55   Artículos

 
en línea
Erik Bollen, Bart Kuijpers, Valeria Soliani and Alejandro Vaisman    
Sensor networks are used in an increasing number and variety of application areas, like traffic control or river monitoring. Sensors in these networks measure parameters of interest defined by domain experts and send these measurements to a central locat... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Sergey Golubev, Evgenia Novikova and Elena Fedorchenko    
Recently, approaches based on the transformation of tabular data into images have gained a lot of scientific attention. This is explained by the fact that convolutional neural networks (CNNs) have shown good results in computer vision and other image-bas... ver más
Revista: Information    Formato: Electrónico

 
en línea
Bambang Soelistijanto and Vittalis Ayu    
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Giuseppe Granato, Alessio Martino, Andrea Baiocchi and Antonello Rizzi    
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tools relying on a large number of features. Mathematical modeling is extremely difficult, given the ample variety of traffic patterns and the subtle and vari... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rastislav Róka    
This paper is focused on the performance analysis of protection mechanisms utilized in common wavelength division multiplexing-based passive optical networks. The main aim of the proposed research is providing an option of comparing different traffic pro... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yongxin Chen, Yongjun Wang and Luming Yang    
Tor serves better at protecting users? privacy than other anonymous communication tools. Even though it is resistant to deep packet inspection, Tor can be de-anonymized by the website fingerprinting (WF) attack, which aims to monitor the website users ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Naixia Mou, Haonan Ren, Yunhao Zheng, Jinhai Chen, Jiqiang Niu, Tengfei Yang, Lingxian Zhang and Feng Liu    
Maritime traffic can reflect the diverse and complex relations between countries and regions, such as economic trade and geopolitics. Based on the AIS (Automatic Identification System) trajectory data of ships, this study constructs the Maritime Silk Roa... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Tian Lan, Qian Peng, Haoyu Wang, Xinyu Gong, Jing Li and Zhicheng Shi    
Allometric scaling originates in biology, where it refers to scaling relations between the size of a body part and the size of the whole body when an organism grows. In cities, various allometric relations have also been discovered, such as those between... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Fan Xue, Xiao Li, Weisheng Lu, Christopher J. Webster, Zhe Chen and Lvwen Lin    
Recent technological advancements in geomatics and mobile sensing have led to various urban big data, such as Tencent street view (TSV) photographs; yet, the urban objects in the big dataset have hitherto been inadequately exploited. This paper aims to p... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Wins Cott Goh, Lee Vien Leong and Richard Jun Xian Cheah    
This study was conducted in Malaysia, where motorcycle traffic accidents represent a high percentage of fatality among overall traffic accidents. Studies have shown that risk perception and positive outcome of risky riding behavior have a significant imp... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »