期刊文献+
共找到2,553篇文章
< 1 2 128 >
每页显示 20 50 100
FEM tire model oriented to virtual experiment of off-road vehicle trafficability 被引量:2
1
作者 庞罕 张为公 王霞 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期540-544,共5页
In order to estimate the trafficability of off-road vehicles, the linear relationships between the pressure and the stiffness of the tire and the action of the vertical tire force with the viscoelasticity are analyzed... In order to estimate the trafficability of off-road vehicles, the linear relationships between the pressure and the stiffness of the tire and the action of the vertical tire force with the viscoelasticity are analyzed. The method to improve the precision of the model by the coefficients is presented. The constitutive equation of the three-parameter linear model and the stiffness matrix of four-node isoparametric elements are derived to construct the FEM (finite element method) tire model in plan stress. A demarcation and verification system is designed based on the six-dimensional wheel force transducer and the vertical tire force is measured under different velocities. The results show that the model and the method proposed are reasonable. 展开更多
关键词 trafficability tire model VISCOELASTICITY six-dimensional wheel force transducer
在线阅读 下载PDF
Design and Trafficability Study of Flexible Wheel for Planetary Exploration Rover 被引量:1
2
作者 李雯 高峰 徐国艳 《Journal of Beijing Institute of Technology》 EI CAS 2007年第3期279-283,共5页
To reduce sending costs, a flexible wheel configuration is proposed. The wheel is made of titanium alloy (Ti-6Al-4V) in consideration of the planetary environment factors (i. e. strong radiation, big temperature di... To reduce sending costs, a flexible wheel configuration is proposed. The wheel is made of titanium alloy (Ti-6Al-4V) in consideration of the planetary environment factors (i. e. strong radiation, big temperature differences, high vacuum), and mass constraint of launch vehicle. The advantages of the proposed wheel involves the potential for: ① small sending volume and mass, ② large deployed area and volume to reduce wheel loading, ③ a damping effect to smooth motion on rough terrain. To study the trafficability and tractive performance of the wheel concept, the drawbar pull and driven torque were calculated based on simplified model of terramechanics formulations. The results show that the wheel possesses sufficient drawbar pull to negotiate all types of soil stratums listed in this contribution. 展开更多
关键词 planetary rover flexible wheel wheel-soil interaction trafficability
在线阅读 下载PDF
Soil Trafficability Forecasting
3
作者 Marie-France Jones Paul Arp 《Open Journal of Forestry》 2019年第4期296-322,共27页
This article introduces and evaluates a Soil Trafficability Model (STRAM) designed to estimate and forecast potential rutting depth on forest soils due to heavy machine traffic. This approach was developed within the ... This article introduces and evaluates a Soil Trafficability Model (STRAM) designed to estimate and forecast potential rutting depth on forest soils due to heavy machine traffic. This approach was developed within the wood-forwarding context of four harvest blocks in Northern and Central New Brunswick. Field measurements used for model calibration involved determining soil rut depths, volumetric moisture content, bulk density, soil resistance to cone penetration (referred to as cone index, or CI), and the dimensionless nominal soil cone index (NCI) defined by the ratio of CI over wheel foot print pressure. With STRAM, rut depth is inferred from: 1) machine dimensions pertaining to estimating foot print area and pressure;2) pore-filled soil moisture content and related CI projections guided by year-round daily weather records using the Forest Hydrology Model (ForHyM);3) accounting for within-block soil property variations using multiple and Random Forest regression techniques. Subsequent evaluations of projected soil moisture, CI and rut-depth values accounted for about 40 (multiple regression) and 80 (Random Forest) percent of the corresponding field measured values. 展开更多
关键词 SOIL trafficability WOOD FORWARDING PLOT Surveys Regression Comparisons Cartographic Depth-to-Water
在线阅读 下载PDF
Aerial Images for Intelligent Vehicle Detection and Classification via YOLOv11 and Deep Learner
4
作者 Ghulam Mujtaba Wenbiao Liu +3 位作者 Mohammed Alshehri Yahya AlQahtani Nouf Abdullah Almujally Hui Liu 《Computers, Materials & Continua》 2026年第1期1703-1721,共19页
As urban landscapes evolve and vehicular volumes soar,traditional traffic monitoring systems struggle to scale,often failing under the complexities of dense,dynamic,and occluded environments.This paper introduces a no... As urban landscapes evolve and vehicular volumes soar,traditional traffic monitoring systems struggle to scale,often failing under the complexities of dense,dynamic,and occluded environments.This paper introduces a novel,unified deep learning framework for vehicle detection,tracking,counting,and classification in aerial imagery designed explicitly for modern smart city infrastructure demands.Our approach begins with adaptive histogram equalization to optimize aerial image clarity,followed by a cutting-edge scene parsing technique using Mask2Former,enabling robust segmentation even in visually congested settings.Vehicle detection leverages the latest YOLOv11 architecture,delivering superior accuracy in aerial contexts by addressing occlusion,scale variance,and fine-grained object differentiation.We incorporate the highly efficient ByteTrack algorithm for tracking,enabling seamless identity preservation across frames.Vehicle counting is achieved through an unsupervised DBSCAN-based method,ensuring adaptability to varying traffic densities.We further introduce a hybrid feature extraction module combining Convolutional Neural Networks(CNNs)with Zernike Moments,capturing both deep semantic and geometric signatures of vehicles.The final classification is powered by NASNet,a neural architecture search-optimized model,ensuring high accuracy across diverse vehicle types and orientations.Extensive evaluations of the VAID benchmark dataset demonstrate the system’s outstanding performance,achieving 96%detection,94%tracking,and 96.4%classification accuracy.On the UAVDT dataset,the system attains 95%detection,93%tracking,and 95%classification accuracy,confirming its robustness across diverse aerial traffic scenarios.These results establish new benchmarks in aerial traffic analysis and validate the framework’s scalability,making it a powerful and adaptable solution for next-generation intelligent transportation systems and urban surveillance. 展开更多
关键词 Traffic management YOLOv11 autonomous vehicles intelligent traffic systems NASNet zernike moments
在线阅读 下载PDF
ES-YOLO:Edge and Shape Fusion-Based YOLO for Tra.c Sign Detection
5
作者 Weiguo Pan Songjie Du +2 位作者 Bingxin Xu Bin Zhang Hongzhe Liu 《Computers, Materials & Continua》 2026年第4期2127-2145,共19页
Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approa... Traffic sign detection is a critical component of driving systems.Single-stage network-based traffic sign detection algorithms,renowned for their fast detection speeds and high accuracy,have become the dominant approach in current practices.However,in complex and dynamic traffic scenes,particularly with smaller traffic sign objects,challenges such as missed and false detections can lead to reduced overall detection accuracy.To address this issue,this paper proposes a detection algorithm that integrates edge and shape information.Recognizing that traffic signs have specific shapes and distinct edge contours,this paper introduces an edge feature extraction branch within the backbone network,enabling adaptive fusion with features of the same hierarchical level.Additionally,a shape prior convolution module is designed to replaces the first two convolutional modules of the backbone network,aimed at enhancing the model's perception ability for specific shape objects and reducing its sensitivity to background noise.The algorithm was evaluated on the CCTSDB and TT100k datasets,and compared to YOLOv8s,the mAP50 values increased by 3.0%and 10.4%,respectively,demonstrating the effectiveness of the proposed method in improving the accuracy of traffic sign detection. 展开更多
关键词 Traffic sign edge information shape prior feature fusion object detection
在线阅读 下载PDF
The Impact and Response of Automatic Driving Technology Standards on the Determination of Criminal Responsibility for Traffic Accidents in China
6
作者 Sun Jianfeng 《科技与法律(中英文)》 2026年第1期134-148,共15页
With the continuous progress of automatic driving technology,automatic driving technology standards are gradually affecting the determination of criminal responsibility for traffic accidents in China.At present,the ch... With the continuous progress of automatic driving technology,automatic driving technology standards are gradually affecting the determination of criminal responsibility for traffic accidents in China.At present,the characteristics and tendency of China's automatic driving technology standards present the situation of high policy relevance coexisting with low normative binding,professionalism coexist with barriers,forefront coexist with ambiguity.Therefore,challenges are presented both theoretically and practically on the determination of criminal responsibility based on automatic driving technology standard..In this regard,the misunderstanding should be clarified in theory:The legal order under the automatic driving technology standard has constitutionality and systematic,and there is a balance between the frontier of automatic driving technology development and the lagging of criminal law.The automatic driving technology risk level system should be built to clarify the boundary of the effectiveness of criminal law norms,seeking fora breakthrough in the application of the establishment of a comprehensive judgment system of the risks and accidents and the system of evidence to prove the system,which clarifies the determination of criminal responsibility under the automatic driving technology standard.This essay hopes to pursue breakthroughs in the application-to establish a comprehensive judgment system of risks and accidents as well as an evidence proof system,so as to clarify the determination of criminal responsibility under automatic driving technology standards. 展开更多
关键词 automatic driving traffic accidents criminal responsibility legal order
在线阅读 下载PDF
Recurrent MAPPO for Joint UAV Trajectory and Traffic Offloading in Space-Air-Ground Integrated Networks
7
作者 Zheyuan Jia Fenglin Jin +1 位作者 Jun Xie Yuan He 《Computers, Materials & Continua》 2026年第1期447-461,共15页
This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential g... This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks(SAGIN)through a novel Recursive Multi-Agent Proximal Policy Optimization(RMAPPO)algorithm.The exponential growth of mobile devices and data traffic has substantially increased network congestion,particularly in urban areas and regions with limited terrestrial infrastructure.Our approach jointly optimizes unmanned aerial vehicle(UAV)trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput,minimize energy consumption,and maintain equitable resource distribution.The proposed RMAPPO framework incorporates recurrent neural networks(RNNs)to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent reinforcement learning architecture to reduce communication overhead while improving system robustness.The proposed RMAPPO algorithm was evaluated through simulation experiments,with the results indicating that it significantly enhances the cumulative traffic offloading rate of nodes and reduces the energy consumption of UAVs. 展开更多
关键词 Space-air-ground integrated networks UAV traffic offloading reinforcement learning
在线阅读 下载PDF
Traffic Vision:UAV-Based Vehicle Detection and Traffic Pattern Analysis via Deep Learning Classifier
8
作者 Mohammed Alnusayri Ghulam Mujtaba +4 位作者 Nouf Abdullah Almujally Shuoa S.Aitarbi Asaad Algarni Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 2026年第3期266-284,共19页
This paper presents a unified Unmanned Aerial Vehicle-based(UAV-based)traffic monitoring framework that integrates vehicle detection,tracking,counting,motion prediction,and classification in a modular and co-optimized... This paper presents a unified Unmanned Aerial Vehicle-based(UAV-based)traffic monitoring framework that integrates vehicle detection,tracking,counting,motion prediction,and classification in a modular and co-optimized pipeline.Unlike prior works that address these tasks in isolation,our approach combines You Only Look Once(YOLO)v10 detection,ByteTrack tracking,optical-flow density estimation,Long Short-Term Memory-based(LSTM-based)trajectory forecasting,and hybrid Speeded-Up Robust Feature(SURF)+Gray-Level Co-occurrence Matrix(GLCM)feature engineering with VGG16 classification.Upon the validation across datasets(UAVDT and UAVID)our framework achieved a detection accuracy of 94.2%,and 92.3%detection accuracy when conducting a real-time UAV field validation.Our comprehensive evaluations,including multi-metric analyses,ablation studies,and cross-dataset validations,confirm the framework’s accuracy,efficiency,and generalizability.These results highlight the novelty of integrating complementary methods into a single framework,offering a practical solution for accurate and efficient UAV-based traffic monitoring. 展开更多
关键词 Smart traffic system drone devices machine learner dynamic complex scenes VGG-16 classifier
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
9
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
YOLO-SDW: Traffic Sign Detection Algorithm Based on YOLOv8s Skip Connection and Dynamic Convolution
10
作者 Qing Guo Juwei Zhang Bingyi Ren 《Computers, Materials & Continua》 2026年第1期1433-1452,共20页
Traffic sign detection is an important part of autonomous driving,and its recognition accuracy and speed are directly related to road traffic safety.Although convolutional neural networks(CNNs)have made certain breakt... Traffic sign detection is an important part of autonomous driving,and its recognition accuracy and speed are directly related to road traffic safety.Although convolutional neural networks(CNNs)have made certain breakthroughs in this field,in the face of complex scenes,such as image blur and target occlusion,the traffic sign detection continues to exhibit limited accuracy,accompanied by false positives and missed detections.To address the above problems,a traffic sign detection algorithm,You Only Look Once-based Skip Dynamic Way(YOLO-SDW)based on You Only Look Once version 8 small(YOLOv8s),is proposed.Firstly,a Skip Connection Reconstruction(SCR)module is introduced to efficiently integrate fine-grained feature information and enhance the detection accuracy of the algorithm in complex scenes.Secondly,a C2f module based on Dynamic Snake Convolution(C2f-DySnake)is proposed to dynamically adjust the receptive field information,improve the algorithm’s feature extraction ability for blurred or occluded targets,and reduce the occurrence of false detections and missed detections.Finally,the Wise Powerful IoU v2(WPIoUv2)loss function is proposed to further improve the detection accuracy of the algorithm.Experimental results show that the average precision mAP@0.5 of YOLO-SDW on the TT100K dataset is 89.2%,and mAP@0.5:0.95 is 68.5%,which is 4%and 3.3%higher than the YOLOv8s baseline,respectively.YOLO-SDW ensures real-time performance while having higher accuracy. 展开更多
关键词 Traffic sign detection YOLOv8 object detection deep learning
在线阅读 下载PDF
A Comparative Benchmark of Machine and Deep Learning for Cyberattack Detection in IoT Networks
11
作者 Enzo Hoummady Fehmi Jaafar 《Computers, Materials & Continua》 2026年第4期1070-1092,共23页
With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and ... With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic.This paper presents a comparative benchmark of classic machine learning(ML)and state-of-the-art deep learning(DL)algorithms for IoT intrusion detection.Our methodology employs a twophased approach:a preliminary pilot study using a custom-generated dataset to establish baselines,followed by a comprehensive evaluation on the large-scale CICIoTDataset2023.We benchmarked algorithms including Random Forest,XGBoost,CNN,and StackedLSTM.The results indicate that while top-performingmodels frombothcategories achieve over 99%classification accuracy,this metric masks a crucial performance trade-off.We demonstrate that treebased ML ensembles exhibit superior precision(91%)in identifying benign traffic,making them effective at reducing false positives.Conversely,DL models demonstrate superior recall(96%),making them better suited for minimizing the interruption of legitimate traffic.We conclude that the selection of an optimal model is not merely a matter of maximizing accuracy but is a strategic choice dependent on the specific security priority either minimizing false alarms or ensuring service availability.Thiswork provides a practical framework for deploying context-aware security solutions in diverse IoT environments. 展开更多
关键词 Internet of Things deep learning abnormal network traffic cyberattacks machine learning
在线阅读 下载PDF
A Robust Vision-Based Framework for Traffic Sign and Light Detection in Automated Driving Systems
12
作者 Mohammed Al-Mahbashi Ali Ahmed +3 位作者 Abdolraheem Khader Shakeel Ahmad Mohamed A.Damos Ahmed Abdu 《Computer Modeling in Engineering & Sciences》 2026年第1期1207-1232,共26页
Reliable detection of traffic signs and lights(TSLs)at long range and under varying illumination is essen-tial for improving the perception and safety of autonomous driving systems(ADS).Traditional object detection mo... Reliable detection of traffic signs and lights(TSLs)at long range and under varying illumination is essen-tial for improving the perception and safety of autonomous driving systems(ADS).Traditional object detection models often exhibit significant performance degradation in real-world environments characterized by high dynamic range and complex lighting conditions.To overcome these limitations,this research presents FED-YOLOv10s,an improved and lightweight object detection framework based on You Only look Once v10(YOLOv10).The proposed model integrates a C2f-Faster block derived from FasterNet to reduce parameters and floating-point operations,an Efficient Multiscale Attention(EMA)mechanism to improve TSL-invariant feature extraction,and a deformable Convolution Networks v4(DCNv4)module to enhance multiscale spatial adaptability.Experimental findings demonstrate that the proposed architecture achieves an optimal balance between computational efficiency and detection accuracy,attaining an F1-score of 91.8%,and mAP@0.5 of 95.1%,while reducing parameters to 8.13 million.Comparative analyses across multiple traffic sign detection benchmarks demonstrate that FED-YOLOv10s outperforms state-of-the-art models in precision,recall,and mAP.These results highlight FED-YOLOv10s as a robust,efficient,and deployable solution for intelligent traffic perception in ADS. 展开更多
关键词 Automated driving systems traffic sign and light recognition YOLO EMA DCNv4
在线阅读 下载PDF
HGS-ATD:A Hybrid Graph Convolutional Network-GraphSAGE Model for Anomaly Traffic Detection
13
作者 Zhian Cui Hailong Li Xieyang Shen 《Journal of Harbin Institute of Technology(New Series)》 2026年第1期33-50,共18页
With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a ... With network attack technology continuing to develop,traditional anomaly traffic detection methods that rely on feature engineering are increasingly insufficient in efficiency and accuracy.Graph Neural Network(GNN),a promising Deep Learning(DL)approach,has proven to be highly effective in identifying intricate patterns in graph⁃structured data and has already found wide applications in the field of network security.In this paper,we propose a hybrid Graph Convolutional Network(GCN)⁃GraphSAGE model for Anomaly Traffic Detection,namely HGS⁃ATD,which aims to improve the accuracy of anomaly traffic detection by leveraging edge feature learning to better capture the relationships between network entities.We validate the HGS⁃ATD model on four publicly available datasets,including NF⁃UNSW⁃NB15⁃v2.The experimental results show that the enhanced hybrid model is 5.71%to 10.25%higher than the baseline model in terms of accuracy,and the F1⁃score is 5.53%to 11.63%higher than the baseline model,proving that the model can effectively distinguish normal traffic from attack traffic and accurately classify various types of attacks. 展开更多
关键词 anomaly traffic detection graph neural network deep learning graph convolutional network
在线阅读 下载PDF
Interactive Dynamic Graph Convolution with Temporal Attention for Traffic Flow Forecasting
14
作者 Zitong Zhao Zixuan Zhang Zhenxing Niu 《Computers, Materials & Continua》 2026年第1期1049-1064,共16页
Reliable traffic flow prediction is crucial for mitigating urban congestion.This paper proposes Attentionbased spatiotemporal Interactive Dynamic Graph Convolutional Network(AIDGCN),a novel architecture integrating In... Reliable traffic flow prediction is crucial for mitigating urban congestion.This paper proposes Attentionbased spatiotemporal Interactive Dynamic Graph Convolutional Network(AIDGCN),a novel architecture integrating Interactive Dynamic Graph Convolution Network(IDGCN)with Temporal Multi-Head Trend-Aware Attention.Its core innovation lies in IDGCN,which uniquely splits sequences into symmetric intervals for interactive feature sharing via dynamic graphs,and a novel attention mechanism incorporating convolutional operations to capture essential local traffic trends—addressing a critical gap in standard attention for continuous data.For 15-and 60-min forecasting on METR-LA,AIDGCN achieves MAEs of 0.75%and 0.39%,and RMSEs of 1.32%and 0.14%,respectively.In the 60-min long-term forecasting of the PEMS-BAY dataset,the AIDGCN out-performs the MRA-BGCN method by 6.28%,4.93%,and 7.17%in terms of MAE,RMSE,and MAPE,respectively.Experimental results demonstrate the superiority of our pro-posed model over state-of-the-art methods. 展开更多
关键词 Traffic flow prediction interactive dynamic graph convolution graph convolution temporal multi-head trend-aware attention self-attention mechanism
在线阅读 下载PDF
Advancing Android Ransomware Detection with Hybrid AutoML and Ensemble Learning Approaches
15
作者 Kirubavathi Ganapathiyappan Chahana Ravikumar +3 位作者 Raghul Alagunachimuthu Ranganayaki Ayman Altameem Ateeq Ur Rehman Ahmad Almogren 《Computers, Materials & Continua》 2026年第4期737-766,共30页
Android smartphones have become an integral part of our daily lives,becoming targets for ransomware attacks.Such attacks encrypt user information and ask for payment to recover it.Conventional detection mechanisms,suc... Android smartphones have become an integral part of our daily lives,becoming targets for ransomware attacks.Such attacks encrypt user information and ask for payment to recover it.Conventional detection mechanisms,such as signature-based and heuristic techniques,often fail to detect new and polymorphic ransomware samples.To address this challenge,we employed various ensemble classifiers,such as Random Forest,Gradient Boosting,Bagging,and AutoML models.We aimed to showcase how AutoML can automate processes such as model selection,feature engineering,and hyperparameter optimization,to minimize manual effort while ensuring or enhancing performance compared to traditional approaches.We used this framework to test it with a publicly available dataset from the Kaggle repository,which contains features for Android ransomware network traffic.The dataset comprises 392,024 flow records,divided into eleven groups.There are ten classes for various ransomware types,including SVpeng,PornDroid,Koler,WannaLocker,and Lockerpin.There is also a class for regular traffic.We applied a three-step procedure to select themost relevant features:filter,wrapper,and embeddedmethods.The Bagging classifier was highly accurate,correctly getting 99.84%of the time.The FLAML AutoML framework was evenmore accurate,correctly getting 99.85%of the time.This is indicative of howwellAutoML performs in improving things with minimal human assistance.Our findings indicate that AutoML is an efficient,scalable,and flexible method to discover Android ransomware,and it will facilitate the development of next-generation intrusion detection systems. 展开更多
关键词 Automated machine learning(AutoML) ensemble learning intrusion detection system(IDS) ransomware traffic analysis android ransomware detection
在线阅读 下载PDF
A Diffusion Model for Traffic Data Imputation 被引量:1
16
作者 Bo Lu Qinghai Miao +5 位作者 Yahui Liu Tariku Sinshaw Tamir Hongxia Zhao Xiqiao Zhang Yisheng Lv Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期606-617,共12页
Imputation of missing data has long been an important topic and an essential application for intelligent transportation systems(ITS)in the real world.As a state-of-the-art generative model,the diffusion model has prov... Imputation of missing data has long been an important topic and an essential application for intelligent transportation systems(ITS)in the real world.As a state-of-the-art generative model,the diffusion model has proven highly successful in image generation,speech generation,time series modelling etc.and now opens a new avenue for traffic data imputation.In this paper,we propose a conditional diffusion model,called the implicit-explicit diffusion model,for traffic data imputation.This model exploits both the implicit and explicit feature of the data simultaneously.More specifically,we design two types of feature extraction modules,one to capture the implicit dependencies hidden in the raw data at multiple time scales and the other to obtain the long-term temporal dependencies of the time series.This approach not only inherits the advantages of the diffusion model for estimating missing data,but also takes into account the multiscale correlation inherent in traffic data.To illustrate the performance of the model,extensive experiments are conducted on three real-world time series datasets using different missing rates.The experimental results demonstrate that the model improves imputation accuracy and generalization capability. 展开更多
关键词 Data imputation diffusion model implicit feature time series traffic data
在线阅读 下载PDF
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions 被引量:1
17
作者 Kaiyin Zhu Mingming Lu +2 位作者 Haifeng Li Neal NXiong Wenyong He 《Digital Communications and Networks》 2025年第3期724-733,共10页
As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods fa... As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods face challenges:some are too simplistic to capture complex traffic patterns effectively,and others are overly complex,leading to excessive communication overhead between cloud and edge devices.Moreover,the problem of single point failure limits their robustness and reliability in real-world applications.To tackle these challenges,this paper proposes a new method,CMBA-FL,a Communication-Mitigated and Blockchain-Assisted Federated Learning model.First,CMBA-FL improves the client model’s ability to capture temporal traffic patterns by employing the Encoder-Decoder framework for each edge device.Second,to reduce the communication overhead during federated learning,we introduce a verification method based on parameter update consistency,avoiding unnecessary parameter updates.Third,to mitigate the risk of a single point of failure,we integrate consensus mechanisms from blockchain technology.To validate the effectiveness of CMBA-FL,we assess its performance on two widely used traffic datasets.Our experimental results show that CMBA-FL reduces prediction error by 11.46%,significantly lowers communication overhead,and improves security. 展开更多
关键词 Blockchain Communication mitigating Federated learning Traffic flow prediction
在线阅读 下载PDF
Multi-Head Attention Enhanced Parallel Dilated Convolution and Residual Learning for Network Traffic Anomaly Detection 被引量:1
18
作者 Guorong Qi Jian Mao +2 位作者 Kai Huang Zhengxian You Jinliang Lin 《Computers, Materials & Continua》 2025年第2期2159-2176,共18页
Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract loc... Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract local and global features, as well as the lack of effective mechanisms to capture complex interactions between features;Additionally, when increasing the receptive field to obtain deeper feature representations, the reliance on increasing network depth leads to a significant increase in computational resource consumption, affecting the efficiency and performance of detection. Based on these issues, firstly, this paper proposes a network traffic anomaly detection model based on parallel dilated convolution and residual learning (Res-PDC). To better explore the interactive relationships between features, the traffic samples are converted into two-dimensional matrix. A module combining parallel dilated convolutions and residual learning (res-pdc) was designed to extract local and global features of traffic at different scales. By utilizing res-pdc modules with different dilation rates, we can effectively capture spatial features at different scales and explore feature dependencies spanning wider regions without increasing computational resources. Secondly, to focus and integrate the information in different feature subspaces, further enhance and extract the interactions among the features, multi-head attention is added to Res-PDC, resulting in the final model: multi-head attention enhanced parallel dilated convolution and residual learning (MHA-Res-PDC) for network traffic anomaly detection. Finally, comparisons with other machine learning and deep learning algorithms are conducted on the NSL-KDD and CIC-IDS-2018 datasets. The experimental results demonstrate that the proposed method in this paper can effectively improve the detection performance. 展开更多
关键词 Network traffic anomaly detection multi-head attention parallel dilated convolution residual learning
在线阅读 下载PDF
Modelling of Daily Long-Term Urban Road Traffic Flow Distribution: A Poisson Process Approach 被引量:1
19
作者 Jojo D. Lartey 《Open Journal of Modelling and Simulation》 2025年第1期89-105,共17页
Road traffic flow forecasting provides critical information for the operational management of road mobility challenges, and models are used to generate the forecast. This paper uses a random process to present a novel... Road traffic flow forecasting provides critical information for the operational management of road mobility challenges, and models are used to generate the forecast. This paper uses a random process to present a novel traffic modelling framework for aggregate traffic on urban roads. The main idea is that road traffic flow is random, even for the recurrent flow, such as rush hour traffic, which is predisposed to congestion. Therefore, the structure of the aggregate traffic flow model for urban roads should correlate well with the essential variables of the observed random dynamics of the traffic flow phenomena. The novelty of this paper is the developed framework, based on the Poisson process, the kinematics of urban road traffic flow, and the intermediate modelling approach, which were combined to formulate the model. Empirical data from an urban road in Ghana was used to explore the model’s fidelity. The results show that the distribution from the model correlates well with that of the empirical traffic, providing a strong validation of the new framework and instilling confidence in its potential for significantly improved forecasts and, hence, a more hopeful outlook for real-world traffic management. 展开更多
关键词 Poisson Process Macroscopic Traffic Flow Urban Road Long-Term Forecast Multiple Entries-Exits Dynamics
在线阅读 下载PDF
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks 被引量:1
20
作者 Baoquan Liu Xi Chen +2 位作者 Qingjun Yuan Degang Li Chunxiang Gu 《Computers, Materials & Continua》 2025年第2期3179-3201,共23页
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not only reflects the time characteristics of the packet but also strengthens the relationship between the client or server packets. According to FMG, a Traffic Mapping Classification model (TMC-GCN) is designed, which can automatically capture and learn the characteristics and structure information of the top vertex in FMG. The TMC-GCN model is used to classify the encrypted traffic. The encryption stream classification problem is transformed into a graph classification problem, which can effectively deal with data from different data sources and application scenarios. By comparing the performance of TMC-GCN with other classical models in four public datasets, including CICIOT2023, ISCXVPN2016, CICAAGM2017, and GraphDapp, the effectiveness of the FMG algorithm is verified. The experimental results show that the accuracy rate of the TMC-GCN model is 96.13%, the recall rate is 95.04%, and the F1 rate is 94.54%. 展开更多
关键词 Encrypted traffic classification deep learning graph neural networks multi-layer perceptron graph convolutional networks
在线阅读 下载PDF
上一页 1 2 128 下一页 到第
使用帮助 返回顶部