter-WBAN interference in densely deployed WBANs. First, we model a network with multiple WBANs as an interference graph where node-level interference and traffic priority are taken into account. Second, we formulate link scheduling for multiple WBANs as an optimization model where the objective is to maximize the throughput of the entire network while ensuring the traffic priority of sensor nodes. Finally, we propose the ITLS algorithm for multiple WBANs on the basis of the optimization model. High spatial reuse is also achieved in the proposed ITLS algorithm. The proposed ITLS achieves high spatial reuse while considering traffic priority, packet length, and the number of interfered sensor nodes. Our simulation results show that the proposed ITLS significantly increases spatial reuse and network throughput with lower delay by mitigating inter-WBAN interference.

  4. Market driven network neutrality and the fallacies of internet traffic quality regulation

    OpenAIRE

    Knieps, Günter

    2011-01-01

    In the U.S. paying for priority arrangements between Internet access service providers and Internet application providers to favor some traffic over other traf-fic is considered unreasonable discrimination. In Europe the focus is on mini-mum traffic quality requirements. It can be shown that neither market power nor universal service arguments can justify traffic quality regulation. In particular, heterogeneous demand for traffic quality for delay sensitive versus delay insen-sitive applicati...

  5. Using Visualization Techniques in Multilayer Traffic Modeling

    Science.gov (United States)

    Bragg, Arnold

    We describe visualization techniques for multilayer traffic modeling - i.e., traffic models that span several protocol layers, and traffic models of protocols that cross layers. Multilayer traffic modeling is challenging, as one must deal with disparate traffic sources; control loops; the effects of network elements such as IP routers; cross-layer protocols; asymmetries in bandwidth, session lengths, and application behaviors; and an enormous number of complex interactions among the various factors. We illustrate by using visualization techniques to identify relationships, transformations, and scaling; to smooth simulation and measurement data; to examine boundary cases, subtle effects and interactions, and outliers; to fit models; and to compare models with others that have fewer parameters. Our experience suggests that visualization techniques can provide practitioners with extraordinary insight about complex multilayer traffic effects and interactions that are common in emerging next-generation networks.

  6. Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network

    Science.gov (United States)

    Gilani, Syed Sherjeel Ahmad; Zubair, Muhammad; Khan, Zeeshan Shafi

    Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.

  7. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    Science.gov (United States)

    2015-12-01

    Topology Generator [BRITE])1 writing models and scenarios remains a manual, complex, and time-consuming task. Models are used to represent nodes...protocols. We identified limitations and implemented a system that could utilize some of these tools to extract the vocabulary and grammar . We collected 3...sniffer or by specifying an existing capture, network flow, or other accepted formats. • Protocol inference modules: The vocabulary and grammar inference

  8. An efficient mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2014-08-01

    This paper proposes an efficient overlay multicast provisioning (OMP) mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks. To facilitate request provisioning, OMP jointly utilizes a data learning (DL) scheme on the IP/MPLS layer for logical link cost estimation, and a lightpath fragmentation (LPF) based method on the WDM layer for improving resource sharing in grooming process. Extensive simulations are carried out to evaluate the performance of OMP mechanism under different traffic loads, with either limited or unlimited port resources. Simulation results demonstrate that OMP significantly outperforms the existing methods. To evaluate the respective influences of the DL scheme and the LPF method on OMP performance, provisioning mechanisms only utilizing either the IP/MPLS layer DL scheme or the WDM layer LPF method are also devised. Comparison results show that both DL and LPF methods help improve OMP blocking performance, and contribution from the DL scheme is more significant when the fixed routing and first-fit wavelength assignment (RWA) strategy is adopted on the WDM layer. Effects of a few other factors, including definition of connection cost to be reported by the WDM layer to the IP/MPLS layer and WDM-layer routing method, on OMP performance are also evaluated.

  9. On-Chip SDM Switching for Unicast, Multicast and Traffic Grooming in Data Center Networks

    DEFF Research Database (Denmark)

    Kamchevska, Valerija; Ding, Yunhong; Dalgaard, Kjeld

    2017-01-01

    This paper reports on the use of a novel photonic integrated circuit that facilitates multicast and grooming in an optical data center architecture. The circuit allows for on-chip spatial multiplexing and demultiplexing as well as fiber core switching. Using this device, we experimentally verify...... that multicast and/or grooming can be successfully performed along the full range of output ports, for different group size and different power ratio. Moreover, we experimentally demonstrate SDM transmission and 5 Tbit/s switching using the on-chip fiber switch with integrated fan-in/fan-out devices and achieve...... errorfree performance (BER≤10-9) for a network scenario including simultaneous unicast/multicast switching and traffic grooming....

  10. Modeling Air Traffic Management Technologies with a Queuing Network Model of the National Airspace System

    Science.gov (United States)

    Long, Dou; Lee, David; Johnson, Jesse; Gaier, Eric; Kostiuk, Peter

    1999-01-01

    This report describes an integrated model of air traffic management (ATM) tools under development in two National Aeronautics and Space Administration (NASA) programs -Terminal Area Productivity (TAP) and Advanced Air Transport Technologies (AATT). The model is made by adjusting parameters of LMINET, a queuing network model of the National Airspace System (NAS), which the Logistics Management Institute (LMI) developed for NASA. Operating LMINET with models of various combinations of TAP and AATT will give quantitative information about the effects of the tools on operations of the NAS. The costs of delays under different scenarios are calculated. An extension of Air Carrier Investment Model (ACIM) under ASAC developed by the Institute for NASA maps the technologies' impacts on NASA operations into cross-comparable benefits estimates for technologies and sets of technologies.

  11. Impact of the traffic load on performance of an alternative LTE railway communication network

    DEFF Research Database (Denmark)

    Sniady, Aleksander; Soler, José

    2013-01-01

    obstructing railway operations at big train stations and junctions. Hence, other technologies, such as Long Term Evolution (LTE), need to be considered as an alternative to GSM-R. The goal of this paper is to demonstrate the capacity increase that railways can expect, from the introduction of LTE as internal...... communication infrastructure supporting railway signaling. This work is based on OPNET realistic network simulations, which show the relation between the traffic load (the number of trains transmitting and receiving data in an LTE cell) and the delay performance of the European Train Control System (ETCS......) signaling, which is one of the essential railway communication services. Results of the simulations demonstrate that LTE can solve the urgent capacity problem faced by railways currently deploying GSM-R....

  12. Building next-generation converged networks theory and practice

    CERN Document Server

    Pathan, Al-Sakib Khan

    2013-01-01

    Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6L

  13. IPTV traffic management using topology-based hierarchical scheduling in Carrier Ethernet transport networks

    DEFF Research Database (Denmark)

    Yu, Hao; Yan, Ying; Berger, Michael Stubert

    2009-01-01

    Carrier Ethernet is becoming a favorable access technology for Next Generation Network (NGN). The features of cost-efficiency, operation flexibility and high bandwidth have a great attraction to service providers. However, to achieve these characteristics, Carrier Ethernet needs to have Quality o....... This work has been carried out as a part of the research project HIPT (High quality IP network for IPTV and VoIP) founded by Danish Advanced Technology Foundation....

  14. Next generation network performance management: a business perspective

    CSIR Research Space (South Africa)

    Harding, C

    2010-08-01

    Full Text Available This paper addresses a Next Generation Network (NGN) performance management model in a business context. The CSIR is currently in the process of the concept design for the new Next Generation Communications Network (NGCN) for a large South African...

  15. Transient stability analysis of a distribution network with distributed generators

    NARCIS (Netherlands)

    Xyngi, I.; Ishchenko, A.; Popov, M.; Van der Sluis, L.

    2009-01-01

    This letter describes the transient stability analysis of a 10-kV distribution network with wind generators, microturbines, and CHP plants. The network being modeled in Matlab/Simulink takes into account detailed dynamic models of the generators. Fault simulations at various locations are

  16. A cost-effective traffic data collection system based on the iDEN mobile telecommunication network.

    Science.gov (United States)

    2008-10-01

    This report describes a cost-effective data collection system for Caltrans 170 traffic signal : controller. The data collection system is based on TCP/IP communication over existing : low-cost mobile communication networks and Motorola iDEN1 mobile...

  17. Centralized Networks to Generate Human Body Motions.

    Science.gov (United States)

    Vakulenko, Sergei; Radulescu, Ovidiu; Morozov, Ivan; Weber, Andres

    2017-12-14

    We consider continuous-time recurrent neural networks as dynamical models for the simulation of human body motions. These networks consist of a few centers and many satellites connected to them. The centers evolve in time as periodical oscillators with different frequencies. The center states define the satellite neurons' states by a radial basis function (RBF) network. To simulate different motions, we adjust the parameters of the RBF networks. Our network includes a switching module that allows for turning from one motion to another. Simulations show that this model allows us to simulate complicated motions consisting of many different dynamical primitives. We also use the model for learning human body motion from markers' trajectories. We find that center frequencies can be learned from a small number of markers and can be transferred to other markers, such that our technique seems to be capable of correcting for missing information resulting from sparse control marker settings.

  18. Innovation and networking among entrepreneurs across generations of Asian tigers

    DEFF Research Database (Denmark)

    Brambini-Pedersen, Jan Vang; Jensen, Kent W; Schøtt, Thomas

    2017-01-01

    Much attention has been paid to analysing the determinants of the economic development in the different generations of Asian tiger economies. This stream of research has provided valuable insights on the particular generational challenges, the tigers face in implementing successful catching up...... entrepreneurship monitor (GEM) data, this paper aims at reducing this research gap by conducting an analysis of the generational differences between the tiger economies entrepreneurs in respect to their innovative performance, their inclination to network and the importance of the quality of the network...... for their innovative performance. The paper finds a significant difference in the quality of the networks and its impact on innovation across the tiger generations....

  19. Traffic data collection and anonymous vehicle detection using wireless sensor networks : research summary.

    Science.gov (United States)

    2012-05-01

    Problem: : Most Intelligent Transportation System (ITS) applications require distributed : acquisition of various traffic metrics such as traffic speed, volume, and density. : The existing measurement technologies, such as inductive loops, infrared, ...

  20. Traffic data collection and anonymous vehicle detection using wireless sensor networks.

    Science.gov (United States)

    2012-05-01

    New traffic sensing devices based on wireless sensing technologies were designed and tested. Such devices encompass a cost-effective, battery-free, and energy self-sustained architecture for real-time traffic measurement over distributed points in a ...

  1. An Intelligent Traffic Flow Control System Based on Radio Frequency Identification and Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Chao, Kuei-Hsiang; Chen, Pi-Yun

    2014-01-01

    This study primarily focuses on the use of radio frequency identification (RFID) as a form of traffic flow detection, which transmits collected information related to traffic flow directly to a control system through an RS232 interface...

  2. Analysis of real-time crash risk for expressway ramps using traffic, geometric, trip generation, and socio-demographic predictors.

    Science.gov (United States)

    Wang, Ling; Abdel-Aty, Mohamed; Lee, Jaeyoung; Shi, Qi

    2017-07-07

    There have been numerous studies on real-time crash prediction seeking to link real-time crash likelihood with traffic and environmental predictors. Nevertheless, none has explored the impact of socio-demographic and trip generation parameters on real-time crash risk. This study analyzed the real-time crash risk for expressway ramps using traffic, geometric, socio-demographic, and trip generation predictors. Two Bayesian logistic regression models were utilized to identify crash precursors and their impact on ramp crash risk. Meanwhile, four Support Vector Machines (SVM) were applied to predict crash occurrence. Bayesian logistic regression models and SVMs commonly showed that the models with the socio-demographic and trip generation variables outperform their counterparts without those parameters. It indicates that the socio-demographic and trip generation parameters have significant impact on the real-time crash risk. The Bayesian logistic regression model results showed that the logarithm of vehicle count, speed, and percentage of home-based-work production had positive impact on crash risk. Meanwhile, off-ramps or non-diamond-ramps experienced higher crash potential than on-ramps or diamond-ramps, respectively. Though the SVMs provided good model performance, the SVM model with all variables (i.e., all traffic, geometric, socio-demographic, and trip generation variables) had an overfitting problem. Therefore, it is recommended to build SVM models based on significant variables identified by other models, such as logistic regression. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Phoebus: Network Middleware for Next-Generation Network Computing

    Energy Technology Data Exchange (ETDEWEB)

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  4. Traffic-generated noise pollution: exposure of road users and populations in Metropolitan Kuwait.

    Science.gov (United States)

    Al-Mutairi, N Z; Al-Attar, M A; Al-Rukaibi, F S

    2011-12-01

    This study was carried out in metropolitan Kuwait with a sound level meter to assess peak hour and off-peak hour noise level. In local/collector streets, noise ranged between 56.0 to 79.2 dBA and 55.3 to 76.4 dBA; in arterial streets, 62.3 to 89.2 dBA and 59.6 to 78.9 dBA; and in freeways, 66.7 to 94.8 dBA and 64.9 to 89.1 dBA during peak and off-peak hour respectively. Values were higher than their prescribed standards which may pose a significant impact on quality of life. Findings of this research have shown that the level of traffic-generated noise pollution in Kuwait urban area is high enough to adversely affect the human health and well-being of its residents. Over 1,400 subjects responded to a randomly administered survey that assessed the physical health, personal well-being, and mental health. People residing in neighborhoods exposed to higher noise levels have significantly higher stress and noise annoyance levels and also adversely affected their sense of well-being. In the responder analysis, those people living in quiet neighborhoods had significantly higher mean scores in general health (35 points higher, p vitality (30 points higher, p < 0.05), and mental health (20 points higher, p < 0.05) when compared to the other group. In addition, the component scores of stress and noise sensitivity for the participants living in quiet neighborhoods had significantly lower values (30 points lower and 59 points lower, respectively) than that of the participants living in noisy neighborhood. With the rapid expansion of the infrastructures in metropolitan Kuwait, it is virtually definite that traffic noise will shortly assume a dangerous dimension, and will be a ground of escalating fear for both the public and liable policy-makers. The quality of life in metropolitan Kuwait will certainly be negatively affected.

  5. Timing analysis of rate-constrained traffic in TTEthernet using network calculus

    DEFF Research Database (Denmark)

    Zhao, Luxi; Pop, Paul; Li, Qiao

    2017-01-01

    calculus (NC) to determine the worst-case end-to-end delays of RC traffic in TTEthernet. The main contribution of this paper is capturing the effects of all the integration policies on the latency bounds of RC traffic using NC, and the consideration of relative frame offsets of TT traffic to reduce...

  6. Modelling and Implementation of QoS in Wireless Sensor Networks: A Multiconstrained Traffic Engineering Model

    Directory of Open Access Journals (Sweden)

    Bagula AntoineB

    2010-01-01

    Full Text Available This paper revisits the problem of Quality of Service (QoS provisioning to assess the relevance of using multipath routing to improve the reliability and packet delivery in wireless sensor networks while maintaining lower power consumption levels. Building upon a previous benchmark, we propose a traffic engineering model that relies on delay, reliability, and energy-constrained paths to achieve faster, reliable, and energy-efficient transmission of the information routed by a wireless sensor network. As a step forward into the implementation of the proposed QoS model, we describe the initial steps of its packet forwarding protocol and highlight the tradeoff between the complexity of the model and the ease of implementation. Using simulation, we demonstrate the relative efficiency of our proposed model compared to single path routing, disjoint path routing, and the previously proposed benchmarks. The results reveal that by achieving a good tradeoff between delay minimization, reliability maximization, and path set selection, our model outperforms the other models in terms of energy consumption and quality of paths used to route the information.

  7. Traffic Adaptive Synchronized Cluster Based MAC Protocol for Cognitive Radio Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Sultana Sahelee

    2017-01-01

    Full Text Available In wireless communication, Cognitive Radio Network (CRN is the contemporary research area to improve efficiency and spectrum utilization. It is structured with both licensed users and unlicensed users. In CRN, unlicensed users also called Cognitive Radio (CR users are permitted to utilize the free/idle of licensed channels without harmful interference to licensed users. However, accessing idle channels is the big challenging issue due to licensed users’ activities. A large number of cluster based MAC protocol have been proposed to solve this issue. In this paper, we have come up with a Traffic Adaptive Synchronized Cluster Based MAC Protocol for Cognitive Radio Ad Hoc Network, with the target of creating cluster structure more vigorous to the licensed users’ channel re-occupancy actions, maximize throughput, and minimize switching delay, so that CR users be able to use the idle spectrum more efficiently. In our protocol, clusters are formed according to Cluster Identification Channel (CIC and inter-communication is completed without gateway nodes. Finally, we have analysed and implemented our protocol through simulation and it provides better performance in terms of different performance metrics.

  8. CROSS LAYERED HYBRID TRANSPORT LAYER PROTOCOL APPROACH TO ENHANCE NETWORK UTILISATION FOR VIDEO TRAFFIC

    Directory of Open Access Journals (Sweden)

    Matilda.S

    2010-03-01

    Full Text Available Video data transfer is the major traffic in today’s Internet. With the emerging need for anytime anywhere communication, applications transmitting video is gaining momentum. Real Time Protocol is the primary standard for transfer of video data, as; it requires timely delivery and can tolerate loss of packets. Streaming is the method used for delivering video content from the source server to the user. But this has many drawbacks: a It sends only the amount of data equivalent to the streaming encoded rate to the client irrespective of the available bandwidth in the path. Hence the links are underutilized; b It utilizes the link for the entire period of transfer and hence the link is not available to service other new clients. Thus as the number of clients increases, the network performance decreases. In this work, the advantages and disadvantages of the combination of different protocols in the application layer and transport layer are analyzed. The significant characteristics of each of these protocols are utilized and a combination of protocols for improving the network performance is arrived at, while retaining the QoS of video transmission.

  9. Selfish routing equilibrium in stochastic traffic network: A probability-dominant description.

    Science.gov (United States)

    Zhang, Wenyi; He, Zhengbing; Guan, Wei; Ma, Rui

    2017-01-01

    This paper suggests a probability-dominant user equilibrium (PdUE) model to describe the selfish routing equilibrium in a stochastic traffic network. At PdUE, travel demands are only assigned to the most dominant routes in the same origin-destination pair. A probability-dominant rerouting dynamic model is proposed to explain the behavioral mechanism of PdUE. To facilitate applications, the logit formula of PdUE is developed, of which a well-designed route set is not indispensable and the equivalent varitional inequality formation is simple. Two routing strategies, i.e., the probability-dominant strategy (PDS) and the dominant probability strategy (DPS), are discussed through a hypothetical experiment. It is found that, whether out of insurance or striving for perfection, PDS is a better choice than DPS. For more general cases, the conducted numerical tests lead to the same conclusion. These imply that PdUE (rather than the conventional stochastic user equilibrium) is a desirable selfish routing equilibrium for a stochastic network, given that the probability distributions of travel time are available to travelers.

  10. Selfish routing equilibrium in stochastic traffic network: A probability-dominant description

    Science.gov (United States)

    Zhang, Wenyi; Guan, Wei; Ma, Rui

    2017-01-01

    This paper suggests a probability-dominant user equilibrium (PdUE) model to describe the selfish routing equilibrium in a stochastic traffic network. At PdUE, travel demands are only assigned to the most dominant routes in the same origin-destination pair. A probability-dominant rerouting dynamic model is proposed to explain the behavioral mechanism of PdUE. To facilitate applications, the logit formula of PdUE is developed, of which a well-designed route set is not indispensable and the equivalent varitional inequality formation is simple. Two routing strategies, i.e., the probability-dominant strategy (PDS) and the dominant probability strategy (DPS), are discussed through a hypothetical experiment. It is found that, whether out of insurance or striving for perfection, PDS is a better choice than DPS. For more general cases, the conducted numerical tests lead to the same conclusion. These imply that PdUE (rather than the conventional stochastic user equilibrium) is a desirable selfish routing equilibrium for a stochastic network, given that the probability distributions of travel time are available to travelers. PMID:28829834

  11. Convergence of wireless, wireline, and photonics next generation networks

    CERN Document Server

    Iniewski, Krzysztof

    2010-01-01

    Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge

  12. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  13. Track wear-and-tear cost by traffic class: Functional form, zero output levels and marginal cost pricing recovery on the French rail network

    OpenAIRE

    Gaudry, Marc; Quinet, Emile

    2009-01-01

    We address the issue of the allocation of railway track maintenance (wear-and-tear) costs to traffic output classes and consider a very general function relating maintenance cost C to a set of technical production characteristics K used to produce traffic output vector T. We neglect other rail cost categories, such as traffic control and track renewal. The data base pertains to over 1500 sections of the French rail infrastructure in 1999, representing about 90% of the total network of 30000 k...

  14. The Operational Risk Assessment for Distribution Network with Distributed Generations

    Science.gov (United States)

    Hua, Xie; Yaqi, Wu; Yifan, Wang; Qian, Sun; Jianwei, Ma

    2017-05-01

    Distribution network is an important part of the power system and is connected to the consumers directly. Many distributed generations that have discontinuous output power are connected in the distribution networks, which may cause adverse impact to the distribution network. Therefore, to ensure the security and reliability of distribution network with numerous distributed generations, the risk analysis is necessary for this kind of distribution networks. After study of stochastic load flow algorithm, this paper applies it in the static security risk assessment. The wind and photovoltaic output probabilistic model are built. The voltage over-limit is chosen to calculate the risk indicators. As a case study, the IEEE 33 system is simulated for analyzing impact of distributed generations on system risk in the proposed method.

  15. Efficient Video Streaming Scheme for Next Generations of Mobile Networks

    Directory of Open Access Journals (Sweden)

    Majdi Ashibani

    2005-04-01

    Full Text Available Video streaming over next generations of mobile networks has undergone enormous development recently due to the continuing growth in wireless communication, especially since the emergence of 3G wireless networks. The new generations of wireless networks pose many challenges, including supporting quality of service over wireless communication links. This is due to the time-varying characteristics of wireless channel. Therefore, a more flexible and efficient bandwidth allocation scheme is needed. This paper is a part of ongoing work to come up with a more robust scheme that is capable of rapidly adapting to changes in network conditions. The proposed scheme focuses on the wireless part of the network, providing high quality video service and better utilization of network resources.

  16. Loss optimization in distribution networks with distributed generation

    DEFF Research Database (Denmark)

    Pokhrel, Basanta Raj; Nainar, Karthikeyan; Bak-Jensen, Birgitte

    2017-01-01

    This paper presents a novel power loss minimization approach in distribution grids considering network reconfiguration, distributed generation and storage installation. Identification of optimum configuration in such scenario is one of the main challenges faced by distribution system operators in...

  17. Custom Topology Generation for Network-on-Chip

    DEFF Research Database (Denmark)

    Stuart, Matthias Bo; Sparsø, Jens

    2007-01-01

    This paper compares simulated annealing and tabu search for generating custom topologies for applications with periodic behaviour executing on a network-on-chip. The approach differs from previous work by starting from a fixed mapping of IP-cores to routers and performing design space exploration....... An analytical model is used to determine communication latencies in the network-on-chip....

  18. Innovation and networking among entrepreneurs across generations of Asian tigers

    DEFF Research Database (Denmark)

    Brambini-Pedersen, Jan Vang; Wickstrøm Jensen, Kent; Schøtt, Thomas

    2017-01-01

    entrepreneurship monitor (GEM) data, this paper aims at reducing this research gap by conducting an analysis of the generational differences between the tiger economies entrepreneurs in respect to their innovative performance, their inclination to network and the importance of the quality of the network...

  19. Distributed network generation based on preferential attachment in ABS

    NARCIS (Netherlands)

    K. Azadbakht (Keyvan); N. Bezirgiannis (Nikolaos); F.S. de Boer (Frank)

    2017-01-01

    textabstractGeneration of social networks using Preferential Attachment (PA) mechanism is proposed in the Barabasi-Albert model. In this mechanism, new nodes are introduced to the network sequentially and they attach to the existing nodes preferentially where the preference can be based on the

  20. Using Generalized Entropies and OC-SVM with Mahalanobis Kernel for Detection and Classification of Anomalies in Network Traffic

    Directory of Open Access Journals (Sweden)

    Jayro Santiago-Paz

    2015-09-01

    Full Text Available Network anomaly detection and classification is an important open issue in network security. Several approaches and systems based on different mathematical tools have been studied and developed, among them, the Anomaly-Network Intrusion Detection System (A-NIDS, which monitors network traffic and compares it against an established baseline of a “normal” traffic profile. Then, it is necessary to characterize the “normal” Internet traffic. This paper presents an approach for anomaly detection and classification based on Shannon, Rényi and Tsallis entropies of selected features, and the construction of regions from entropy data employing the Mahalanobis distance (MD, and One Class Support Vector Machine (OC-SVM with different kernels (Radial Basis Function (RBF and Mahalanobis Kernel (MK for “normal” and abnormal traffic. Regular and non-regular regions built from “normal” traffic profiles allow anomaly detection, while the classification is performed under the assumption that regions corresponding to the attack classes have been previously characterized. Although this approach allows the use of as many features as required, only four well-known significant features were selected in our case. In order to evaluate our approach, two different data sets were used: one set of real traffic obtained from an Academic Local Area Network (LAN, and the other a subset of the 1998 MIT-DARPA set. For these data sets, a True positive rate up to 99.35%, a True negative rate up to 99.83% and a False negative rate at about 0.16% were yielded. Experimental results show that certain q-values of the generalized entropies and the use of OC-SVM with RBF kernel improve the detection rate in the detection stage, while the novel inclusion of MK kernel in OC-SVM and k-temporal nearest neighbors improve accuracy in classification. In addition, the results show that using the Box-Cox transformation, the Mahalanobis distance yielded high detection rates with

  1. POLLING AND DUAL-LEVEL TRAFFIC ANALYSIS FOR IMPROVED DOS DETECTION IN IEEE 802.21 NETWORKS

    Directory of Open Access Journals (Sweden)

    Nygil Alex Vadakkan

    2014-06-01

    Full Text Available The IEEE 802.21 standard was developed for communication of devices in a heterogeneous environment which included greater support for handoffs. This paper focuses on the denial of service (DoS vulnerabilities faced by such Media Independent Handover (MIH networks & various effective countermeasures that can be deployed to prevent their impact on such heterogeneous networks. The use of polling mechanism coupled with real time as well as offline traffic analysis can keep a good number of attacks at bay. The use of offline traffic analysis is to use the model and compare it with a lighter model and see if any of the excluded features in the lighter model have had suspicious variations which could be a varied form of DoS attack or an attack that is completely new. The countermeasures that have been developed also allows for the increase in efficiency of data transfer as well as higher rates of success in handoffs.

  2. Modeling of regional warehouse network generation

    Directory of Open Access Journals (Sweden)

    Popov Pavel Vladimirovich

    2016-08-01

    Full Text Available One of the factors that has a significant impact on the socio-economic development of the Russian Federation’s regions is the logistics infrastructure. It provides integrated transportation and distribution service of material flows. One of the main elements of logistics infrastructure is a storage infrastructure, which includes distribution center, distribution-and-sortout and sortout warehouses. It is the most expedient to place distribution center in the vicinity of the regional center. One of the tasks of the distribution network creation within the regions of the Russian Federation is to determine the location, capacity and number of stores. When determining regional network location of general purpose warehouses methodological approaches to solving the problems of location of production and non-production can be used which depend on various economic factors. The mathematical models for solving relevant problems are the deployment models. However, the existing models focus on the dimensionless power storage. The purpose of the given work is to develop a model to determine the optimal location of general-purpose warehouses on the Russian Federation area. At the first stage of the work, the authors assess the main economic indicators influencing the choice of the location of general purpose warehouses. An algorithm for solving the first stage, based on ABC, discriminant and cluster analysis were proposed by the authors in earlier papers. At the second stage the specific locations of general purpose warehouses and their power is chosen to provide the cost minimization for the construction and subsequent maintenance of warehouses and transportation heterogeneous products. In order to solve this problem the authors developed a mathematical model that takes into account the possibility of delivery in heterogeneous goods from suppliers and manufacturers in the distribution and storage sorting with specified set of capacities. The model allows

  3. Next-Generation Environment-Aware Cellular Networks: Modern Green Techniques and Implementation Challenges

    KAUST Repository

    Ghazzai, Hakim

    2016-09-16

    Over the last decade, mobile communications have been witnessing a noteworthy increase of data traffic demand that is causing an enormous energy consumption in cellular networks. The reduction of their fossil fuel consumption in addition to the huge energy bills paid by mobile operators is considered as the most important challenges for the next-generation cellular networks. Although most of the proposed studies were focusing on individual physical layer power optimizations, there is a growing necessity to meet the green objective of fifth-generation cellular networks while respecting the user\\'s quality of service. This paper investigates four important techniques that could be exploited separately or together in order to enable wireless operators achieve significant economic benefits and environmental savings: 1) the base station sleeping strategy; 2) the optimized energy procurement from the smart grid; 3) the base station energy sharing; and 4) the green networking collaboration between competitive mobile operators. The presented simulation results measure the gain that could be obtained using these techniques compared with that of traditional scenarios. Finally, this paper discusses the issues and challenges related to the implementations of these techniques in real environments. © 2016 IEEE.

  4. Universal Intelligent Small Cell (UnISCell for next generation cellular networks

    Directory of Open Access Journals (Sweden)

    Mohammad Patwary

    2016-11-01

    Full Text Available Exploring innovative cellular architectures to achieve enhanced system capacity and good coverage has become a critical issue towards realizing the next generation of wireless communications. In this context, this paper proposes a novel concept of Universal Intelligent Small Cell (UnISCell for enabling the densification of the next generation of cellular networks. The proposed novel concept envisions an integrated platform of providing a strong linkage between different stakeholders such as street lighting networks, landline telephone networks and future wireless networks, and is universal in nature being independent of the operating frequency bands and traffic types. The main motivating factors for the proposed small cell concept are the need of public infrastructure re-engineering, and the recent advances in several enabling technologies. First, we highlight the main concepts of the proposed UnISCell platform. Subsequently, we present two deployment scenarios for the proposed UnISCell concept considering infrastructure sharing and service sharing as important aspects. We then describe the key future technologies for enabling the proposed UnISCell concept and present a use case example with the help of numerical results. Finally, we conclude this article by providing some interesting future recommendations.

  5. High-Speed Network Traffic Management Analysis and Optimization Models and Methods

    CERN Document Server

    Zaborovski, V; Podgurski, Y; Shemanin, Y

    1997-01-01

    The main steps of automatic control methodology include the hierarchical representation of management system and the formal definitions of input variables, object and goal of control of each management level. A Petri net model of individual traffic source is presented. It is noted that the current set of traffic parameters recommended by ATM-forum is not enough to synthesize optimal traffic control system. The feature of traffic self-similarity can be used to effectively solve optimal control task. An example of an optimal control scheme for cell discarding algorithm is presented.

  6. The Detection of Emerging Trends Using Wikipedia Traffic Data and Context Networks.

    Science.gov (United States)

    Kämpf, Mirko; Tessenow, Eric; Kenett, Dror Y; Kantelhardt, Jan W

    2015-01-01

    Can online media predict new and emerging trends, since there is a relationship between trends in society and their representation in online systems? While several recent studies have used Google Trends as the leading online information source to answer corresponding research questions, we focus on the online encyclopedia Wikipedia often used for deeper topical reading. Wikipedia grants open access to all traffic data and provides lots of additional (semantic) information in a context network besides single keywords. Specifically, we suggest and study context-normalized and time-dependent measures for a topic's importance based on page-view time series of Wikipedia articles in different languages and articles related to them by internal links. As an example, we present a study of the recently emerging Big Data market with a focus on the Hadoop ecosystem, and compare the capabilities of Wikipedia versus Google in predicting its popularity and life cycles. To support further applications, we have developed an open web platform to share results of Wikipedia analytics, providing context-rich and language-independent relevance measures for emerging trends.

  7. The Detection of Emerging Trends Using Wikipedia Traffic Data and Context Networks.

    Directory of Open Access Journals (Sweden)

    Mirko Kämpf

    Full Text Available Can online media predict new and emerging trends, since there is a relationship between trends in society and their representation in online systems? While several recent studies have used Google Trends as the leading online information source to answer corresponding research questions, we focus on the online encyclopedia Wikipedia often used for deeper topical reading. Wikipedia grants open access to all traffic data and provides lots of additional (semantic information in a context network besides single keywords. Specifically, we suggest and study context-normalized and time-dependent measures for a topic's importance based on page-view time series of Wikipedia articles in different languages and articles related to them by internal links. As an example, we present a study of the recently emerging Big Data market with a focus on the Hadoop ecosystem, and compare the capabilities of Wikipedia versus Google in predicting its popularity and life cycles. To support further applications, we have developed an open web platform to share results of Wikipedia analytics, providing context-rich and language-independent relevance measures for emerging trends.

  8. The Detection of Emerging Trends Using Wikipedia Traffic Data and Context Networks

    Science.gov (United States)

    Kämpf, Mirko; Tessenow, Eric; Kenett, Dror Y.; Kantelhardt, Jan W.

    2015-01-01

    Can online media predict new and emerging trends, since there is a relationship between trends in society and their representation in online systems? While several recent studies have used Google Trends as the leading online information source to answer corresponding research questions, we focus on the online encyclopedia Wikipedia often used for deeper topical reading. Wikipedia grants open access to all traffic data and provides lots of additional (semantic) information in a context network besides single keywords. Specifically, we suggest and study context-normalized and time-dependent measures for a topic’s importance based on page-view time series of Wikipedia articles in different languages and articles related to them by internal links. As an example, we present a study of the recently emerging Big Data market with a focus on the Hadoop ecosystem, and compare the capabilities of Wikipedia versus Google in predicting its popularity and life cycles. To support further applications, we have developed an open web platform to share results of Wikipedia analytics, providing context-rich and language-independent relevance measures for emerging trends. PMID:26720074

  9. p53 as the main traffic controller of the cell signaling network.

    Science.gov (United States)

    Sebastian, Sinto; Azzariti, Amalia; Silvestris, Nicola; Porcelli, Letizia; Russo, Antonio; Paradiso, Angelo

    2010-06-01

    Among different pathological conditions that affect human beings, cancer has received a great deal of attention primarily because it leads to significant morbidity and mortality. This is essentially due to increasing world-wide incidence of this disease and the inability to discover the cause and molecular mechanisms by which normal human cells acquire the characteristics that define cancer cells. Since the discovery of p53 over a quarter of a century ago, it is now recognized that virtually all cell fate pathways of live cells and the decision to die are under the control of p53. Such extensive involvement indicates that p53 protein is acting as a major traffic controller in the cell signaling network. In cancer cells, many cell signaling pathways of normal human cells are rerouted towards immortalization and this is accomplished by the corruption of the main controllers of cell signaling pathways such as p53. This review highlights how p53 signaling activity is altered in cancer cells so that cells acquire the hallmarks of cancer including deregulated infinite self replicative potential.

  10. Generating English Discourse from Semantic Networks.

    Science.gov (United States)

    Simmons, R. F.; Slocum, Jonathan

    The system described in this report is designed for use as a computational tool that allows a linguist to develop and study methods for generating surface strings from an underlying semantic structure. Initial findings with regard to form-determiners (such as voice, form, tense, and mood), some rules for embedding sentences, and some attention to…

  11. WDCC Metadata Generation with GeoNetwork

    Science.gov (United States)

    Ramthun, Hans; Lautenschlager, Michael; Winter, Hans-Hermann

    2010-05-01

    Earth system science data like modeling output data are described by metadata. At the WDCC (World Data Center of Climate) the data and metadata are stored inside the CERA (Climate and Environmental Retrieval and Archive) relational database. To fill in the describing metadata several types of XML documents are used to upload data into the database. GeoNetwork is an Ajax based web framework, which offers a wide range of XML data handling for search and update and is especially designed to meet the ISO19115/19139 standard. This framework was extended by the schema's which allow create and update CERA upload XML records. An upload function is also included as well as a connection to the local LDAP (Lightweight Directory Access Protocol) for authentication. Keywords: metadata, WDCC, CERA, Ajax

  12. Application of magnetic, geochemical and micro-morphological methods in environmental studies of urban pollution generated by road traffic

    Energy Technology Data Exchange (ETDEWEB)

    Bucko, M.

    2012-11-01

    Road traffic is at present one of the major sources of environmental pollution in urban areas. Magnetic particles, heavy metals and other compounds generated by traffic can greatly affect ambient air quality and have direct implications for human health. The general aim of this research was to identify and characterize magnetic vehicle-derived particulates using magnetic, geochemical and micro-morphological methods. A combination of three different methods was used to discriminate sources of particular anthropogenic particles. Special emphasis was placed on the application of various collectors (roadside soil, snow, lichens and moss bags) to monitor spatial and temporal distribution of traffic pollution on roadsides. The spatial distribution of magnetic parameters of road dust accumulated in roadside soil, snow, lichens and moss bags indicates that the highest concentration of magnetic particles is in the sampling points situated closest to the road edge. The concentration of magnetic particles decreases with increasing distance from the road indicating vehicle traffic as a major source of emission. Significant differences in horizontal distribution of magnetic susceptibility were observed between soil and snow. Magnetic particles derived from road traffic deposit on soil within a few meters from the road, but on snow up to 60 m from the road. The values of magnetic susceptibility of road dust deposited near busy urban motorway are significantly higher than in the case of low traffic road. These differences are attributed to traffic volume, which is 30 times higher on motorway than on local road. Moss bags placed at the edge of urban parks situated near major roads show higher values of magnetic susceptibility than moss bags from parks located near minor routes. Enhanced concentrations of heavy metals (e.g. Fe, Mn, Zn, Cu, Cr, Ni and Co) were observed in the studied samples. This may be associated with specific sources of vehicle emissions (e.g. exhaust and non

  13. Transmission Network Expansion Planning Considering Desired Generation Security

    Directory of Open Access Journals (Sweden)

    Samaneh GOLESTANI

    2014-02-01

    Full Text Available Transmission Network Expansion Planning (TNEP is an important part of power system planning in both conventional and new structured power market. Its goal is to minimize the network construction and operational cost while satisfying the demand increase, considering technical and economic conditions. Planning algorithm in this paper consisted of two stages. The former specifies highly uncertain lines and probability of congestion, considering desired generation security level (e.g. N-2 generation security level. The latter determines the optimal expansion capacity of existing lines. Splitting required capacity for reinforcement of weak lines due to desired generation security level simplifies the TNEP problem. In addition, it monitors the impact of generation uncertainty on transmission lines. Simulation results of the proposed idea are presented for IEEE-RTS-24bus network.

  14. Towards a Statistical Characterization of the Interdomain Traffic Matrix

    OpenAIRE

    Mikians, Jakub; Dhamdhere, Amogh; Dovrolis, Constantine; Barlet-Ros, Pere; Solé-Pareta, Josep

    2012-01-01

    Part 3: Interdomain; International audience; Identifying the statistical properties of the Interdomain Traffic Matrix (ITM) is fundamental for Internet techno-economic studies but challenging due to the lack of adequate traffic data. In this work, we utilize a Europe-wide measurement infrastructure deployed at the GÉANT backbone network to examine some important spatial properties of the ITM. In particular, we analyze its sparsity and characterize the distribution of traffic generated by diff...

  15. Directions for next generation microscopic traffic simulation modeling tool under the IntelliDrive environment

    NARCIS (Netherlands)

    Park, Byungkyu "Brian"; van Arem, Bart; van Noort, Martijn; Abadi, A.; Abdel-Rahim, A.; Preuveneers e.a., D.

    2010-01-01

    Microscopic traffic simulation models have been widely accepted in the evaluations of new treatments in the surface transportation system. These include new highway, lane usage (e.g., high occupancy vehicle lane or high occupancy toll lane), speed limits (e.g., variable speed limit, and uniform or

  16. Patch layout generation by detecting feature networks

    KAUST Repository

    Cao, Yuanhao

    2015-02-01

    The patch layout of 3D surfaces reveals the high-level geometric and topological structures. In this paper, we study the patch layout computation by detecting and enclosing feature loops on surfaces. We present a hybrid framework which combines several key ingredients, including feature detection, feature filtering, feature curve extension, patch subdivision and boundary smoothing. Our framework is able to compute patch layouts through concave features as previous approaches, but also able to generate nice layouts through smoothing regions. We demonstrate the effectiveness of our framework by comparing with the state-of-the-art methods.

  17. Application of Artificial Neural Networks for Predicting Generated Wind Power

    OpenAIRE

    Vijendra Singh

    2016-01-01

    This paper addresses design and development of an artificial neural network based system for prediction of wind energy produced by wind turbines. Now in the last decade, renewable energy emerged as an additional alternative source for electrical power generation. We need to assess wind power generation capacity by wind turbines because of its non-exhaustible nature. The power generation by electric wind turbines depends on the speed of wind, flow direction, fluctuations, density of air, gener...

  18. Thermalnet: a Deep Convolutional Network for Synthetic Thermal Image Generation

    Science.gov (United States)

    Kniaz, V. V.; Gorbatsevich, V. S.; Mizginov, V. A.

    2017-05-01

    Deep convolutional neural networks have dramatically changed the landscape of the modern computer vision. Nowadays methods based on deep neural networks show the best performance among image recognition and object detection algorithms. While polishing of network architectures received a lot of scholar attention, from the practical point of view the preparation of a large image dataset for a successful training of a neural network became one of major challenges. This challenge is particularly profound for image recognition in wavelengths lying outside the visible spectrum. For example no infrared or radar image datasets large enough for successful training of a deep neural network are available to date in public domain. Recent advances of deep neural networks prove that they are also capable to do arbitrary image transformations such as super-resolution image generation, grayscale image colorisation and imitation of style of a given artist. Thus a natural question arise: how could be deep neural networks used for augmentation of existing large image datasets? This paper is focused on the development of the Thermalnet deep convolutional neural network for augmentation of existing large visible image datasets with synthetic thermal images. The Thermalnet network architecture is inspired by colorisation deep neural networks.

  19. Deep Convolutional Generative Adversarial Network for Procedural 3D Landscape Generation Based on DEM

    DEFF Research Database (Denmark)

    Wulff-Jensen, Andreas; Rant, Niclas Nerup; Møller, Tobias Nordvig

    2017-01-01

    This paper proposes a novel framework for improving procedural generation of 3D landscapes using machine learning. We utilized a Deep Convolutional Generative Adversarial Network (DC-GAN) to generate heightmaps. The network was trained on a dataset consisting of Digital Elevation Maps (DEM......) of the alps. During map generation, the batch size and learning rate were optimized for the most efficient and satisfying map production. The diversity of the final output was tested against Perlin noise using Mean Square Error [1] and Structure Similarity Index [2]. Perlin noise is especially interesting...

  20. Learning Orthographic Structure With Sequential Generative Neural Networks.

    Science.gov (United States)

    Testolin, Alberto; Stoianov, Ivilin; Sperduti, Alessandro; Zorzi, Marco

    2016-04-01

    Learning the structure of event sequences is a ubiquitous problem in cognition and particularly in language. One possible solution is to learn a probabilistic generative model of sequences that allows making predictions about upcoming events. Though appealing from a neurobiological standpoint, this approach is typically not pursued in connectionist modeling. Here, we investigated a sequential version of the restricted Boltzmann machine (RBM), a stochastic recurrent neural network that extracts high-order structure from sensory data through unsupervised generative learning and can encode contextual information in the form of internal, distributed representations. We assessed whether this type of network can extract the orthographic structure of English monosyllables by learning a generative model of the letter sequences forming a word training corpus. We show that the network learned an accurate probabilistic model of English graphotactics, which can be used to make predictions about the letter following a given context as well as to autonomously generate high-quality pseudowords. The model was compared to an extended version of simple recurrent networks, augmented with a stochastic process that allows autonomous generation of sequences, and to non-connectionist probabilistic models (n-grams and hidden Markov models). We conclude that sequential RBMs and stochastic simple recurrent networks are promising candidates for modeling cognition in the temporal domain. Copyright © 2015 Cognitive Science Society, Inc.

  1. An Intelligent Handover Management System for Future Generation Wireless Networks

    OpenAIRE

    Kassar Meriem; Kervella Brigitte; Pujolle Guy

    2008-01-01

    Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the contex...

  2. Flexible Transmission Network Planning Considering the Impacts of Distributed Generation

    OpenAIRE

    Junhua Zhao; John Foster

    2010-01-01

    The restructuring of global power industries has introduced a number of challenges, such as conflicting planning objectives and increasing uncertainties,to transmission network planners. During the recent past, a number of distributed generation technologies also reached a stage allowing large scale implementation, which will profoundly influence the power industry, as well as the practice of transmission network expansion. In the new market environment, new approaches are needed to meet the ...

  3. Assembly and offset assignment scheme for self-similar traffic in optical burst switched networks

    CSIR Research Space (South Africa)

    Muwonge, KB

    2007-10-01

    Full Text Available are modelled as the burst duration, while the OFF periods are modelled as the offset times. Modelling OBS core traffic in this manner allows for a per channel flow modelling in DWDM wavelengths. Figure 1 shows the overall proposed LER traffic set...-up. Modelling OBS traffic as ON/OFF periods in DWDM conforms to the same distribution theory in Jackson queues. C. The burst queue In this section we develop several rules for the burst queue. Rule 1: After a BHP corresponding to a lower priority burst...

  4. Design and implementation of priority and time-window based traffic scheduling and routing-spectrum allocation mechanism in elastic optical networks

    Science.gov (United States)

    Wang, Honghuan; Xing, Fangyuan; Yin, Hongxi; Zhao, Nan; Lian, Bizhan

    2016-02-01

    With the explosive growth of network services, the reasonable traffic scheduling and efficient configuration of network resources have an important significance to increase the efficiency of the network. In this paper, an adaptive traffic scheduling policy based on the priority and time window is proposed and the performance of this algorithm is evaluated in terms of scheduling ratio. The routing and spectrum allocation are achieved by using the Floyd shortest path algorithm and establishing a node spectrum resource allocation model based on greedy algorithm, which is proposed by us. The fairness index is introduced to improve the capability of spectrum configuration. The results show that the designed traffic scheduling strategy can be applied to networks with multicast and broadcast functionalities, and makes them get real-time and efficient response. The scheme of node spectrum configuration improves the frequency resource utilization and gives play to the efficiency of the network.

  5. Robust network topologies for generating switch-like cellular responses.

    Directory of Open Access Journals (Sweden)

    Najaf A Shah

    2011-06-01

    Full Text Available Signaling networks that convert graded stimuli into binary, all-or-none cellular responses are critical in processes ranging from cell-cycle control to lineage commitment. To exhaustively enumerate topologies that exhibit this switch-like behavior, we simulated all possible two- and three-component networks on random parameter sets, and assessed the resulting response profiles for both steepness (ultrasensitivity and extent of memory (bistability. Simulations were used to study purely enzymatic networks, purely transcriptional networks, and hybrid enzymatic/transcriptional networks, and the topologies in each class were rank ordered by parametric robustness (i.e., the percentage of applied parameter sets exhibiting ultrasensitivity or bistability. Results reveal that the distribution of network robustness is highly skewed, with the most robust topologies clustering into a small number of motifs. Hybrid networks are the most robust in generating ultrasensitivity (up to 28% and bistability (up to 18%; strikingly, a purely transcriptional framework is the most fragile in generating either ultrasensitive (up to 3% or bistable (up to 1% responses. The disparity in robustness among the network classes is due in part to zero-order ultrasensitivity, an enzyme-specific phenomenon, which repeatedly emerges as a particularly robust mechanism for generating nonlinearity and can act as a building block for switch-like responses. We also highlight experimentally studied examples of topologies enabling switching behavior, in both native and synthetic systems, that rank highly in our simulations. This unbiased approach for identifying topologies capable of a given response may be useful in discovering new natural motifs and in designing robust synthetic gene networks.

  6. Certainty Power Flow Calculation for Distribution Network with Distributed Generation

    Directory of Open Access Journals (Sweden)

    FU Min

    2017-06-01

    Full Text Available System nodes need to be renumbered manually when upgrading and reforming distribution network makes network topology change. Because optimization method is inapplicable to the network change,an improved forward and backward sweep algorithm is proposed which is unrelated to node label. In this paper,node type of sorts of distributed generation ( DG in power flow calculation are induced and part of new node type of DG under improved control strategy are provided. The basis of DG as active constant node in certainty power flow calculation is analyzed. Based on improved back - forward sweep algorithm,general programs of power flow calculation in power distribution network of DG are programmed by MATLAB and the impact of DG on flow calculation to distribution network is analyzed quantitatively by plenty of simulation calculation of IEEE33 test system.

  7. Generation of a Social Network Graph by Using Apache Spark

    Directory of Open Access Journals (Sweden)

    Y. A. Belov

    2016-01-01

    Full Text Available We plan to create a method of clustering a social network graph. For testing the method there is a need to generate a graph similar in structure to existing social networks. The article presents an algorithm for the graph distributed generation. We took into account basic properties such as power-law distribution of the users communities number, dense intersections of the social networks and others. This algorithm also considers the problems that are present in similar works of other authors, for example, the multiple edges problem in the generation process. A special feature of the created algorithm is the implementation depending on the communities number parameter rather than on the connected users number as it is done in other works. It is connected with a peculiarity of progressing the existing social network structure. There are properties of its graph in the paper. We described a table containing the variables needed for the algorithm. A step-by-step generation algorithm was compiled. Appropriate mathematical parameters were calculated for it. A generation is performed in a distributed way by Apache Spark framework. It was described in detail how the tasks division with the help of this framework runs. The Erdos-Renyi model for random graphs is used in the algorithm. It is the most suitable and easy one to implement. The main advantages of the created method are the small amount of resources in comparison with other similar generators and execution speed. Speed is achieved through distributed work and the fact that in any time network users have their own unique numbers and are ordered by these numbers, so there is no need to sort them out. The designed algorithm will promote not only the efficient clustering method creation. It can be useful in other development areas connected, for example, with the social networks search engines.

  8. Neural network approaches to dynamic collision-free trajectory generation.

    Science.gov (United States)

    Yang, S X; Meng, M

    2001-01-01

    In this paper, dynamic collision-free trajectory generation in a nonstationary environment is studied using biologically inspired neural network approaches. The proposed neural network is topologically organized, where the dynamics of each neuron is characterized by a shunting equation or an additive equation. The state space of the neural network can be either the Cartesian workspace or the joint space of multi-joint robot manipulators. There are only local lateral connections among neurons. The real-time optimal trajectory is generated through the dynamic activity landscape of the neural network without explicitly searching over the free space nor the collision paths, without explicitly optimizing any global cost functions, without any prior knowledge of the dynamic environment, and without any learning procedures. Therefore the model algorithm is computationally efficient. The stability of the neural network system is guaranteed by the existence of a Lyapunov function candidate. In addition, this model is not very sensitive to the model parameters. Several model variations are presented and the differences are discussed. As examples, the proposed models are applied to generate collision-free trajectories for a mobile robot to solve a maze-type of problem, to avoid concave U-shaped obstacles, to track a moving target and at the same to avoid varying obstacles, and to generate a trajectory for a two-link planar robot with two targets. The effectiveness and efficiency of the proposed approaches are demonstrated through simulation and comparison studies.

  9. A Best Effort Traffic Management Solution for Server and Agent-Based Active Network Management (SAAM)

    Science.gov (United States)

    2002-03-01

    14 c. Link State Protocols ............................................................... 14 2. Interdomain Routing...Shortest Widest Least Congested Path (SWLCP) ................. 38 4. Traffic Splitting...c. Reversion Interval .................................................................. 43 d. Congestion Bypass Time

  10. Analysis of traffic state variation patterns for urban road network based on spectral clustering

    National Research Council Canada - National Science Library

    Yang, Senyan; Wu, Jianping; Qi, Geqi; Tian, Kun

    2017-01-01

    ... on section-based traffic speed dataset. The proposed method transforms traditional clustering problems into graph partition problems, which is suitable for the clustering problems with multiple attributes by dimension reduction...

  11. Agent-based traffic management and reinforcement learning in congested intersection network.

    Science.gov (United States)

    2012-08-01

    This study evaluates the performance of traffic control systems based on reinforcement learning (RL), also called approximate dynamic programming (ADP). Two algorithms have been selected for testing: 1) Q-learning and 2) approximate dynamic programmi...

  12. Application of Generative Adversarial Networks (GANs) to jet images

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    https://arxiv.org/abs/1701.05927 We provide a bridge between generative modeling in the Machine Learning community and simulated physical processes in High Energy Particle Physics by applying a novel Generative Adversarial Network (GAN) architecture to the production of jet images -- 2D representations of energy depositions from particles interacting with a calorimeter. We propose a simple architecture, the Location-Aware Generative Adversarial Network, that learns to produce realistic radiation patterns from simulated high energy particle collisions. The pixel intensities of GAN-generated images faithfully span over many orders of magnitude and exhibit the desired low-dimensional physical properties (i.e., jet mass, n-subjettiness, etc.). We shed light on limitations, and provide a novel empirical validation of image quality and validity of GAN-produced simulations of the natural world. This work provides a base for further explorations of GANs for use in faster simulation in High Energy Particle Physics.

  13. Embedded generation connection incentives for distribution network operators

    Energy Technology Data Exchange (ETDEWEB)

    Williams, P.; Andrews, S.

    2002-07-01

    This is the final report with respect to work commissioned by the Department of Trade and Industry (DTI) as part of the New and Renewable Energy Programme into incentives for distribution network operators (DNOs) for the connection of embedded generation. This report, which incorporates the contents of the interim report submitted in February 2002, considers the implications of changes in the structure and regulation in the UK electricity industry on the successful technical and commercial integrated of embedded generation into distribution networks. The report examines: the obligations of public electricity suppliers (PESs); current DNO practices regarding the connection of embedded generation; the changes introduced by the Utilities Act 2000, including the impact of new obligations placed on DNOs on the connection of embedded generation and the requirements of the new Electricity Distribution Standard Licence conditions; and problems and prospects for DNO incentives.

  14. Network Dynamics: Modeling And Generation Of Very Large Heterogeneous Social Networks

    Science.gov (United States)

    2015-11-23

    OF RESPONSIBLE PERSON Sidney Redner 19b.  TELEPHONE NUMBER (Include area code) 617-353-2618 Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std...2 We generated heterogeneous social networks from homogeneous interaction rules. Het- erogeneity emerges dynamically as the network grows, rather than

  15. Golden Ratio Genetic Algorithm Based Approach for Modelling and Analysis of the Capacity Expansion of Urban Road Traffic Network

    Directory of Open Access Journals (Sweden)

    Lun Zhang

    2015-01-01

    Full Text Available This paper presents the modelling and analysis of the capacity expansion of urban road traffic network (ICURTN. Thebilevel programming model is first employed to model the ICURTN, in which the utility of the entire network is maximized with the optimal utility of travelers’ route choice. Then, an improved hybrid genetic algorithm integrated with golden ratio (HGAGR is developed to enhance the local search of simple genetic algorithms, and the proposed capacity expansion model is solved by the combination of the HGAGR and the Frank-Wolfe algorithm. Taking the traditional one-way network and bidirectional network as the study case, three numerical calculations are conducted to validate the presented model and algorithm, and the primary influencing factors on extended capacity model are analyzed. The calculation results indicate that capacity expansion of road network is an effective measure to enlarge the capacity of urban road network, especially on the condition of limited construction budget; the average computation time of the HGAGR is 122 seconds, which meets the real-time demand in the evaluation of the road network capacity.

  16. Generating private recommendations in a social trust network

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, P.J.M.; Lagendijk, R.L.

    2011-01-01

    Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks.

  17. Outcome of surgical implant generation network nail initiative in ...

    African Journals Online (AJOL)

    Background: Closed interlocked intra-medullary nailing (IM), the standard method of treating of long bone shaft fracture, has been a dream to most resource poor hospitals like Kenyan regional hospitals. Surgical implant generation network (SIGN) initiative employs use of external jigs and slot finders instead of expensive ...

  18. Effectiveness of frequency relays on networks with multiple distributed generation

    Directory of Open Access Journals (Sweden)

    A.A.M. Hassan

    2015-05-01

    Full Text Available Distributed generation (DG has gained a vital role in distribution utilities. So, it is important to correctly detect islanding of DG units. Frequency relays are one of the most commonly used loss of mains detection method. However, distribution utilities may be faced by concern related to false operation of these frequency relays. The commercially available frequency relays reported considering standard tight setting. This paper investigates some factors related to relays internal algorithm that contribute to their different operating responses. The factors that will be investigated are frequency measuring techniques, measuring windows, time delays and under voltage interlock function. With the increasing penetration of DG into the network, it is becoming common to have multiple DG units connected at the same network location. Two generators connected at the same location and employing frequency relays with the same setting but different characteristics were simulated. When subjected to the same network disturbances the possible interference between the two relays is analyzed.

  19. Converged Wireless Networking and Optimization for Next Generation Services

    Directory of Open Access Journals (Sweden)

    J. Rodriguez

    2010-01-01

    Full Text Available The Next Generation Network (NGN vision is tending towards the convergence of internet and mobile services providing the impetus for new market opportunities in combining the appealing services of internet with the roaming capability of mobile networks. However, this convergence does not go far enough, and with the emergence of new coexistence scenarios, there is a clear need to evolve the current architecture to provide cost-effective end-to-end communication. The LOOP project, a EUREKA-CELTIC driven initiative, is one piece in the jigsaw by helping European industry to sustain a leading role in telecommunications and manufacturing of high-value products and machinery by delivering pioneering converged wireless networking solutions that can be successfully demonstrated. This paper provides an overview of the LOOP project and the key achievements that have been tunneled into first prototypes for showcasing next generation services for operators and process manufacturers.

  20. Generating three-qubit quantum circuits with neural networks

    Science.gov (United States)

    Swaddle, Michael; Noakes, Lyle; Smallbone, Harry; Salter, Liam; Wang, Jingbo

    2017-10-01

    A new method for compiling quantum algorithms is proposed and tested for a three qubit system. The proposed method is to decompose a unitary matrix U, into a product of simpler Uj via a neural network. These Uj can then be decomposed into product of known quantum gates. Key to the effectiveness of this approach is the restriction of the set of training data generated to paths which approximate minimal normal subRiemannian geodesics, as this removes unnecessary redundancy and ensures the products are unique. The two neural networks are shown to work effectively, each individually returning low loss values on validation data after relatively short training periods. The two networks are able to return coefficients that are sufficiently close to the true coefficient values to validate this method as an approach for generating quantum circuits. There is scope for more work in scaling this approach for larger quantum systems.

  1. Tri-generation in urban networks; Trigeneration en reseau urbain

    Energy Technology Data Exchange (ETDEWEB)

    Malahieude, J.M. [Trigen Energy Corp., New-York (United States)

    1996-12-31

    The concepts of tri-generation (simultaneous production of heat, electric power and refrigerating energy) and thermal energy distribution networks, are presented. The different components of the tri-generation system from Trigen Energy Corp. are ammonia as a refrigerant for the production of cooled water, screw compressors, gas turbines and an induction motor-generator in order to optimize the combined gas turbine and compressor utilization. The energy efficiency and pollution reduction of the system are evaluated; the system has been enhanced through re-powering and post combustion

  2. Energy-efficient multicast traffic grooming strategy based on light-tree splitting for elastic optical networks

    Science.gov (United States)

    Liu, Huanlin; Yin, Yarui; Chen, Yong

    2017-07-01

    In order to address the problem of optimizing the spectrum resources and power consumption in elastic optical networks (EONs), we investigate the potential gains by jointly employing the light-tree splitting and traffic grooming for multicast requests. An energy-efficient multicast traffic grooming strategy based on light-tree splitting (EED-MTGS-LS) is proposed in this paper. Firstly, we design a traffic pre-processing mechanism to decide the multicast requests' routing order, which considers the request's bandwidth requirement and physical hops synthetically. Then, by dividing a light-tree to some sub-light-trees and grooming the request to these sub-light-trees, the light-tree sharing ratios of multicast requests can be improved. What's more, a priority scheduling vector is constructed, which aims to improve the success rate of spectrum assignment for grooming requests. Finally, a grooming strategy is designed to optimize the total power consumption by reducing the use of transponders and IP routers during routing. Simulation results show that the proposed strategy can significantly improve the spectrum utilization and save the power consumption.

  3. Influence of traffic on build-up of polycyclic aromatic hydrocarbons on urban road surfaces: A Bayesian network modelling approach.

    Science.gov (United States)

    Li, Yingxia; Jia, Ziliang; Wijesiri, Buddhi; Song, Ningning; Goonetilleke, Ashantha

    2017-12-04

    Due to their carcinogenic effects, Polycyclic Aromatic Hydrocarbons (PAHs) deposited on urban surfaces are a major concern in the context of stormwater pollution. However, the design of effective pollution mitigation strategies is challenging due to the lack of reliability in stormwater quality modelling outcomes. Current modelling approaches do not adequately replicate the interdependencies between pollutant processes and their influential factors. Using Bayesian Network modelling, this research study characterised the influence of vehicular traffic on the build-up of the sixteen US EPA classified priority PAHs. The predictive analysis was conditional on the structure of the proposed BN, which can be further improved by including more variables. This novel modelling approach facilitated the characterisation of the influence of traffic as a source of origin and also as a key factor that influences the re-distribution of PAHs, with positive or negative relationship between traffic volume and PAH build-up. It was evident that the re-distribution of particle-bound PAHs is determined by the particle size rather than the chemical characteristics such as volatility. Moreover, compared to commercial and residential land uses, mostly industrial land use contributes to the PAHs load released to the environment. Carcinogenic PAHs in industrial areas are likely to be associated with finer particles, while PAHs, which are not classified as human carcinogens, are likely to be found in the coarser particle fraction. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Overcoming barriers to scheduling embedded generation to support distribution networks

    Energy Technology Data Exchange (ETDEWEB)

    Wright, A.J.; Formby, J.R.

    2000-07-01

    Current scheduling of embedded generation for distribution in the UK is limited and patchy. Some DNOs actively schedule while others do none. The literature on the subject is mainly about accommodating volatile wind output, and optimising island systems, for both cost of supply and network stability. The forthcoming NETA will lower prices, expose unpredictable generation to imbalance markets and could introduce punitive constraint payments on DNOs, but at the same time create a dynamic market for both power and ancillary services from embedded generators. Most renewable generators either run as base load (e.g. waste ) or according to the vagaries of the weather (e.g. wind, hydro), so offer little scope for scheduling other than 'off'. CHP plant is normally heat- led for industrial processes or building needs, but supplementary firing or thermal storage often allow considerable scope for scheduling. Micro-CHP with thermal storage could provide short-term scheduling, but tends to be running anyway during the evening peak. Standby generation appears to be ideal for scheduling, but in practice operators may be unwilling to run parallel with the network, and noise and pollution problems may preclude frequent operation. Statistical analysis can be applied to calculate the reliability of several generators compared to one; with a large number of generators such as micro-CHP reliability of a proportion of load is close to unity. The type of communication for generation used will depend on requirements for bandwidth, cost, reliability and whether it is bundled with other services. With high levels of deeply embedded, small-scale generation using induction machines, voltage control and black start capability will become important concerns on 11 kV and LV networks. This will require increased generation monitoring and remote control of switchgear. Examples of cost benefits from scheduling are given, including deferred reinforcement, increased exports on non

  5. A FD/DAMA network architecture for the first generation land mobile satellite services

    Science.gov (United States)

    Yan, T.-Y.; Wang, C.; Cheng, U.; Dessouky, K.; Rafferty, W.

    1989-01-01

    A frequency division/demand assigned multiple access (FD/DAMA) network architecture for the first-generation land mobile satellite services is presented. Rationales and technical approaches are described. In this architecture, each mobile subscriber must follow a channel access protocol to make a service request to the network management center before transmission for either open-end or closed-end services. Open-end service requests will be processed on a blocked call cleared basis, while closed-end requests will be processed on a first-come-first-served basis. Two channel access protocols are investigated, namely, a recently proposed multiple channel collision resolution scheme which provides a significantly higher useful throughput, and the traditional slotted Aloha scheme. The number of channels allocated for either open-end or closed-end services can be adaptively changed according to aggregated traffic requests. Both theoretical and simulation results are presented. Theoretical results have been verified by simulation on the JPL network testbed.

  6. Online social network use by health care providers in a high traffic patient care environment.

    Science.gov (United States)

    Black, Erik; Light, Jennifer; Paradise Black, Nicole; Thompson, Lindsay

    2013-05-17

    The majority of workers, regardless of age or occupational status, report engaging in personal Internet use in the workplace. There is little understanding of the impact that personal Internet use may have on patient care in acute clinical settings. The objective of this study was to investigate the volume of one form of personal Internet use-online social networking (Facebook)-generated by workstations in the emergency department (ED) in contrast to measures of clinical volume and severity. The research team analyzed anonymous network utilization records for 68 workstations located in the emergency medicine department within one academic medical center for 15 consecutive days (12/29/2009 to 1/12/2010). This data was compared to ED work index (EDWIN) data derived by the hospital information systems. Health care workers spent an accumulated 4349 minutes (72.5 hours) browsing Facebook, staff cumulatively visited Facebook 9369 times and spent, on average, 12.0 minutes per hour browsing Facebook. There was a statistically significant difference in the time spent on Facebook according to time of day (19.8 minutes per hour versus 4.3 minutes per hour, P<.001). There was a significant, positive correlation between EDWIN scores and time spent on Facebook (r=.266, P<.001). Facebook use constituted a substantive percentage of staff time during the 15-day observation period. Facebook use increased with increased patient volume and severity within the ED.

  7. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  8. An optimal general type-2 fuzzy controller for Urban Traffic Network

    DEFF Research Database (Denmark)

    Khooban, Mohammad Hassan; Vafamand, Navid; Liaghat, Alireza

    2017-01-01

    , a combination of the general type-2 fuzzy logic sets and the Modified Backtracking Search Algorithm (MBSA) techniques are used in order to control the traffic signal scheduling and phase succession so as to guarantee a smooth flow of traffic with the least wait times and average queue length. The parameters...... of input and output membership functions are optimized simultaneously by the novel heuristic algorithm MBSA. A comparison is made between the achieved results with those of optimal and conventional type-1 fuzzy logic controllers....

  9. An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic.

    Science.gov (United States)

    AsSadhan, Basil; Moura, José M F

    2014-07-01

    Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet's communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet's C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker's large sample test to the periodogram's maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot's C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI) or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior.

  10. An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

    Directory of Open Access Journals (Sweden)

    Basil AsSadhan

    2014-07-01

    Full Text Available Botnets are large networks of bots (compromised machines that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2 communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker’s large sample test to the periodogram’s maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot’s C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior.

  11. An Evaluation of Best Effort Traffic Management of Server and Agent-Based Active Network Management (SAAM) Architecture

    National Research Council Canada - National Science Library

    Ayvat, Birol

    2003-01-01

    The Server and Agent-based Active Network Management (SAAM) architecture was initially designed to work with the next generation Internet where increasingly sophisticated applications will require QoS guarantees...

  12. A Piecewise Deterministic Markov Toy Model for Traffic/Maintenance and Associated Hamilton–Jacobi Integrodifferential Systems on Networks

    Energy Technology Data Exchange (ETDEWEB)

    Goreac, Dan, E-mail: Dan.Goreac@u-pem.fr; Kobylanski, Magdalena, E-mail: Magdalena.Kobylanski@u-pem.fr; Martinez, Miguel, E-mail: Miguel.Martinez@u-pem.fr [Université Paris-Est, LAMA (UMR 8050), UPEMLV, UPEC, CNRS (France)

    2016-10-15

    We study optimal control problems in infinite horizon whxen the dynamics belong to a specific class of piecewise deterministic Markov processes constrained to star-shaped networks (corresponding to a toy traffic model). We adapt the results in Soner (SIAM J Control Optim 24(6):1110–1122, 1986) to prove the regularity of the value function and the dynamic programming principle. Extending the networks and Krylov’s “shaking the coefficients” method, we prove that the value function can be seen as the solution to a linearized optimization problem set on a convenient set of probability measures. The approach relies entirely on viscosity arguments. As a by-product, the dual formulation guarantees that the value function is the pointwise supremum over regular subsolutions of the associated Hamilton–Jacobi integrodifferential system. This ensures that the value function satisfies Perron’s preconization for the (unique) candidate to viscosity solution.

  13. System and Method for Network Bandwidth, Buffers and Timing Management Using Hybrid Scheduling of Traffic with Different Priorities and Guarantees

    Science.gov (United States)

    Varadarajan, Srivatsan (Inventor); Hall, Brendan (Inventor); Smithgall, William Todd (Inventor); Bonk, Ted (Inventor); DeLay, Benjamin F. (Inventor)

    2017-01-01

    Systems and methods for network bandwidth, buffers and timing management using hybrid scheduling of traffic with different priorities and guarantees are provided. In certain embodiments, a method of managing network scheduling and configuration comprises, for each transmitting end station, reserving one exclusive buffer for each virtual link to be transmitted from the transmitting end station; for each receiving end station, reserving exclusive buffers for each virtual link to be received at the receiving end station; and for each switch, reserving a exclusive buffer for each virtual link to be received at an input port of the switch. The method further comprises determining if each respective transmitting end station, receiving end station, and switch has sufficient capability to support the reserved buffers; and reporting buffer infeasibility if each respective transmitting end station, receiving end station, and switch does not have sufficient capability to support the reserved buffers.

  14. A scalable acoustic sensor network for model based monitoring of urban traffic noise

    NARCIS (Netherlands)

    Basten, T.G.H.; Wessels, P.W.; Eerden, F.J.M. van der

    2012-01-01

    A good understanding of the acoustic environment due to traffic in urban areas is very important. Long term monitoring within large areas provides a clear insight in the actual noise situation. This is needed to take appropriate and cost efficient measures; to asses the effect of measures by

  15. A real-time traffic scheduling algorithm in CDMA packet networks

    NARCIS (Netherlands)

    Zan, Lei; Heijenk, Geert; El Zarki, Magda; Gong, K.; Niu, Z.

    2003-01-01

    The demands for multimedia and packet data services over wireless devices have increased over the past few years. The direct impact on performance makes scheduling for real-time traffic important. This paper presents a novel scheduling algorithm called fair channel-dependent scheduling which

  16. Efficient IP Traffic over Optical Network Based on Wavelength Translation Switching

    DEFF Research Database (Denmark)

    Jha, Vikas; Kalia, Kartik; Chowdhary, Bhawani Shankar

    2016-01-01

    With the advent of TCP/IP protocol suite the overall era of communication technologies had been redefined. Now, we can’t ignore the presence of huge amount of IP traffic; data, voice or video increasing day by day creating more pressure on existing communicating media and supporting back bone...

  17. A method for classification of network traffic based on C5.0 Machine Learning Algorithm

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Riaz, M. Tahir; Pedersen, Jens Myrup

    2012-01-01

    and classification, an algorithm for recognizing flow direction and the C5.0 itself. Classified applications include Skype, FTP, torrent, web browser traffic, web radio, interactive gaming and SSH. We performed subsequent tries using different sets of parameters and both training and classification options...

  18. Increasing the capacity of distributed generation in electricity networks by intelligent generator control

    OpenAIRE

    Aristides E. Kiprakis

    2005-01-01

    The rise of environmental awareness as well as the unstable global fossil fuel market has brought about government initiatives to increase electricity generation from renewable energy sources. These resources tend to be geographically and electrically remote from load centres. Consequently many Distributed Generators (DGs) are expected to be connected to the existing Distribution Networks (DNs), which have high impedance and low X/R ratios. Intermittence and unpredictability of the vario...

  19. Advances Made in the Next Generation of Satellite Networks

    Science.gov (United States)

    Bhasin, Kul B.

    1999-01-01

    Because of the unique networking characteristics of communications satellites, global satellite networks are moving to the forefront in enhancing national and global information infrastructures. Simultaneously, broadband data services, which are emerging as the major market driver for future satellite and terrestrial networks, are being widely acknowledged as the foundation for an efficient global information infrastructure. In the past 2 years, various task forces and working groups around the globe have identified pivotal topics and key issues to address if we are to realize such networks in a timely fashion. In response, industry, government, and academia undertook efforts to address these topics and issues. A workshop was organized to provide a forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. The Satellite Networks: Architectures, Applications, and Technologies Workshop was hosted by the Space Communication Program at the NASA Lewis Research Center in Cleveland, Ohio. Nearly 300 executives and technical experts from academia, industry, and government, representing the United States and eight other countries, attended the event (June 2 to 4, 1998). The program included seven panels and invited sessions and nine breakout sessions in which 42 speakers presented on technical topics. The proceedings covers a wide range of topics: access technology and protocols, architectures and network simulations, asynchronous transfer mode (ATM) over satellite networks, Internet over satellite networks, interoperability experiments and applications, multicasting, NASA interoperability experiment programs, NASA mission applications, and Transmission Control Protocol/Internet Protocol (TCP/IP) over satellite: issues, relevance, and experience.

  20. Gender roles in social network sites from generation Y

    Directory of Open Access Journals (Sweden)

    F. Javier Rondan-Cataluña

    2017-12-01

    Full Text Available One of the fundamental and most commonly used communication tools by the generation Y or Millennials are online social networks. The first objective of this study is to model the effects that exercise social participation, community integration and trust in community satisfaction, as an antecedent of routinization. Besides, we propose as a second objective checking if gender roles proposed to underlie the different behaviors that develop social network users. An empirical study was carried out on a sample of 1,448 undergraduate students that are SNS users from Generation Y. First, we applied a structural equation modeling approach to test the proposed model. Second, we followed a methodology using a scale of masculinity and femininity to categorize the sample obtaining three groups: feminine, masculine, and androgynous.

  1. Steady traffic scheduler for internet video traffic across large delay ...

    African Journals Online (AJOL)

    Steady traffic scheduler for internet video traffic across large delay networks. O.E. Ojo, A.O. Oluwatope, I.T. Arowobusoye. Abstract. No Abstract. Keywords: Computer Networks, Multimedia Networking, TCP and Large-Delay Networks. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD ...

  2. Synthetic aperture radar ship discrimination, generation and latent variable extraction using information maximizing generative adversarial networks

    CSIR Research Space (South Africa)

    Schwegmann, Colin P

    2017-07-01

    Full Text Available Maximizing Generative Adversarial Network extend this idea by extracting untangled latent variables as part of the discrimination process which help to classify the data in terms of categories/classes and properties such as ship rotation. Despite the limited...

  3. Towards Third-Generation Living Lab Networks in Cities

    Directory of Open Access Journals (Sweden)

    Seppo Leminen

    2017-11-01

    Full Text Available Many cities engage in diverse experimentation, innovation, and development activities with a broad variety of environments and stakeholders to the benefit of citizens, companies, municipalities, and other organizations. Hence, this article discusses such engagement in terms of next-generation living lab networks in the city context. In so doing, the study contributes to the discussion on living labs by introducing a framework of collaborative innovation networks in cities and suggesting a typology of third-generation living labs. Our framework is characterized by diverse platforms and participation approaches, resulting in four distinctive modes of collaborative innovation networks where the city is: i a provider, ii a neighbourhood participator, iii a catalyst, or iv a rapid experimenter. The typology is based on an analysis of 118 interviews with participants in six Finnish cities and reveals various ways to organize innovation activities in the city context. In particular, cities can benefit from innovation networks by simultaneously exploiting multiple platforms such as living labs for innovation. We conclude by discussing implications to theory and practice, and suggesting directions for future research.

  4. MHD generator with improved network coupling electrodes to a load

    Science.gov (United States)

    Rosa, Richard J.

    1977-01-01

    An MHD generator has a plurality of segmented electrodes extending longitudinally of a duct, whereby progressively increasing high DC voltages are derived from a set of cathode electrodes and progressively increasing low DC voltages are derived from a set of anode electrodes. First and second load terminals are respectively connected to the cathode and anode electrodes by separate coupling networks, each of which includes a number of SCR's and a number of diode rectifiers.

  5. Neural Network-Based Abstract Generation for Opinions and Arguments

    OpenAIRE

    Wang, Lu; Ling, Wang

    2016-01-01

    We study the problem of generating abstractive summaries for opinionated text. We propose an attention-based neural network model that is able to absorb information from multiple text units to construct informative, concise, and fluent summaries. An importance-based sampling method is designed to allow the encoder to integrate information from an important subset of input. Automatic evaluation indicates that our system outperforms state-of-the-art abstractive and extractive summarization syst...

  6. Steep optical filtering for next generation optical access networks

    Science.gov (United States)

    Korček, Dušan; Müllerová, Jarmila

    2012-01-01

    Future development of optical access technologies expects increasing traffic and bandwidth. The first candidates to improve Gigabit-capable passive optical networks (GPON) are 10-Gigabit-PON (XG-PON) and wavelength-division multiplexing PON (WDM PON). Another possibility for increasing penetration of current PON branch is to extend number of channels provided on one optical fiber for one PON technology. Coexistence of GPON, XG-PON and WDM-PON in the same infrastructure is a most discussed issue concerning passive optical networks nowadays. Therefore, extensive studies are necessary to design proper and low-cost candidates. International Telecommunication Union (ITU) allocates specific wavelength bands for the present status quo and the future development of access technologies. However, within coexistence, it is necessary to protect signals from various PON technologies from interference. A potential barrier to deploying XG-GPONs and WDM PONs with current GPONs is the usage of broadband light sources and sophisticated optical methods of slicing the light source emission into specific wavelength channels. Protective measures comprise the exact allocation of upstream and downstream signal bands for each technology; the so-called guard bands within the wavelength allocation scheme to protect signals; and optionally the usage of wavelength blocking filters. In this contribution, bandpass thin-film filters are numerically presented for hybrid time division/wavelength division multiplexing TDM/WDM (TWDM) and for simple operation. They have been designed to be tunable and as steep as possible to reject the wavelength bands outside those allocated to TWDM-PON. The TWDM-PON filters are proposed to guarantee steep transmission curves in the vicinity of cut-on/cut-off wavelengths of the specific allocated wavelength bands and facilitate migration from legacy GPON and XG-PON to TWDM-PON. Their deployment protects the allocated wavelength bands from the undesirable interference.

  7. Measurement of traffic network vulnerability for Mississippi coastal region : final research report.

    Science.gov (United States)

    2017-08-15

    Natural disasters such as a hurricane can cause great damages to the transportation networks and significantly affect the evacuation trip operations. An accurate understanding and measurement of the network vulnerability can enhance the evacuees p...

  8. Traffic Signal Synchronization in the Saturated High-Density Grid Road Network

    National Research Council Canada - National Science Library

    Hu, Xiaojian; Lu, Jian; Wang, Wei; Zhirui, Ye

    2015-01-01

    ... has inspired several urban road network development trends, including increased use of the high-density grid road network (HGRN). The structure of the HGRN is the orthogonal checkerboard pattern,...

  9. Large graph visualization of millions of connections in the CERN control system network traffic: analysis and design of routing and firewall rules with a new approach

    CERN Document Server

    Gallerani, Luigi

    2015-01-01

    Abstract The CERN Technical Network (TN) TN was intended to be a network for accelerator and infrastructure operations. However, today, more than 60 million IP packets are routed every hour between the General Purpose Network (GPN) and the TN, involving more than 6000 different hosts. In order to improve the security of the accelerator control system, it is fundamental to understand the network traffic between the two networks and to define new appropriate routing and firewall rules without impacting operations. The complexity and huge size of the infrastructure and the number of protocols and services involved, have discouraged for years any attempt to understand and control the network traffic between the GPN and the TN. In this paper, we show a new way to solve the problem graphically. Combining the network traffic analysis with the use of large graph visualization algorithms we produced usable 2D large color topology maps of the network identifying the inter-relations of the control system machines and s...

  10. Volunteer-Based System for classification of traffic in computer networks

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Balachandran, Kartheepan; Riaz, M. Tahir

    2011-01-01

    To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Inspection, statistical classification) a new system was developed, in which the data are collected from client machines. This paper presents design of the system, implementation, initial runs...... and obtained results. Furthermore, it proves that the system is feasible in terms of uptime and resource usage, assesses its performance and proposes future enhancements....

  11. Prediction of Ship Traffic Flow Based on BP Neural Network and Markov Model

    OpenAIRE

    Lv Pengfei; Zhuang Yuan; Yang Kun

    2016-01-01

    This paper discusses the distribution regularity of ship arrival and departure and the method of prediction of ship traffic flow. Depict the frequency histograms of ships arriving to port every day and fit the curve of the frequency histograms with a variety of distribution density function by using the mathematical statistic methods based on the samples of ship-to-port statistics of Fangcheng port nearly a year. By the chi-square testing: the fitting with Negative Binomial distribution and t...

  12. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  13. Data Gathering Using Mobile Agents for Reducing Traffic in Dense Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Keisuke Goto

    2013-01-01

    Full Text Available Recently, there has been increasing interest in Mobile Wireless Sensor Networks (MWSNs that are constructed by mobile sensor nodes held by ordinary people, and it has led to a new concept called urban sensing. In such MWSNs, mobile sensor nodes densely exist, and thus, there are basically many sensor nodes that can sense a geographical point in the entire sensing area. To reduce the communication cost for gathering sensor data, it is desirable to gather the sensor data from the minimum number of mobile sensor nodes which are necessary to guarantee the sensing coverage or the quality of services. In this paper, to achieve this, we propose a data gathering method using mobile agents in dense MWSNs. The proposed method guarantees the sensing coverage of the entire area using mobile agents that autonomously perform sensing operations, transmit sensor data, and move between sensor nodes. By gathering only sensor data generated by sensor nodes where mobile agents are running, our proposed method can achieve efficient gathering of sensor data.

  14. Traffic intensity monitoring using multiple object detection with traffic surveillance cameras

    Science.gov (United States)

    Hamdan, H. G. Muhammad; Khalifah, O. O.

    2017-11-01

    Object detection and tracking is a field of research that has many applications in the current generation with increasing number of cameras on the streets and lower cost for Internet of Things(IoT). In this paper, a traffic intensity monitoring system is implemented based on the Macroscopic Urban Traffic model is proposed using computer vision as its source. The input of this program is extracted from a traffic surveillance camera which has another program running a neural network classification which can identify and differentiate the vehicle type is implanted. The neural network toolbox is trained with positive and negative input to increase accuracy. The accuracy of the program is compared to other related works done and the trends of the traffic intensity from a road is also calculated. relevant articles in literature searches, great care should be taken in constructing both. Lastly the limitation and the future work is concluded.

  15. Code generation: a strategy for neural network simulators.

    Science.gov (United States)

    Goodman, Dan F M

    2010-10-01

    We demonstrate a technique for the design of neural network simulation software, runtime code generation. This technique can be used to give the user complete flexibility in specifying the mathematical model for their simulation in a high level way, along with the speed of code written in a low level language such as C+ +. It can also be used to write code only once but target different hardware platforms, including inexpensive high performance graphics processing units (GPUs). Code generation can be naturally combined with computer algebra systems to provide further simplification and optimisation of the generated code. The technique is quite general and could be applied to any simulation package. We demonstrate it with the 'Brian' simulator ( http://www.briansimulator.org ).

  16. Pinning Synchronization of Linear Complex Coupling Synchronous Generators Network of Hydroelectric Generating Set

    Directory of Open Access Journals (Sweden)

    Xuefei Wu

    2014-01-01

    Full Text Available A novel linear complex system for hydroturbine-generator sets in multimachine power systems is suggested in this paper and synchronization of the power-grid networks is studied. The advanced graph theory and stability theory are combined to solve the problem. Here we derive a sufficient condition under which the synchronous state of power-grid networks is stable in disturbance attenuation. Finally, numerical simulations are provided to illustrate the effectiveness of the results by the IEEE 39 bus system.

  17. Small Distributed Renewable Energy Generation for Low Voltage Distribution Networks

    Directory of Open Access Journals (Sweden)

    Chindris M.

    2016-08-01

    Full Text Available Driven by the existing energy policies, the use of renewable energy has increased considerably all over the world in order to respond to the increasing energy consumption and to reduce the environmental impact of the electricity generation. Although most policy makers and companies are focusing on large applications, the use of cheap small generation units, based on local renewable resources, has become increasingly attractive for the general public, small farms and remote communities. The paper presents several results of a research project aiming to identify the power quality issues and the impact of RES based distributed generation (DG or other non-linear loads on low voltage (LV distribution networks in Romania; the final goal is to develop a Universal Power Quality Conditioner (UPQC able to diminish the existing disturbances. Basically, the work analyses the existing DG technologies and identifies possible solutions for their integration in Romania; taking into account the existent state of the art, the attention was paid on small systems, using wind and solar energy, and on possibility to integrate them into suburban and rural LV distribution networks. The presence of DG units at distribution voltage level means the transition from traditional passive to active distribution networks. In general, the relatively low penetration levels of DG does not produce problems; however, the nowadays massive increase of local power generation have led to new integration challenges in order to ensure the reliability and quality of the power supply. Power quality issues are identified and their assessment is the key element in the design of measures aiming to diminish all existing disturbances.

  18. Understanding the Generation of Network Bursts by Adaptive Oscillatory Neurons

    Directory of Open Access Journals (Sweden)

    Tanguy Fardet

    2018-02-01

    Full Text Available Experimental and numerical studies have revealed that isolated populations of oscillatory neurons can spontaneously synchronize and generate periodic bursts involving the whole network. Such a behavior has notably been observed for cultured neurons in rodent's cortex or hippocampus. We show here that a sufficient condition for this network bursting is the presence of an excitatory population of oscillatory neurons which displays spike-driven adaptation. We provide an analytic model to analyze network bursts generated by coupled adaptive exponential integrate-and-fire neurons. We show that, for strong synaptic coupling, intrinsically tonic spiking neurons evolve to reach a synchronized intermittent bursting state. The presence of inhibitory neurons or plastic synapses can then modulate this dynamics in many ways but is not necessary for its appearance. Thanks to a simple self-consistent equation, our model gives an intuitive and semi-quantitative tool to understand the bursting behavior. Furthermore, it suggests that after-hyperpolarization currents are sufficient to explain bursting termination. Through a thorough mapping between the theoretical parameters and ion-channel properties, we discuss the biological mechanisms that could be involved and the relevance of the explored parameter-space. Such an insight enables us to propose experimentally-testable predictions regarding how blocking fast, medium or slow after-hyperpolarization channels would affect the firing rate and burst duration, as well as the interburst interval.

  19. Modelling of H.264 MPEG2 TS traffic source

    OpenAIRE

    Kľúčik, Stanislav; Lackovič, Martin

    2013-01-01

    This paper deals with IPTV traffic source modelling. Traffic sources are used for simulation, emulation and real network testing. This model is made as a derivation of known recorded traffic sources that are analysed and statistically processed. As the results show the proposed model causes in comparison to the known traffic source very similar network traffic parameters when used in a simulated network.

  20. Social network indices in the Generations and Gender Survey: An appraisal

    NARCIS (Netherlands)

    P.A. Dykstra (Pearl); C. Bühler (Christopher); T. Fokkema (Tineke); G. Petrič (Gregor); R. Platinovšek (Rok); T. Kogovšek (Tina); V. Hlebec (Valentina)

    2016-01-01

    markdownabstractBACKGROUND In this contribution we critically appraise the social network indices in the Generations and Gender Survey (GGS). OBJECTIVE After discussing the rationale for including social network indices in the GGS, we provide descriptive information on social network

  1. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  2. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  3. Morphological Transformation and Force Generation of Active Cytoskeletal Networks.

    Directory of Open Access Journals (Sweden)

    Tamara Carla Bidone

    2017-01-01

    Full Text Available Cells assemble numerous types of actomyosin bundles that generate contractile forces for biological processes, such as cytokinesis and cell migration. One example of contractile bundles is a transverse arc that forms via actomyosin-driven condensation of actin filaments in the lamellipodia of migrating cells and exerts significant forces on the surrounding environments. Structural reorganization of a network into a bundle facilitated by actomyosin contractility is a physiologically relevant and biophysically interesting process. Nevertheless, it remains elusive how actin filaments are reoriented, buckled, and bundled as well as undergo tension buildup during the structural reorganization. In this study, using an agent-based computational model, we demonstrated how the interplay between the density of myosin motors and cross-linking proteins and the rigidity, initial orientation, and turnover of actin filaments regulates the morphological transformation of a cross-linked actomyosin network into a bundle and the buildup of tension occurring during the transformation.

  4. Artificial earthquake record generation using cascade neural network

    Directory of Open Access Journals (Sweden)

    Bani-Hani Khaldoon A.

    2017-01-01

    Full Text Available This paper presents the results of using artificial neural networks (ANN in an inverse mapping problem for earthquake accelerograms generation. This study comprises of two parts: 1-D site response analysis; performed for Dubai Emirate at UAE, where eight earthquakes records are selected and spectral matching are performed to match Dubai response spectrum using SeismoMatch software. Site classification of Dubai soil is being considered for two classes C and D based on shear wave velocity of soil profiles. Amplifications factors are estimated to quantify Dubai soil effect. Dubai’s design response spectra are developed for site classes C & D according to International Buildings Code (IBC -2012. In the second part, ANN is employed to solve inverse mapping problem to generate time history earthquake record. Thirty earthquakes records and their design response spectrum with 5% damping are used to train two cascade forward backward neural networks (ANN1, ANN2. ANN1 is trained to map the design response spectrum to time history and ANN2 is trained to map time history records to the design response spectrum. Generalized time history earthquake records are generated using ANN1 for Dubai’s site classes C and D, and ANN2 is used to evaluate the performance of ANN1.

  5. Prediction of municipal solid waste generation using nonlinear autoregressive network.

    Science.gov (United States)

    Younes, Mohammad K; Nopiah, Z M; Basri, N E Ahmad; Basri, H; Abushammala, Mohammed F M; Maulud, K N A

    2015-12-01

    Most of the developing countries have solid waste management problems. Solid waste strategic planning requires accurate prediction of the quality and quantity of the generated waste. In developing countries, such as Malaysia, the solid waste generation rate is increasing rapidly, due to population growth and new consumption trends that characterize society. This paper proposes an artificial neural network (ANN) approach using feedforward nonlinear autoregressive network with exogenous inputs (NARX) to predict annual solid waste generation in relation to demographic and economic variables like population number, gross domestic product, electricity demand per capita and employment and unemployment numbers. In addition, variable selection procedures are also developed to select a significant explanatory variable. The model evaluation was performed using coefficient of determination (R(2)) and mean square error (MSE). The optimum model that produced the lowest testing MSE (2.46) and the highest R(2) (0.97) had three inputs (gross domestic product, population and employment), eight neurons and one lag in the hidden layer, and used Fletcher-Powell's conjugate gradient as the training algorithm.

  6. Electronic document delivery: directing interlibrary loan traffic through multiple electronic networks.

    Science.gov (United States)

    Weaver, C G

    1984-04-01

    The University of Nebraska Medical Center (UNMC) uses five different electronic networks for interlibrary loan (ILL) request transmission. The advantages and problems of using electronic networks for ILL request transmission are discussed. Advantages include speed of request transmission, improved capabilities for locating documents, lower labor costs, improved turnaround time, and production of user reports and statistics. Disadvantages include increased work load, additional staff training, coordination of non-standard networks, determining access protocols, and establishing priorities for handling requests.

  7. A State-of-the-Art Review of the Sensor Location, Flow Observability, Estimation, and Prediction Problems in Traffic Networks

    Directory of Open Access Journals (Sweden)

    Enrique Castillo

    2015-01-01

    Full Text Available A state-of-the-art review of flow observability, estimation, and prediction problems in traffic networks is performed. Since mathematical optimization provides a general framework for all of them, an integrated approach is used to perform the analysis of these problems and consider them as different optimization problems whose data, variables, constraints, and objective functions are the main elements that characterize the problems proposed by different authors. For example, counted, scanned or “a priori” data are the most common data sources; conservation laws, flow nonnegativity, link capacity, flow definition, observation, flow propagation, and specific model requirements form the most common constraints; and least squares, likelihood, possible relative error, mean absolute relative error, and so forth constitute the bases for the objective functions or metrics. The high number of possible combinations of these elements justifies the existence of a wide collection of methods for analyzing static and dynamic situations.

  8. Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic

    OpenAIRE

    Kritika Govind; S. Selvakumar

    2013-01-01

    Bots usually vary from their other malicious counter parts by periodically reporting to the botmaster through regular exchange of messages. Our experiments on bot attack generation showed a continuous exchange of packets with similar content between the botmaster and the zombie machine at various time intervals. Though there were also genuine packets with similar content being sent out of the victim machine challenge was to differentiate between the two and pass only the genuine ones. In this...

  9. Wireless next generation networks a virtue-based trust model

    CERN Document Server

    Harvey, Melissa

    2014-01-01

    This SpringerBrief proposes a trust model motivated by virtue epistemology, addressing the need for a more efficient and flexible trust model for wireless next generation networks. This theory of trust simplifies the computation and communication overhead of strictly cognitive-computational models of trust. Both the advantages and the challenges of virtue-based trust models are discussed. This brief offers new research and a general theory of rationality that enables users to interpret trust and reason as complementary mechanisms that guide our rational conduct at two different epistemic level

  10. Talking Drums: Generating drum grooves with neural networks

    Science.gov (United States)

    Hutchings, P.

    2017-05-01

    Presented is a method of generating a full drum kit part for a provided kick-drum sequence. A sequence to sequence neural network model used in natural language translation was adopted to encode multiple musical styles and an online survey was developed to test different techniques for sampling the output of the softmax function. The strongest results were found using a sampling technique that drew from the three most probable outputs at each subdivision of the drum pattern but the consistency of output was found to be heavily dependent on style.

  11. Reactive power management of power networks with wind generation

    CERN Document Server

    Amaris, Hortensia; Ortega, Carlos Alvarez

    2012-01-01

    As the energy sector shifts and changes to focus on renewable technologies, the optimization of wind power becomes a key practical issue. Reactive Power Management of Power Networks with Wind Generation brings into focus the development and application of advanced optimization techniques to the study, characterization, and assessment of voltage stability in power systems. Recent advances on reactive power management are reviewed with particular emphasis on the analysis and control of wind energy conversion systems and FACTS devices. Following an introduction, distinct chapters cover the 5 key

  12. A Virtual Channel Network-on-Chip for GT and BE traffic

    NARCIS (Netherlands)

    Kavaldjiev, N.K.; Smit, Gerardus Johannes Maria; Jansen, P.G.; Wolkotte, P.T.

    2005-01-01

    This paper presents an on-chip network for a run-time reconfigurable System-on-Chip. The network uses packet-switching with virtual channels. It can provide guaranteed services as well as best effort services. The guaranteed services are based on virtual channel allocation, in contrast to other

  13. Energy savings in dynamic and resilient optical networks based on traffic-aware strategies

    DEFF Research Database (Denmark)

    Turus, Ioan; Fagertun, Anna Manolova; Dittmann, Lars

    2014-01-01

    -mode and rate adaptive capabilities) is implementedwithin atraffic-aware networking approach.The impact of dedicated 1:1protection in a dynamic network scenarioisconsideredandacomparison is madewith the unprotected case. A GMPLS controlplane is implemented and used to re-configure the power-adaptive devices...

  14. Dynamic aggregation of traffic flows in SDN Applied to backhaul networks

    DEFF Research Database (Denmark)

    Kentis, Angelos Mimidis; Caba, Cosmin Marius; Soler, José

    2016-01-01

    A challenge in the adoption of the OpenFlow (OF)-based SDN paradigm is related to the limited number of OF rules supported by the network devices. The technology used to implement the OF rules is TCAM, which is expensive and power demanding. Due to this, the network devices are either very costly...

  15. Management of Traffic Congestion in Urban Areas

    Directory of Open Access Journals (Sweden)

    Vilibald Premzl

    2012-10-01

    Full Text Available The use of road vehicles is increasing, the benefits they affordhave been progressively diminished by external costs.Whereas traffic increases as we approach the centre, the roadand open space decreases. The greater specialisation allows thecity growth in size and in traffic attraction. In this way urbangrowth feeds itself !mer-urban transp011 facilities also becomemore extensive. Growth in size of the city generates greateramounts of traffic and can eventually give rise to agglomerationdiseconomies. Higher transport costs, offices and shops, attractedby the accessibility of central locations, gradually replaceresidential uses, people being forced to seek housing inthe suburbs. As the urban area expands and offices in the citycentre are built denser and highe1; traffic congestion increases.This may result in the fall in centra/land values, since accessibilitydiminishes with the saturation of transport network. Increasedpollution takes various forms as noise, smoke andovercrowded housing in the centre, urban decay in the transitionalzone as commercial development is anticipated.

  16. Implementing Value Added Applications in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Yuan-Kuang Tu

    2010-08-01

    Full Text Available One of the major issues in the future Internet is the integration of telecom networks with the Internet. In many countries, large Internet Service Providers (ISPs are also telecom operators that have been focusing on providing Internet services through their telecom networks with telecom-grade mechanisms. In this article, we show that IP Multimedia Subsystem (IMS is a telecom-grade mechanism that addresses this important issue. In Next Generation Network (NGN, IMS supports IP-based multimedia services that can be accessed from various wireless and wired access technologies through fixed-mobile convergence. We show how to integrate Internet Protocol Television (IPTV with NGN/IMS to offer enhanced IPTV services for subscribers with set-top boxes or mobile phones. We specifically describe the implementations of three services: weather forecasts, short messages on TV screens and TV shopping/food ordering for mobile users. Although these services can be directly implemented in the Internet, our commercial operation experiences indicate that the NGN/IMS implementation has advantages in terms of telecom-grade security, Quality of Service (QoS, and flexible service creation.

  17. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  18. Generative Recurrent Networks for De Novo Drug Design.

    Science.gov (United States)

    Gupta, Anvita; Müller, Alex T; Huisman, Berend J H; Fuchs, Jens A; Schneider, Petra; Schneider, Gisbert

    2018-01-01

    Generative artificial intelligence models present a fresh approach to chemogenomics and de novo drug design, as they provide researchers with the ability to narrow down their search of the chemical space and focus on regions of interest. We present a method for molecular de novo design that utilizes generative recurrent neural networks (RNN) containing long short-term memory (LSTM) cells. This computational model captured the syntax of molecular representation in terms of SMILES strings with close to perfect accuracy. The learned pattern probabilities can be used for de novo SMILES generation. This molecular design concept eliminates the need for virtual compound library enumeration. By employing transfer learning, we fine-tuned the RNN's predictions for specific molecular targets. This approach enables virtual compound design without requiring secondary or external activity prediction, which could introduce error or unwanted bias. The results obtained advocate this generative RNN-LSTM system for high-impact use cases, such as low-data drug discovery, fragment based molecular design, and hit-to-lead optimization for diverse drug targets. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  19. Optimal power flow for distribution networks with distributed generation

    Directory of Open Access Journals (Sweden)

    Radosavljević Jordan

    2015-01-01

    Full Text Available This paper presents a genetic algorithm (GA based approach for the solution of the optimal power flow (OPF in distribution networks with distributed generation (DG units, including fuel cells, micro turbines, diesel generators, photovoltaic systems and wind turbines. The OPF is formulated as a nonlinear multi-objective optimization problem with equality and inequality constraints. Due to the stochastic nature of energy produced from renewable sources, i.e. wind turbines and photovoltaic systems, as well as load uncertainties, a probabilisticalgorithm is introduced in the OPF analysis. The Weibull and normal distributions are employed to model the input random variables, namely the wind speed, solar irradiance and load power. The 2m+1 point estimate method and the Gram Charlier expansion theory are used to obtain the statistical moments and the probability density functions (PDFs of the OPF results. The proposed approach is examined and tested on a modified IEEE 34 node test feeder with integrated five different DG units. The obtained results prove the efficiency of the proposed approach to solve both deterministic and probabilistic OPF problems for different forms of the multi-objective function. As such, it can serve as a useful decision-making supporting tool for distribution network operators. [Projekat Ministarstva nauke Republike Srbije, br. TR33046

  20. Development and Application of a Next Generation Air Sensor Network for the Hong Kong Marathon 2015 Air Quality Monitoring.

    Science.gov (United States)

    Sun, Li; Wong, Ka Chun; Wei, Peng; Ye, Sheng; Huang, Hao; Yang, Fenhuan; Westerdahl, Dane; Louie, Peter K K; Luk, Connie W Y; Ning, Zhi

    2016-02-05

    This study presents the development and evaluation of a next generation air monitoring system with both laboratory and field tests. A multi-parameter algorithm was used to correct for the impact of environmental conditions on the electrochemical sensors for carbon monoxide (CO) and nitrogen dioxide (NO2) pollutants. The field evaluation in an urban roadside environment in comparison to designated monitors showed good agreement with measurement error within 5% of the pollutant concentrations. Multiple sets of the developed system were then deployed in the Hong Kong Marathon 2015 forming a sensor-based network along the marathon route. Real-time air pollution concentration data were wirelessly transmitted and the Air Quality Health Index (AQHI) for the Green Marathon was calculated, which were broadcast to the public on an hourly basis. The route-specific sensor network showed somewhat different pollutant patterns than routine air monitoring, indicating the immediate impact of traffic control during the marathon on the roadside air quality. The study is one of the first applications of a next generation sensor network in international sport events, and it demonstrated the usefulness of the emerging sensor-based air monitoring technology in rapid network deployment to supplement existing air monitoring.

  1. Development and Application of a Next Generation Air Sensor Network for the Hong Kong Marathon 2015 Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Li Sun

    2016-02-01

    Full Text Available This study presents the development and evaluation of a next generation air monitoring system with both laboratory and field tests. A multi-parameter algorithm was used to correct for the impact of environmental conditions on the electrochemical sensors for carbon monoxide (CO and nitrogen dioxide (NO2 pollutants. The field evaluation in an urban roadside environment in comparison to designated monitors showed good agreement with measurement error within 5% of the pollutant concentrations. Multiple sets of the developed system were then deployed in the Hong Kong Marathon 2015 forming a sensor-based network along the marathon route. Real-time air pollution concentration data were wirelessly transmitted and the Air Quality Health Index (AQHI for the Green Marathon was calculated, which were broadcast to the public on an hourly basis. The route-specific sensor network showed somewhat different pollutant patterns than routine air monitoring, indicating the immediate impact of traffic control during the marathon on the roadside air quality. The study is one of the first applications of a next generation sensor network in international sport events, and it demonstrated the usefulness of the emerging sensor-based air monitoring technology in rapid network deployment to supplement existing air monitoring.

  2. Human factors in the presentation of computer-generated information - Aspects of design and application in automated flight traffic

    Science.gov (United States)

    Roske-Hofstrand, Renate J.

    1990-01-01

    The man-machine interface and its influence on the characteristics of computer displays in automated air traffic is discussed. The graphical presentation of spatial relationships and the problems it poses for air traffic control, and the solution of such problems are addressed. Psychological factors involved in the man-machine interface are stressed.

  3. Energy-Efficient Multicasting of Session Traffic in Bandwidth- and Transceiver-Limited Wireless Networks

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2002-01-01

    In this paper, we address the impact of resource limitations on the operation and performance of the broadcasting and multicasting schemes developed for infrastructureless wireless networks in our earlier studies...

  4. Report: Improvements Needed in EPA’s Network Traffic Management Practices

    Science.gov (United States)

    Report #11-P-0159, March 14, 2011. OEI does not have consistent, repeatable intrusion detection system monitoring practices in place, which inhibits EPA’s ability to monitor unusual network activity and thus protect Agency systems and associated data.

  5. What's in a name generator? Choosing the right name generators for social network surveys in healthcare quality and safety research.

    Science.gov (United States)

    Burt, Ronald S; Meltzer, David O; Seid, Michael; Borgert, Amy; Chung, Jeanette W; Colletti, Richard B; Dellal, George; Kahn, Stacy A; Kaplan, Heather C; Peterson, Laura E; Margolis, Peter

    2012-12-01

    Interest in the use of social network analysis (SNA) in healthcare research has increased, but there has been little methodological research on how to choose the name generators that are often used to collect primary data on the social connection between individuals for SNA. We sought to determine a minimum set of name generators sufficient to distinguish the social networks of a target population of physicians active in quality improvement (QI). We conducted a pilot survey including 8 name generators in a convenience sample of 25 physicians active in QI to characterize their social networks. We used multidimensional scaling to determine what subset of these name generators was needed to distinguish these social networks. We found that some physicians maintain a social network organized around a specific colleague who performed multiple roles while others maintained highly differentiated networks. We found that a set of 5 of the 8 name generators we used was needed to distinguish the networks of these physicians. Beyond methodology for selecting name generators, our findings suggest that QI networks may require 5 or more generators to elicit valid sets of relevant actors and relations in this target population.

  6. Stochastic Model of Traffic Jam and Traffic Signal Control

    Science.gov (United States)

    Shin, Ji-Sun; Cui, Cheng-You; Lee, Tae-Hong; Lee, Hee-Hyol

    Traffic signal control is an effective method to solve the traffic jam. and forecasting traffic density has been known as an important part of the Intelligent Transportation System (ITS). The several methods of the traffic signal control are known such as random walk method, Neuron Network method, Bayesian Network method, and so on. In this paper, we propose a new method of a traffic signal control using a predicted distribution of traffic jam based on a Dynamic Bayesian Network model. First, a forecasting model to predict a probabilistic distribution of the traffic jam during each period of traffic lights is built. As the forecasting model, the Dynamic Bayesian Network is used to predict the probabilistic distribution of a density of the traffic jam. According to measurement of two crossing points for each cycle, the inflow and outflow of each direction and the number of standing vehicles at former cycle are obtained. The number of standing vehicle at k-th cycle will be calculated synchronously. Next, the probabilistic distribution of the density of standing vehicle in each cycle will be predicted using the Dynamic Bayesian Network constructed for the traffic jam. And then a control rule to adjust the split and the cycle to increase the probability between a lower limit and ceiling of the standing vehicles is deduced. As the results of the simulation using the actual traffic data of Kitakyushu city, the effectiveness of the method is shown.

  7. Generative models of rich clubs in Hebbian neuronal networks and large-scale human brain networks.

    Science.gov (United States)

    Vértes, Petra E; Alexander-Bloch, Aaron; Bullmore, Edward T

    2014-10-05

    Rich clubs arise when nodes that are 'rich' in connections also form an elite, densely connected 'club'. In brain networks, rich clubs incur high physical connection costs but also appear to be especially valuable to brain function. However, little is known about the selection pressures that drive their formation. Here, we take two complementary approaches to this question: firstly we show, using generative modelling, that the emergence of rich clubs in large-scale human brain networks can be driven by an economic trade-off between connection costs and a second, competing topological term. Secondly we show, using simulated neural networks, that Hebbian learning rules also drive the emergence of rich clubs at the microscopic level, and that the prominence of these features increases with learning time. These results suggest that Hebbian learning may provide a neuronal mechanism for the selection of complex features such as rich clubs. The neural networks that we investigate are explicitly Hebbian, and we argue that the topological term in our model of large-scale brain connectivity may represent an analogous connection rule. This putative link between learning and rich clubs is also consistent with predictions that integrative aspects of brain network organization are especially important for adaptive behaviour. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  8. ReFlow: Reports on Internet Traffic

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    Internet traffic statistics can provide valuable information to network analysts and researchers about the traffic, technologies and main characteristics of today’s networks. For many years Internet2 maintained a public website with statistics about the traffic in the Abilene network. This site was

  9. Traffic Load on Interconnection Lines of Generalized Double Ring Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Madsen, Ole Brun

    2005-01-01

    Generalized Double Ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure...... consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading...

  10. Traffic Load on Interconnection Lines of Generalized Double Ring Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Madsen, Ole Brun

    2004-01-01

    Generalized Double Ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure...... consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading...

  11. Latest generation interconnect technologies in APEnet+ networking infrastructure

    Science.gov (United States)

    Ammendola, Roberto; Biagioni, Andrea; Cretaro, Paolo; Frezza, Ottorino; Lo Cicero, Francesca; Lonardo, Alessandro; Martinelli, Michele; Stanislao Paolucci, Pier; Pastorelli, Elena; Rossetti, Davide; Simula, Francesco; Vicini, Piero

    2017-10-01

    In this paper we present the status of the 3rd generation design of the APEnet board (V5) built upon the 28nm Altera Stratix V FPGA; it features a PCIe Gen3 x8 interface and enhanced embedded transceivers with a maximum capability of 12.5Gbps each. The network architecture is designed in accordance to the Remote DMA paradigm. The APEnet+ V5 prototype is built upon the Stratix V DevKit with the addition of a proprietary, third party IP core implementing multi-DMA engines. Support for zero-copy communication is assured by the possibility of DMA-accessing either host and GPU memory, offloading the CPU from the chore of data copying. The current implementation plateaus to a bandwidth for memory read of 4.8GB/s. Here we describe the hardware optimization to the memory write process which relies on the use of two independent DMA engines and an improved TLB.

  12. Efficient Pruning Method for Ensemble Self-Generating Neural Networks

    Directory of Open Access Journals (Sweden)

    Hirotaka Inoue

    2003-12-01

    Full Text Available Recently, multiple classifier systems (MCS have been used for practical applications to improve classification accuracy. Self-generating neural networks (SGNN are one of the suitable base-classifiers for MCS because of their simple setting and fast learning. However, the computation cost of the MCS increases in proportion to the number of SGNN. In this paper, we propose an efficient pruning method for the structure of the SGNN in the MCS. We compare the pruned MCS with two sampling methods. Experiments have been conducted to compare the pruned MCS with an unpruned MCS, the MCS based on C4.5, and k-nearest neighbor method. The results show that the pruned MCS can improve its classification accuracy as well as reducing the computation cost.

  13. CoreFlow: Enriching Bro security events using network traffic monitoring data

    NARCIS (Netherlands)

    Koning, R.; Buraglio, N.; de Laat, C.; Grosso, P.

    Attacks against network infrastructures can be detected by Intrusion Detection Systems (IDS). Still reaction to these events are often limited by the lack of larger contextual information in which they occurred. In this paper we present CoreFlow, a framework for the correlation and enrichment of IDS

  14. Monitoring of traffic noise in an urban area using a wireless sensor network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der; Graafland, F.

    2014-01-01

    Developments in systems for monitoring environmental noise have made it possible to monitor the acoustic situation within large urban areas. The developments in hardware size and costs, combined with the developments in wireless communication allow to deploy networks with many acoustic sensors

  15. Power Efficient Service Differentiation Based on Traffic-Aware Survivable Elastic Optical Networks

    DEFF Research Database (Denmark)

    Turus, Ioan; Fagertun, Anna Manolova; Dittmann, Lars

    2014-01-01

    This study assesses the feasible energy savings whendefining different service classes based on protection schemesincore optical networks.Wepropose a dedicated energy savingstrategy for each of the service classes in order to minimize theoverall power consumption of the network.Four Classes of Se...... while for the proposed approach the difference in power consumption is almost negligible.Moreover, incase of the proposed approach,silver serviceclass can benefit for superior quality of service compared to the gold service class, due to the grooming mechanism.......This study assesses the feasible energy savings whendefining different service classes based on protection schemesincore optical networks.Wepropose a dedicated energy savingstrategy for each of the service classes in order to minimize theoverall power consumption of the network.Four Classes...... of Serviceareconsidered: platinum, gold, silver and best effort.Platinumconnections benefit from a 1+1 protection scheme, gold connections and silver connections are assigned to a 1:1 protection with the difference that in case of gold connections the same pair of transponders is shared by the working and protection...

  16. Towards Scalable Distributed Framework for Urban Congestion Traffic Patterns Warehousing

    Directory of Open Access Journals (Sweden)

    A. Boulmakoul

    2015-01-01

    Full Text Available We put forward architecture of a framework for integration of data from moving objects related to urban transportation network. Most of this research refers to the GPS outdoor geolocation technology and uses distributed cloud infrastructure with big data NoSQL database. A network of intelligent mobile sensors, distributed on urban network, produces congestion traffic patterns. Congestion predictions are based on extended simulation model. This model provides traffic indicators calculations, which fuse with the GPS data for allowing estimation of traffic states across the whole network. The discovery process of congestion patterns uses semantic trajectories metamodel given in our previous works. The challenge of the proposed solution is to store patterns of traffic, which aims to ensure the surveillance and intelligent real-time control network to reduce congestion and avoid its consequences. The fusion of real-time data from GPS-enabled smartphones integrated with those provided by existing traffic systems improves traffic congestion knowledge, as well as generating new information for a soft operational control and providing intelligent added value for transportation systems deployment.

  17. Macrostructure from Microstructure: Generating Whole Systems from Ego Networks

    Science.gov (United States)

    Smith, Jeffrey A.

    2014-01-01

    This paper presents a new simulation method to make global network inference from sampled data. The proposed simulation method takes sampled ego network data and uses Exponential Random Graph Models (ERGM) to reconstruct the features of the true, unknown network. After describing the method, the paper presents two validity checks of the approach: the first uses the 20 largest Add Health networks while the second uses the Sociology Coauthorship network in the 1990's. For each test, I take random ego network samples from the known networks and use my method to make global network inference. I find that my method successfully reproduces the properties of the networks, such as distance and main component size. The results also suggest that simpler, baseline models provide considerably worse estimates for most network properties. I end the paper by discussing the bounds/limitations of ego network sampling. I also discuss possible extensions to the proposed approach. PMID:25339783

  18. Performance Testing of GPU-Based Approximate Matching Algorithm on Network Traffic

    Science.gov (United States)

    2015-03-01

    26  E .  COMPARING REFERENCE SET AND TARGET SET USING THE CPU IMPLEMENTATION OF SDHASH...network either by sending it as an attachment in electronic mail (email), Instant Messenger (IM), posting it on social media sites such as Facebook ... Instagram , Twitter, LinkedIn, etc., or transferring it to cloud storage services such as Google Drive, Microsoft OneDrive, DropBox, Apple iCloud. In

  19. TCP Traffic Control Evaluation and Reduction over Wireless Networks Using Parallel Sequential Decoding Mechanism

    Directory of Open Access Journals (Sweden)

    Ramazan Aygün

    2007-11-01

    Full Text Available The assumption of TCP-based protocols that packet error (lost or damaged is due to network congestion is not true for wireless networks. For wireless networks, it is important to reduce the number of retransmissions to improve the effectiveness of TCP-based protocols. In this paper, we consider improvement at the data link layer for systems that use stop-and-wait ARQ as in IEEE 802.11 standard. We show that increasing the buffer size will not solve the actual problem and moreover it is likely to degrade the quality of delivery (QoD. We firstly study a wireless router system model with a sequential convolutional decoder for error detection and correction in order to investigate QoD of flow and error control. To overcome the problems along with high packet error rate, we propose a wireless router system with parallel sequential decoders. We simulate our systems and provide performance in terms of average buffer occupancy, blocking probability, probability of decoding failure, system throughput, and channel throughput. We have studied these performance metrics for different channel conditions, packet arrival rates, decoding time-out limits, system capacities, and the number of sequential decoders. Our results show that parallel sequential decoders have great impact on the system performance and increase QoD significantly.

  20. TCP Traffic Control Evaluation and Reduction over Wireless Networks Using Parallel Sequential Decoding Mechanism

    Directory of Open Access Journals (Sweden)

    Aygün Ramazan

    2007-01-01

    Full Text Available The assumption of TCP-based protocols that packet error (lost or damaged is due to network congestion is not true for wireless networks. For wireless networks, it is important to reduce the number of retransmissions to improve the effectiveness of TCP-based protocols. In this paper, we consider improvement at the data link layer for systems that use stop-and-wait ARQ as in IEEE 802.11 standard. We show that increasing the buffer size will not solve the actual problem and moreover it is likely to degrade the quality of delivery (QoD. We firstly study a wireless router system model with a sequential convolutional decoder for error detection and correction in order to investigate QoD of flow and error control. To overcome the problems along with high packet error rate, we propose a wireless router system with parallel sequential decoders. We simulate our systems and provide performance in terms of average buffer occupancy, blocking probability, probability of decoding failure, system throughput, and channel throughput. We have studied these performance metrics for different channel conditions, packet arrival rates, decoding time-out limits, system capacities, and the number of sequential decoders. Our results show that parallel sequential decoders have great impact on the system performance and increase QoD significantly.