Skip Content
You are currently on the new version of our website. Access the old version .

1,264 Results Found

  • Article
  • Open Access
1,180 Views
20 Pages

This paper presents TCReC, an innovative model designed for reconstructing network traffic characteristics in the presence of packet loss. With the rapid expansion of wireless networks driven by edge computing, IoT, and 5G technologies, challenges su...

  • Article
  • Open Access
1 Citations
3,515 Views
20 Pages

Bandwidth-Aware Traffic Sensing in Vehicular Networks with Mobile Edge Computing

  • Kong Ye,
  • Penglin Dai,
  • Xiao Wu,
  • Yan Ding,
  • Huanlai Xing and
  • Zhaofei Yu

14 August 2019

Traffic sensing is one of the promising applications to guarantee safe and efficient traffic systems in vehicular networks. However, due to the unique characteristics of vehicular networks, such as limited wireless bandwidth and dynamic mobility of v...

  • Article
  • Open Access
2,216 Views
14 Pages

15 November 2021

From disaster prevention to mitigation, drug analysis to drug design, agriculture to food security, IoT to AI, and big data analysis to knowledge or sentiment mining, a high computation power is a prime necessity at present. As such, massively parall...

  • Article
  • Open Access
7 Citations
6,931 Views
17 Pages

Organisations such as hospitals and the public are increasingly relying on large computer networks to access information and to communicate multimedia-type data. To assess the effectiveness of these networks, the traffic parameters need to be analyse...

  • Article
  • Open Access
5 Citations
2,181 Views
27 Pages

12 February 2024

Overloading of network structures is a problem that we encounter every day in many areas of life. The most associative structure is the transport graph. In many megacities around the world, the so-called intelligent transport system (ITS) is successf...

  • Article
  • Open Access
7 Citations
2,951 Views
19 Pages

Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments

  • Paolo Bellavista,
  • Mattia Fogli,
  • Carlo Giannelli and
  • Cesare Stefanelli

22 January 2023

The industrial Internet of things (IIoT) has radically modified industrial environments, not only enabling novel industrial applications but also significantly increasing the amount of generated network traffic. Nowadays, a major concern is to suppor...

  • Article
  • Open Access
3 Citations
3,781 Views
21 Pages

Short-Term Traffic State Prediction Based on Mobile Edge Computing in V2X Communication

  • Pangwei Wang,
  • Xiao Liu,
  • Yunfeng Wang,
  • Tianren Wang and
  • Juan Zhang

5 December 2021

Real-time and reliable short-term traffic state prediction is one of the most critical technologies in intelligent transportation systems (ITS). However, the traffic state is generally perceived by single sensor in existing studies, which is difficul...

  • Article
  • Open Access
4 Citations
3,634 Views
26 Pages

Urban Congestion Avoidance Methodology Based on Vehicular Traffic Thresholding

  • Ioan Stan,
  • Daniel Alexandru Ghere,
  • Paula Iarina Dan and
  • Rodica Potolea

7 February 2023

Vehicular traffic in urban areas faces congestion challenges that negatively impact our lives. The infrastructure associated with intelligent transportation systems provides means for addressing the associated challenges in urban areas. This study pr...

  • Article
  • Open Access
1,078 Views
29 Pages

25 September 2025

As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the us...

  • Article
  • Open Access
19 Citations
5,492 Views
12 Pages

Traffic Light and Arrow Signal Recognition Based on a Unified Network

  • Tien-Wen Yeh,
  • Huei-Yung Lin and
  • Chin-Chen Chang

31 August 2021

We present a traffic light detection and recognition approach for traffic lights that utilizes convolutional neural networks. We also introduce a technique for identifying arrow signal lights in multiple urban traffic environments. For detection, we...

  • Article
  • Open Access
1,467 Views
20 Pages

Task Offloading Scheme for Survivability Guarantee Based on Traffic Prediction in 6G Edge Networks

  • Zhengjie Sun,
  • Hui Yang,
  • Chao Li,
  • Qiuyan Yao,
  • Ao Yu,
  • Jie Zhang,
  • Yang Zhao,
  • Sheng Liu and
  • Yunbo Li

1 November 2023

With the development of sixth-generation (6G) mobile networks, the rise of emerging intelligent services has led to a huge increase in traffic. As an important technology to support the development of 6G, mobile edge computing (MEC) effectively meets...

  • Article
  • Open Access
34 Citations
5,665 Views
19 Pages

An Intelligent Traffic Surveillance System Using Integrated Wireless Sensor Network and Improved Phase Timing Optimization

  • Quadri Noorulhasan Naveed,
  • Hamed Alqahtani,
  • Riaz Ullah Khan,
  • Sultan Almakdi,
  • Mohammed Alshehri and
  • Mohammed Aref Abdul Rasheed

27 April 2022

The transportation industry is crucial to the realization of a smart city. However, the current growth in vehicle numbers is not being matched by an increase in road capacity. Congestion may boost the number of accidents, harm economic growth, and re...

  • Article
  • Open Access
5 Citations
3,592 Views
17 Pages

The demand for encrypted communication is increasing with the continuous development of secure and trustworthy networks. In edge computing scenarios, the requirement for data processing security is becoming increasingly high. Therefore, the accurate...

  • Proceeding Paper
  • Open Access
13 Citations
11,622 Views
7 Pages

Traffic Management System Using YOLO Algorithm

  • Pankaj Kunekar,
  • Yogita Narule,
  • Richa Mahajan,
  • Shantanu Mandlapure,
  • Eshan Mehendale and
  • Yashashri Meshram

23 January 2024

The issue of traffic congestion is becoming worse day by day. The typical traffic lights are unable to effectively regulate the growing number of vehicular traffic; therefore, we mixed computer vision and machine learning to mimic complicated incomin...

  • Article
  • Open Access
7 Citations
3,938 Views
16 Pages

25 April 2021

While anomaly detection is very important in many domains, such as in cybersecurity, there are many rare anomalies or infrequent patterns in cybersecurity datasets. Detection of infrequent patterns is computationally expensive. Cybersecurity datasets...

  • Article
  • Open Access
1 Citations
3,745 Views
19 Pages

Improving Road Safety with AI: Automated Detection of Signs and Surface Damage

  • Davide Merolla,
  • Vittorio Latorre,
  • Antonio Salis and
  • Gianluca Boanelli

Public transportation plays a crucial role in our lives, and the road network is a vital component in the implementation of smart cities. Recent advancements in AI have enabled the development of advanced monitoring systems capable of detecting anoma...

  • Article
  • Open Access
66 Citations
12,259 Views
20 Pages

4 August 2014

Existing traffic information acquisition systems suffer from high cost and low scalability. To address these problems, the application of wireless sensor networks (WSNs) has been studied, as WSN-based systems are highly scalable and have a low cost o...

  • Article
  • Open Access
6 Citations
2,406 Views
30 Pages

26 April 2021

Edge computing can deliver network services with low latency and real-time processing by providing cloud services at the network edge. Edge computing has a number of advantages such as low latency, locality, and network traffic distribution, but the...

  • Communication
  • Open Access
21 Citations
6,141 Views
11 Pages

Accurate Image Multi-Class Classification Neural Network Model with Quantum Entanglement Approach

  • Farina Riaz,
  • Shahab Abdulla,
  • Hajime Suzuki,
  • Srinjoy Ganguly,
  • Ravinesh C. Deo and
  • Susan Hopkins

2 March 2023

Quantum machine learning (QML) has attracted significant research attention over the last decade. Multiple models have been developed to demonstrate the practical applications of the quantum properties. In this study, we first demonstrate that the pr...

  • Article
  • Open Access
108 Citations
9,397 Views
34 Pages

Smarter Traffic Prediction Using Big Data, In-Memory Computing, Deep Learning and GPUs

  • Muhammad Aqib,
  • Rashid Mehmood,
  • Ahmed Alzahrani,
  • Iyad Katib,
  • Aiiad Albeshri and
  • Saleh M. Altowaijri

13 May 2019

Road transportation is the backbone of modern economies, albeit it annually costs 1.25 million deaths and trillions of dollars to the global economy, and damages public health and the environment. Deep learning is among the leading-edge metho...

  • Article
  • Open Access
16 Citations
3,816 Views
22 Pages

10 February 2022

The past decades witnessed an unprecedented urbanization and the proliferation of modern information and communication technologies (ICT), which makes the concept of Smart City feasible. Among various intelligent components, smart urban transportatio...

  • Article
  • Open Access
7 Citations
4,528 Views
23 Pages

10 April 2025

Industrial Internet of things (IIoT) environments need to implement reliable security measures because of the growth in network traffic and overall connectivity. Accordingly, this work provides the architecture of network traffic analysis and the det...

  • Article
  • Open Access
1 Citations
2,230 Views
19 Pages

18 January 2025

With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging. Methods based on machine learning and deep learning have achieved remarkable results, bu...

  • Article
  • Open Access
12 Citations
8,374 Views
28 Pages

18 August 2015

As society has developed, the number of vehicles has increased and road conditions have become complicated, increasing the risk of crashes. Therefore, a service that provides safe vehicle control and various types of information to the driver is urge...

  • Article
  • Open Access
3 Citations
1,781 Views
25 Pages

Conventional supervised machine learning is widely used for intrusion detection without packet payload inspection, showing good accuracy in detecting known attacks. However, these methods require large labeled datasets, which are scarce due to privac...

  • Article
  • Open Access
2 Citations
2,117 Views
15 Pages

1 August 2023

In this paper, an intelligent multiple Quality of Service (QoS) constrained traffic path allocation scheme with corresponding algorithm is proposed. The proposed method modifies deep Q-learning network (DQN) by graph neural network (GNN) and prioriti...

  • Article
  • Open Access
3 Citations
2,206 Views
19 Pages

An Approach for Anomaly Detection in Network Communications Using k-Path Analysis

  • Mamadou Kasse,
  • Rodolphe Charrier,
  • Alexandre Berred,
  • Cyrille Bertelle and
  • Christophe Delpierre

In this paper, we present an innovative approach inspired by the Path-scan model to detect paths with k adjacent edges (k-path) exhibiting unusual behavior (synonymous with anomaly) within network communications. This work is motivated by the challen...

  • Article
  • Open Access
27 Citations
4,626 Views
20 Pages

6 December 2019

Internet traffic monitoring is a crucial task for the security and reliability of communication networks and Internet of Things (IoT) infrastructure. This description of the traffic statistics is used to detect traffic anomalies. Nowadays, intruders...

  • Article
  • Open Access
21 Citations
6,120 Views
19 Pages

A Low-Cost Vehicular Traffic Monitoring System Using Fog Computing

  • Spiridon Vergis,
  • Vasileios Komianos,
  • Georgios Tsoumanis,
  • Athanasios Tsipis and
  • Konstantinos Oikonomou

19 March 2020

With the rapid increase of vehicles in use worldwide, the need for efficient traffic monitoring systems has arisen. This work proposes a low-cost vehicular traffic monitoring system using IoT devices and fog computing. The system is based on a three-...

  • Article
  • Open Access
8 Citations
10,559 Views
18 Pages

This study describes a method for using a camera to automatically recognize the speed limits on speed-limit signs. This method consists of the following three processes: first (1) a method of detecting the speed-limit signs with a machine learning me...

  • Data Descriptor
  • Open Access
14 Citations
9,105 Views
10 Pages

Dataset: Traffic Images Captured from UAVs for Use in Training Machine Vision Algorithms for Traffic Management

  • Sergio Bemposta Rosende,
  • Sergio Ghisler,
  • Javier Fernández-Andrés and
  • Javier Sánchez-Soriano

25 April 2022

A dataset of Spanish road traffic images taken from unmanned aerial vehicles (UAV) is presented with the purpose of being used to train artificial vision algorithms, among which those based on convolutional neural networks stand out. This article exp...

  • Article
  • Open Access
15 Citations
4,080 Views
27 Pages

8 May 2020

Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The m...

  • Article
  • Open Access
2 Citations
800 Views
25 Pages

8 September 2025

Distributed denial-of-service (DDoS) attacks are a prevalent threat to resource-constrained IoT deployments. We present an edge-based detection and mitigation system integrated with the oneM2M architecture. By using a Raspberry Pi 4 client and five R...

  • Article
  • Open Access
9 Citations
2,344 Views
22 Pages

5 October 2022

In recent years, network traffic contains a lot of feature information. If there are too many redundant features, the computational cost of the algorithm will be greatly increased. This paper proposes an anomalous network traffic detection method bas...

  • Article
  • Open Access
12 Citations
7,115 Views
18 Pages

2 April 2020

In order to improve the efficiency of transportation networks, it is critical to forecast traffic congestion. Large-scale traffic congestion data have become available and accessible, yet they need to be properly represented in order to avoid overfit...

  • Article
  • Open Access
286 Citations
27,960 Views
13 Pages

A Real-Time Chinese Traffic Sign Detection Algorithm Based on Modified YOLOv2

  • Jianming Zhang,
  • Manting Huang,
  • Xiaokang Jin and
  • Xudong Li

16 November 2017

Traffic sign detection is an important task in traffic sign recognition systems. Chinese traffic signs have their unique features compared with traffic signs of other countries. Convolutional neural networks (CNNs) have achieved a breakthrough in com...

  • Article
  • Open Access
38 Citations
10,232 Views
23 Pages

IoT Traffic: Modeling and Measurement Experiments

  • Hung Nguyen-An,
  • Thomas Silverston,
  • Taku Yamazaki and
  • Takumi Miyoshi

26 February 2021

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on th...

  • Article
  • Open Access
22 Citations
4,937 Views
18 Pages

19 March 2020

Nowadays, traffic infrastructures and vehicles are connected through the network benefiting from the development of Internet of Things (IoT). Connected automated cars can provide some useful traffic information. An architecture and algorithm of mobil...

  • Article
  • Open Access
11 Citations
10,569 Views
18 Pages

Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

  • Jingsha He,
  • Chengyue Chang,
  • Peng He and
  • Muhammad Salman Pathan

10 November 2016

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes,...

  • Article
  • Open Access
10 Citations
6,946 Views
15 Pages

1 June 2022

Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based...

  • Article
  • Open Access
3 Citations
8,526 Views
23 Pages

Interactive Web-Based Visual Analysis on Network Traffic Data

  • Dong Hyun Jeong,
  • Jin-Hee Cho,
  • Feng Chen,
  • Lance Kaplan,
  • Audun Jøsang and
  • Soo-Yeon Ji

28 December 2022

Network traffic data analysis is important for securing our computing environment and data. However, analyzing network traffic data requires tremendous effort because of the complexity of continuously changing network traffic patterns. To assist the...

  • Article
  • Open Access
11 Citations
2,834 Views
16 Pages

Intra-Cluster Federated Learning-Based Model Transfer Framework for Traffic Prediction in Core Network

  • Pengyu Li,
  • Yingji Shi,
  • Yanxia Xing,
  • Chaorui Liao,
  • Menghan Yu,
  • Chengwei Guo and
  • Lei Feng

18 November 2022

Accurate prediction of cellular traffic will contribute to efficient operations and management of mobile network. With deep learning, many studies have achieved exact cellular traffic prediction. However, the reality is that quite a few subnets in th...

  • Article
  • Open Access
9 Citations
4,325 Views
21 Pages

12 May 2024

The widespread use of encrypted traffic poses challenges to network management and network security. Traditional machine learning-based methods for encrypted traffic classification no longer meet the demands of management and security. The applicatio...

  • Article
  • Open Access
5 Citations
2,835 Views
16 Pages

29 October 2020

This paper presents a novel method for predicting the traffic speed of the links on large-scale traffic networks. We first analyze how traffic flows in and out of every link through the lowest cost reachable paths. We aggregate the traffic flow condi...

  • Article
  • Open Access
44 Citations
8,805 Views
25 Pages

Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations to proactively identify critical s...

  • Article
  • Open Access
213 Citations
14,011 Views
17 Pages

Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain

  • Ammar Muthanna,
  • Abdelhamied A. Ateya,
  • Abdukodir Khakimov,
  • Irina Gudkova,
  • Abdelrahman Abuarqoub,
  • Konstantin Samouylov and
  • Andrey Koucheryavy

Designing Internet of Things (IoT) applications faces many challenges including security, massive traffic, high availability, high reliability and energy constraints. Recent distributed computing paradigms, such as Fog and multi-access edge computing...

  • Article
  • Open Access
1 Citations
2,405 Views
23 Pages

16 December 2024

The integration of Connected Vehicles into conventional traffic systems presents significant challenges due to the diverse behaviors and objectives of different drivers. Conventional vehicle drivers typically follow User Equilibrium principles, aimin...

  • Article
  • Open Access
13 Citations
3,498 Views
17 Pages

Cache Servers Placement Based on Important Switches for SDN-Based ICN

  • Jan Badshah,
  • Majed Mohaia Alhaisoni,
  • Nadir Shah and
  • Muhammad Kamran

In centralized cache management for SDN-based ICN, it is an optimization problem to compute the location of cache servers and takes a longer time. We solve this problem by proposing to use singular-value-decomposition (SVD) and QR-factorization with...

  • Article
  • Open Access
21 Citations
5,415 Views
17 Pages

A Novel Method for Improved Network Traffic Prediction Using Enhanced Deep Reinforcement Learning Algorithm

  • Nagaiah Mohanan Balamurugan,
  • Malaiyalathan Adimoolam,
  • Mohammed H. Alsharif and
  • Peerapong Uthansakul

2 July 2022

Network data traffic is increasing with expanded networks for various applications, with text, image, audio, and video for inevitable needs. Network traffic pattern identification and analysis of traffic of data content are essential for different ne...

of 26