期刊文献+
共找到60,879篇文章
< 1 2 250 >
每页显示 20 50 100
Urban Traffic Control Meets Decision Recommendation System:A Survey and Perspective
1
作者 Qingyuan Ji Xiaoyue Wen +2 位作者 Junchen Jin Yongdong Zhu Yisheng Lv 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2043-2058,共16页
Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal ... Urban traffic control is a multifaceted and demanding task that necessitates extensive decision-making to ensure the safety and efficiency of urban transportation systems.Traditional approaches require traffic signal professionals to manually intervene on traffic control devices at the intersection level,utilizing their knowledge and expertise.However,this process is cumbersome,labor-intensive,and cannot be applied on a large network scale.Recent studies have begun to explore the applicability of recommendation system for urban traffic control,which offer increased control efficiency and scalability.Such a decision recommendation system is complex,with various interdependent components,but a systematic literature review has not yet been conducted.In this work,we present an up-to-date survey that elucidates all the detailed components of a recommendation system for urban traffic control,demonstrates the utility and efficacy of such a system in the real world using data and knowledgedriven approaches,and discusses the current challenges and potential future directions of this field. 展开更多
关键词 Recommendation system traffic control traffic perception traffic prediction
下载PDF
Spatiotemporal Prediction of Urban Traffics Based on Deep GNN
2
作者 Ming Luo Huili Dou Ning Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期265-282,共18页
Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of ... Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data.As well as to fulfil both long-termand short-termprediction objectives,a better representation of the temporal dependency and global spatial correlation of traffic data is needed.In order to do this,the Spatiotemporal Graph Neural Network(S-GNN)is proposed in this research as amethod for traffic prediction.The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables.In terms of modelling,the road network is initially represented as a spatiotemporal directed graph,with the features of the samples at the time step being captured by a convolution module.In order to assign varying attention weights to various adjacent area nodes of the target node,the adjacent areas information of nodes in the road network is then aggregated using a graph network.The data is output using a fully connected layer at the end.The findings show that S-GNN can improve short-and long-term traffic prediction accuracy to a greater extent;in comparison to the control model,the RMSE of S-GNN is reduced by about 0.571 to 9.288 and the MAE(Mean Absolute Error)by about 0.314 to 7.678.The experimental results on two real datasets,Pe MSD7(M)and PEMS-BAY,also support this claim. 展开更多
关键词 Urban traffic traffic temporal correlation GNN PREDICTION
下载PDF
Dynamic response of mountain tunnel,bridge,and embankment along the Sichuan-Tibet transportation corridor to active fault based on model tests
3
作者 HUANG Beixiu QIAO Sijia +2 位作者 CHEN Xulei LI Lihui QI Shengwen 《Journal of Mountain Science》 SCIE CSCD 2024年第1期182-199,共18页
The Sichuan-Tibet transportation corridor is prone to numerous active faults and frequent strong earthquakes.While extensive studies have individually explored the effect of active faults and strong earthquakes on dif... The Sichuan-Tibet transportation corridor is prone to numerous active faults and frequent strong earthquakes.While extensive studies have individually explored the effect of active faults and strong earthquakes on different engineering structures,their combined effect remains unclear.This research employed multiple physical model tests to investigate the dynamic response of various engineering structures,including tunnels,bridges,and embankments,under the simultaneous influence of cumulative earthquakes and stick-slip misalignment of an active fault.The prototype selected for this study was the Kanding No.2 tunnel,which crosses the Yunongxi fault zone within the Sichuan-Tibet transportation corridor.The results demonstrated that the tunnel,bridge,and embankment exhibited amplification in response to the input seismic wave,with the amplification effect gradually decreasing as the input peak ground acceleration(PGA)increased.The PGAs of different engineering structures were weakened by the fault rupture zone.Nevertheless,the misalignment of the active fault may decrease the overall stiffness of the engineering structure,leading to more severe damage,with a small contribution from seismic vibration.Additionally,the seismic vibration effect might be enlarged with the height of the engineering structure,and the tunnel is supposed to have a smaller PGA and lower dynamic earth pressure compared to bridges and embankments in strong earthquake zones crossing active faults.The findings contribute valuable insights for evaluating the dynamic response of various engineering structures crossing an active fault and provide an experimental reference for secure engineering design in the challenging conditions of the Sichuan-Tibet transportation corridor. 展开更多
关键词 Dynamic response Engineering structure sichuan-tibet transportation corridor Active fault EARTHQUAKE Model test
下载PDF
Segment routing for traffic engineering and effective recovery in low-earth orbit satellite constellations
4
作者 Shengyu Zhang Xiaoqian Li Kwan Lawrence Yeung 《Digital Communications and Networks》 SCIE CSCD 2024年第3期706-715,共10页
Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in in... Low-Earth Orbit Satellite Constellations(LEO-SCs)provide global,high-speed,and low latency Internet access services,which bridges the digital divide in the remote areas.As inter-satellite links are not supported in initial deployment(i.e.the Starlink),the communication between satellites is based on ground stations with radio frequency signals.Due to the rapid movement of satellites,this hybrid topology of LEO-SCs and ground stations is time-varying,which imposes a major challenge to uninterrupted service provisioning and network management.In this paper,we focus on solving two notable problems in such a ground station-assisted LEO-SC topology,i.e.,traffic engineering and fast reroute,to guarantee that the packets are forwarded in a balanced and uninterrupted manner.Specifically,we employ segment routing to support the arbitrary path routing in LEO-SCs.To solve the traffic engineering problem,we proposed two source routings with traffic splitting algorithms,Delay-Bounded Traffic Splitting(DBTS)and DBTS+,where DBTS equally splits a flow and DBTS+favors shorter paths.Simu-lation results show that DBTS+can achieve about 30%lower maximum satellite load at the cost of about 10%more delay.To guarantee the fast recovery of failures,two fast reroute mechanisms,Loop-Free Alternate(LFA)and LFA+,are studied,where LFA pre-computes an alternate next-hop as a backup while LFA+finds a 2-segment backup path.We show that LFA+can increase the percentage of protection coverage by about 15%. 展开更多
关键词 Fast reroute Low-earth orbit satellite constellation Segment routing traffic engineering traffic splitting
下载PDF
RUFY4 deletion prevents pathological bone loss by blocking endo-lysosomal trafficking of osteoclasts
5
作者 Minhee Kim Jin Hee Park +13 位作者 Miyeon Go Nawon Lee Jeongin Seo Hana Lee Doyong Kim Hyunil Ha Taesoo Kim Myeong Seon Jeong Suree Kim Taesoo Kim Han Sung Kim Dongmin Kang Hyunbo Shim Soo Young Lee 《Bone Research》 SCIE CAS CSCD 2024年第2期407-420,共14页
Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts... Mature osteoclasts degrade bone matrix by exocytosis of active proteases from secretory lysosomes through a ruffled border.However,the molecular mechanisms underlying lysosomal trafficking and secretion in osteoclasts remain largely unknown.Here,we show with GeneChip analysis that RUN and FYVE domain-containing protein 4(RUFY4)is strongly upregulated during osteoclastogenesis.Mice lacking Rufy4 exhibited a high trabecular bone mass phenotype with abnormalities in osteoclast function in vivo.Furthermore,deleting Rufy4 did not affect osteoclast differentiation,but inhibited bone-resorbing activity due to disruption in the acidic maturation of secondary lysosomes,their trafficking to the membrane,and their secretion of cathepsin K into the extracellular space.Mechanistically,RUFY4 promotes late endosome-lysosome fusion by acting as an adaptor protein between Rab7 on late endosomes and LAMP2 on primary lysosomes.Consequently,Rufy4-deficient mice were highly protected from lipopolysaccharide-and ovariectomy-induced bone loss.Thus,RUFY4 plays as a new regulator in osteoclast activity by mediating endo-lysosomal trafficking and have a potential to be specific target for therapies against bone-loss diseases such as osteoporosis. 展开更多
关键词 OSTEOCLAST inhibited traffic
下载PDF
Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network
6
作者 Saad Abdalla Agaili Mohamed Sefer Kurnaz 《Computers, Materials & Continua》 SCIE EI 2024年第7期819-841,共23页
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and c... VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world.However,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork data.We present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service assaults.We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns.Next,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous actions.To effectively process and categorize encrypted packets,the neural network model has input,hidden,and output layers.We use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral properties.We also use cutting-edge optimizationmethods to optimize network characteristics and performance.The suggested ANN-based categorization method is extensively tested and analyzed.Results show the model effectively classifies VPN traffic types.We also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%accuracy.This study improves VPN security and protects against new cyberthreats.Classifying VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security problems.This study advances network security and lays the groundwork for ANN-based cybersecurity solutions. 展开更多
关键词 VPN network traffic flow ANN classification intrusion detection data exfiltration encrypted traffic feature extraction network security
下载PDF
Scalable Temporal Dimension Preserved Tensor Completion for Missing Traffic Data Imputation With Orthogonal Initialization
7
作者 Hong Chen Mingwei Lin +1 位作者 Jiaqi Liu Zeshui Xu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2188-2190,共3页
Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on... Dear Editor,This letter puts forward a novel scalable temporal dimension preserved tensor completion model based on orthogonal initialization for missing traffic data(MTD)imputation.The MTD imputation acts directly on accessing the traffic state,and affects the traffic management. 展开更多
关键词 DIMENSION management traffic
下载PDF
An edge computing-based embedded traffic information processing approach:application of deep learning in existing traffic systems
8
作者 PING Haoyu MA Yongjie +1 位作者 ZHU Guangya ZHANG Jiaqi 《Optoelectronics Letters》 EI 2024年第10期623-628,共6页
To address traffic congestion,this study improves Mobile Netv2-you only look once version 4(YOLOv4)target detection algorithm(Mobile Netv2-YOLOv4-K++F)and introduces an embedded traffic information processing solution... To address traffic congestion,this study improves Mobile Netv2-you only look once version 4(YOLOv4)target detection algorithm(Mobile Netv2-YOLOv4-K++F)and introduces an embedded traffic information processing solution based on edge computing.We transition models initially designed for large-scale graphics processing units(GPUs)to edge computing devices,maximizing the strengths of both deep learning and edge computing technologies.This approach integrates embedded devices with the current traffic system,eliminating the need for extensive equipment updates.The solution enables real-time traffic flow monitoring and license plate recognition at the edge,synchronizing instantaneously with the cloud,allowing for intelligent adjustments of traffic signals and accident forewarnings,enhancing road utilization,and facilitating traffic flow optimization.Through on-site testing using the RK3399PRO development board and the Mobile Netv2-YOLOv4-K++F object detection algorithm,the upgrade costs of this approach are less than one-tenth of conventional methods.Under favorable weather conditions,the traffic flow detection accuracy reaches as high as 98%,with license plate recognition exceeding 80%. 展开更多
关键词 COMPUTING APPROACH traffic
原文传递
Semantic Consistency and Correctness Verification of Digital Traffic Rules
9
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving traffic rules DIGITIZATION FORMALIZATION VERIFICATION
下载PDF
Effect of speed humps on instantaneous traffic emissions in a microscopic model with limited deceleration capacity
10
作者 胡宇晨 李启朗 +2 位作者 刘军 王君霞 汪秉宏 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期413-420,共8页
As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the clas... As a common transportation facility, speed humps can control the speed of vehicles on special road sections to reduce traffic risks. At the same time, they also cause instantaneous traffic emissions. Based on the classic instantaneous traffic emission model and the limited deceleration capacity microscopic traffic flow model with slow-to-start rules, this paper has investigated the impact of speed humps on traffic flow and the instantaneous emissions of vehicle pollutants in a single lane situation. The numerical simulation results have shown that speed humps have significant effects on traffic flow and traffic emissions. In a free-flow region, the increase of speed humps leads to the continuous rise of CO_(2), NO_(X) and PM emissions. Within some density ranges, one finds that these pollutant emissions can evolve into some higher values under some random seeds. Under other random seeds, they can evolve into some lower values. In a wide moving jam region, the emission values of these pollutants sometimes appear as continuous or intermittent phenomenon. Compared to the refined Na Sch model, the present model has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher volatile organic components(VOC) emissions. Compared to the limited deceleration capacity model without slow-to-start rules, the present model also has lower instantaneous emissions such as CO_(2), NO_(X) and PM and higher VOC emissions in a wide moving jam region. These results can also be confirmed or explained by the statistical values of vehicle velocity and acceleration. 展开更多
关键词 traffic emissions speed humps slow-to-start rules deceleration capacity
下载PDF
WT-FCTGN:A wavelet-enhanced fully connected time-gated neural network for complex noisy traffic flow modeling
11
作者 廖志芳 孙轲 +3 位作者 刘文龙 余志武 刘承光 宋禹成 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期652-664,共13页
Accurate forecasting of traffic flow provides a powerful traffic decision-making basis for an intelligent transportation system. However, the traffic data's complexity and fluctuation, as well as the noise produce... Accurate forecasting of traffic flow provides a powerful traffic decision-making basis for an intelligent transportation system. However, the traffic data's complexity and fluctuation, as well as the noise produced during collecting information and summarizing original data of traffic flow, cause large errors in the traffic flow forecasting results. This article suggests a solution to the above mentioned issues and proposes a fully connected time-gated neural network based on wavelet reconstruction(WT-FCTGN). To eliminate the potential noise and strengthen the potential traffic trend in the data, we adopt the methods of wavelet reconstruction and periodic data introduction to preprocess the data. The model introduces fully connected time-series blocks to model all the information including time sequence information and fluctuation information in the flow of traffic, and establishes the time gate block to comprehend the periodic characteristics of the flow of traffic and predict its flow. The performance of the WT-FCTGN model is validated on the public Pe MS data set. The experimental results show that the WT-FCTGN model has higher accuracy, and its mean absolute error(MAE), mean absolute percentage error(MAPE) and root mean square error(RMSE) are obviously lower than those of the other algorithms. The robust experimental results prove that the WT-FCTGN model has good anti-noise ability. 展开更多
关键词 traffic flow modeling time-series wavelet reconstruction
下载PDF
Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks
12
作者 Adisa Haskovic Dzubur Samir Causevic +3 位作者 Belma Memic Muhamed Begovic Elma Avdagic-Golub Alem Colakovic 《Computers, Materials & Continua》 SCIE EI 2024年第10期1059-1084,共26页
Wireless sensor networks(WSNs)are characterized by heterogeneous traffic types(audio,video,data)and diverse application traffic requirements.This paper introduces three traffic classes following the defined model of h... Wireless sensor networks(WSNs)are characterized by heterogeneous traffic types(audio,video,data)and diverse application traffic requirements.This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs.The requirements for each class regarding sensitivity to QoS(Quality of Service)parameters,such as loss,delay,and jitter,are described.These classes encompass real-time and delay-tolerant traffic.Given that QoS evaluation is a multi-criteria decision-making problem,we employed the AHP(Analytical Hierarchy Process)method for multi-criteria optimization.As a result of this approach,we derived weight values for different traffic classes based on key QoS factors and requirements.These weights are assigned to individual traffic classes to determine transmission priority.This study provides a thorough comparative analysis of the proposed model against existing methods,demonstrating its superior performance across various traffic scenarios and its implications for future WSN applications.The results highlight the model’s adaptability and robustness in optimizing network resources under varying conditions,offering insights into practical deployments in real-world scenarios.Additionally,the paper includes an analysis of energy consumption,underscoring the trade-offs between QoS performance and energy efficiency.This study presents the development of a differentiated services model for heterogeneous traffic in wireless sensor networks,considering the appropriate QoS framework supported by experimental analyses. 展开更多
关键词 Wireless Sensor Networks(WSNs) traffic differentiation traffic classes Quality of Services(QoS) multi-criteria optimization Analytical Hierarchy Process(AHP)
下载PDF
Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks(MANETS)
13
作者 Ahmed Alhussen Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第5期1903-1923,共21页
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Ne... Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial resources.This study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANETs)based real-time prediction paradigm for urban traffic challenges.MANETs are wireless networks that are based on mobile devices and may self-organize.The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts.This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network(CSFPNN)technique to assess real-time data acquired from various sources within theMANETs.The framework uses the proposed approach to learn from the data and create predictionmodels to detect possible traffic problems and their severity in real time.Real-time traffic prediction allows for proactive actions like resource allocation,dynamic route advice,and traffic signal optimization to reduce congestion.The framework supports effective decision-making,decreases travel time,lowers fuel use,and enhances overall urban mobility by giving timely information to pedestrians,drivers,and urban planners.Extensive simulations and real-world datasets are used to test the proposed framework’s prediction accuracy,responsiveness,and scalability.Experimental results show that the suggested framework successfully anticipates urban traffic issues in real-time,enables proactive traffic management,and aids in creating smarter,more sustainable cities. 展开更多
关键词 Mobile AdHocNetworks(MANET) urban traffic prediction artificial intelligence(AI) traffic congestion chaotic spatial fuzzy polynomial neural network(CSFPNN)
下载PDF
Traffic Flow Prediction with Heterogeneous Spatiotemporal Data Based on a Hybrid Deep Learning Model Using Attention-Mechanism
14
作者 Jing-Doo Wang Chayadi Oktomy Noto Susanto 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1711-1728,共18页
A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow acc... A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic flow.Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately.However,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors.This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention mechanisms.Prior studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast outcomes.In addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast outcomes.The experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature. 展开更多
关键词 traffic flow prediction sptiotemporal data heterogeneous data Conv-BiLSTM DATA-CENTRIC intra-data
下载PDF
Effects of connected automated vehicle on stability and energy consumption of heterogeneous traffic flow system
15
作者 申瑾 赵建东 +2 位作者 刘华清 姜锐 余智鑫 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期291-301,共11页
With the development of intelligent and interconnected traffic system,a convergence of traffic stream is anticipated in the foreseeable future,where both connected automated vehicle(CAV)and human driven vehicle(HDV)wi... With the development of intelligent and interconnected traffic system,a convergence of traffic stream is anticipated in the foreseeable future,where both connected automated vehicle(CAV)and human driven vehicle(HDV)will coexist.In order to examine the effect of CAV on the overall stability and energy consumption of such a heterogeneous traffic system,we first take into account the interrelated perception of distance and speed by CAV to establish a macroscopic dynamic model through utilizing the full velocity difference(FVD)model.Subsequently,adopting the linear stability theory,we propose the linear stability condition for the model through using the small perturbation method,and the validity of the heterogeneous model is verified by comparing with the FVD model.Through nonlinear theoretical analysis,we further derive the KdV-Burgers equation,which captures the propagation characteristics of traffic density waves.Finally,by numerical simulation experiments through utilizing a macroscopic model of heterogeneous traffic flow,the effect of CAV permeability on the stability of density wave in heterogeneous traffic flow and the energy consumption of the traffic system is investigated.Subsequent analysis reveals emergent traffic phenomena.The experimental findings demonstrate that as CAV permeability increases,the ability to dampen the propagation of fluctuations in heterogeneous traffic flow gradually intensifies when giving system perturbation,leading to enhanced stability of the traffic system.Furthermore,higher initial traffic density renders the traffic system more susceptible to congestion,resulting in local clustering effect and stop-and-go traffic phenomenon.Remarkably,the total energy consumption of the heterogeneous traffic system exhibits a gradual decline with CAV permeability increasing.Further evidence has demonstrated the positive influence of CAV on heterogeneous traffic flow.This research contributes to providing theoretical guidance for future CAV applications,aiming to enhance urban road traffic efficiency and alleviate congestion. 展开更多
关键词 heterogeneous traffic flow CAV linear stability nonlinear stability energy consumption
下载PDF
Traffic Sign Detection Model Based on Improved RT-DETR
16
作者 WANG Yong-kang SI Zhan-jun 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期97-106,178,共11页
The correct identification of traffic signs plays an important role in automatic driving technology and road safety driving.Therefore,to address the problems of misdetection and omission in traffic sign detection due ... The correct identification of traffic signs plays an important role in automatic driving technology and road safety driving.Therefore,to address the problems of misdetection and omission in traffic sign detection due to the variety of sign types,significant size differences and complex background information,an improved traffic sign detection model for RT-DETR was proposed in this study.Firstly,the HiLo attention mechanism was added to the Attention-based Intra-scale Feature Interaction,which further enhanced the feature extraction capability of the network and improved the detection efficiency on high-resolution images.Secondly,the CAFMFusion feature fusion mechanism was designed,which enabled the network to pay attention to the features in different regions in each channel.Based on this,the model could better capture the remote dependencies and neighborhood feature correlation,improving the feature fusion capability of the model.Finally,the MPDIoU was used as the loss function of the improved model to achieve faster convergence and more accurate regression results.The experimental results on the TT100k-2021 traffic sign dataset showed that the improved model achieves the performance with a precision value of 90.2%,recall value of 88.1%and mAP@0.5 value of 91.6%,which are 4.6%,5.8%,and 4.4%better than the original RT-DETR model respectively.The model effectively improves the problem of poor traffic sign detection and has greater practical value. 展开更多
关键词 Object detection traffic signs RT-DETR CAFMFusion
下载PDF
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
17
作者 Min-Gyu Kim Hwankuk Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期585-607,共23页
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly d... In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted traffic.While research on anomaly detection using AI(Artificial Intelligence)is actively progressing,the encrypted nature of the data poses challenges for labeling,resulting in data imbalance and biased feature extraction toward specific nodes.This study proposes a reconstruction error-based anomaly detection method using an autoencoder(AE)that utilizes packet metadata excluding specific node information.The proposed method omits biased packet metadata such as IP and Port and trains the detection model using only normal data,leveraging a small amount of packet metadata.This makes it well-suited for direct application in IoT environments due to its low resource consumption.In experiments comparing feature extraction methods for AE-based anomaly detection,we found that using flowbased features significantly improves accuracy,precision,F1 score,and AUC(Area Under the Receiver Operating Characteristic Curve)score compared to packet-based features.Additionally,for flow-based features,the proposed method showed a 30.17%increase in F1 score and improved false positive rates compared to Isolation Forest and OneClassSVM.Furthermore,the proposedmethod demonstrated a 32.43%higherAUCwhen using packet features and a 111.39%higher AUC when using flow features,compared to previously proposed oversampling methods.This study highlights the impact of feature extraction methods on attack detection in imbalanced,encrypted traffic environments and emphasizes that the one-class method using AE is more effective for attack detection and reducing false positives compared to traditional oversampling methods. 展开更多
关键词 One-class anomaly detection feature extraction auto-encoder encrypted traffic CICIoT2023
下载PDF
Network traffic classification:Techniques,datasets,and challenges
18
作者 Ahmad Azab Mahmoud Khasawneh +2 位作者 Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour 《Digital Communications and Networks》 SCIE CSCD 2024年第3期676-692,共17页
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions. 展开更多
关键词 Network classification Machine learning Deep learning Deep packet inspection traffic monitoring
下载PDF
Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based onStatistical Intelligence
19
作者 Il Hwan Ji Ju Hyeon Lee +1 位作者 Seungho Jeon Jung Taek Seo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1519-1549,共31页
In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and d... In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and decryptdata. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomicalfinancial and human casualties. For this reason, the application of encrypted communication to IoT has beenrequired, and the application of encrypted communication to IoT has become possible due to improvements inthe computing performance of IoT devices and the development of lightweight cryptography. The applicationof encrypted communication in IoT has made it possible to use encrypted communication channels to launchcyberattacks. The approach of extracting evidence of an attack based on the primary information of a networkpacket is no longer valid because critical information, such as the payload in a network packet, is encrypted byencrypted communication. For this reason, technology that can detect cyberattacks over encrypted network trafficoccurring in IoT environments is required. Therefore, this research proposes an encrypted cyberattack detectionsystem for the IoT (ECDS-IoT) that derives valid features for cyberattack detection from the cryptographic networktraffic generated in the IoT environment and performs cyberattack detection based on the derived features. ECDSIoT identifies identifiable information from encrypted traffic collected in IoT environments and extracts statisticsbased features through statistical analysis of identifiable information. ECDS-IoT understands information aboutnormal data by learning only statistical features extracted from normal data. ECDS-IoT detects cyberattacks basedonly on the normal data information it has trained. To evaluate the cyberattack detection performance of theproposed ECDS-IoT in this research, ECDS-IoT used CICIoT2023, a dataset containing encrypted traffic generatedby normal and seven categories of cyberattacks in the IoT environment and experimented with cyberattackdetection on encrypted traffic using Autoencoder, RNN, GRU, LSTM, BiLSTM, and AE-LSTM algorithms. Asa result of evaluating the performance of cyberattack detection for encrypted traffic, ECDS-IoT achieved highperformance such as accuracy 0.99739, precision 0.99154, recall 1.0, F1 score 0.99575, and ROC_AUC 0.99822when using the AE-LSTM algorithm. As shown by the cyberattack detection results of ECDS-IoT, it is possibleto detect most cyberattacks through encrypted traffic. By applying ECDS-IoT to IoT, it can effectively detectcyberattacks concealed in encrypted traffic, promoting the efficient operation of IoT and preventing financial andhuman damage caused by cyberattacks. 展开更多
关键词 IoT cybersecurity IoT encrypted traffic IoT cyberattack detection
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
20
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部