• No results found

self-similar traffic modeling

An intrusion detection system (IDS) for internet network

An intrusion detection system (IDS) for internet network

... This project is to analysis the network with data free attacks in a simulator that involved self- similar traffic that ideally represents the internet traffic modeling as well as the P[r] ...

18

Online Full Text

Online Full Text

... packet traffic exhibits self-similarity or long range dependence (LRD) and causes the degradation of switch ...under self-similar variable length packet traffic by modeling it as ...

5

Self Similar Network Traffic and Performance Evaluation pdf

Self Similar Network Traffic and Performance Evaluation pdf

... with self-similar input are great, and this part of the book exposes what is known about queueing with self- similar input, above and beyond the phenomenon that queue length distribution ...

574

Engineering Approach to Calculating QoS of Server with Self-Similar Incoming Traffic Based on Recursive Scalable Poisson Model

Engineering Approach to Calculating QoS of Server with Self-Similar Incoming Traffic Based on Recursive Scalable Poisson Model

... the modeling results of design situations on exponential models, which are characterized by: compactness, flexibility, reproducibility, simplicity of machining, the need to collect a small amount of initial ...

8

An Approximate Performance of Self-Similar Lognormal M 1 K Internet Traffic Model

An Approximate Performance of Self-Similar Lognormal M 1 K Internet Traffic Model

... for modeling the Internet traffic data ...a self-similar process that can be applied to any other distributions apart from the distribution generated in the transformation; [4] observed that ...

7

Study of Delay and Loss Behavior of Internet Switch Markovian Modelling Using Circulant Markov Modulated Poisson Process (CMMPP)

Study of Delay and Loss Behavior of Internet Switch Markovian Modelling Using Circulant Markov Modulated Poisson Process (CMMPP)

... classical self-similar traffic models are asymptotic in ...under self-similar fixed length packet traffic by modeling it as CMMPP/D/1 and CMMPP/D/1/K, respectively, where ...

8

Comparison of TCP Variants Over Self-Similar Traffic

Comparison of TCP Variants Over Self-Similar Traffic

... Network traffic has peak behavior over all timescales and thus it does not follow Poisson traffic behavior ...actual traffic measurements. Table 1 shows the comparison of Poisson and ...

6

Enabling and exploiting self-similar central symmetry formations

Enabling and exploiting self-similar central symmetry formations

... In this work a formation flying based architecture is presented within the context of a distributed antenna array. An artificial potential function method is used to control the formation whereby deviation from an ...

26

ASSOCIATION RULE MINING BASED VIDEO CLASSIFIER WITH LATE ACCEPTANCE HILL 
CLIMBING APPROACH

ASSOCIATION RULE MINING BASED VIDEO CLASSIFIER WITH LATE ACCEPTANCE HILL CLIMBING APPROACH

... intelligent traffic system, vehicle recognition is always a hot ...background modeling algorithm and proposes a vehicle recognition method based on multi-scale of Gauss background ...divides traffic ...

5

Self-similar growth of a bimodal laboratory fan

Self-similar growth of a bimodal laboratory fan

... The surface of the cross section resembles the average pro- file of Fig. 7a. Indeed, when superimposed, the two lines be- come virtually indistinguishable, with the slope break occur- ring near the transition between ...

14

Self-similar groups and finite Gelfand pairs

Self-similar groups and finite Gelfand pairs

... However, we prove that the Basilica group has the following strong property: the rigid vertex stabilizers of the first level, namely Rist B (0).. and Rist B (1) , act spherically transiti[r] ...

16

Traffic mo0deling and Measurements_Lec_20 - Lec_24.pptx

Traffic mo0deling and Measurements_Lec_20 - Lec_24.pptx

...  Traditional modeling of data traffic  Novel models for data traffic.. connection admission control, dynamic routing)  Congestion control (e.g. congestion detection).  but also for[r] ...

39

Analysis of Ethernet Traffic Statistical Properties

Analysis of Ethernet Traffic Statistical Properties

... Ethernet traffic on backbone connec- tion and in LAN and have evaluated its statis- tical ...evaluated traffic in terms of protocols representation in volume and in number of packets, taking into account ...

7

The Relationship of Multicultural Acceptance, Community Closeness, Self Awareness, and Interpersonal Relationship: A Structural Equation Modeling Approach

The Relationship of Multicultural Acceptance, Community Closeness, Self Awareness, and Interpersonal Relationship: A Structural Equation Modeling Approach

... gender, self-efficacy, experience of traveling overseas, and intimacy with the community has been treated as a major ...selected self-awareness, community intimacy, and interpersonal relationship as ...

7

Traffic Assignment with Junction Modeling in TAPAS

Traffic Assignment with Junction Modeling in TAPAS

... the traffic assignment algorithm TAPAS was stud- ied and detailed descriptions of each part of the algorithm were ...junction modeling in ...junction modeling and showed that TAPAS is able to ...

79

Self similar evolution of Alfven wave turbulence

Self similar evolution of Alfven wave turbulence

... The self-similar solution corresponding to x = x ∗ is the only one that forms asymptotically at large k in the initial value problem of the evolution equation under consideration with initial data in a ...

15

Advection-dominated accretion: A self-similar solution

Advection-dominated accretion: A self-similar solution

... where the accreting gas starts off as a thin disk at large R, goes through an advection- dominated phase, and becomes a rotating settling “star” at small R. Over a range of intermediate radii the numerical solution is ...

9

The Compound Indexing of Human Self Similar Behavioural Patterns

The Compound Indexing of Human Self Similar Behavioural Patterns

... The presented communication introduces signed behavioural entropy and behavioural hysteresis based on the behavioural data segmentation and its subsequent complexity analysis using the Hurst exponent. The notion of ...

18

Methods for analysis of functionals on Gaussian self similar processes

Methods for analysis of functionals on Gaussian self similar processes

... The derivation of the Kolmogorov Forward Equation formula for fractional Brownian motion can be found in (Zeng et al. 2012). It should be noted this result was provided without any restrictions on the range of Hurst ...

131

Positive measure self similar sets without interior

Positive measure self similar sets without interior

... of self-affine sets with positive Lebesgue measure but empty interior was ...of self-similar sets with positive Lebesgue measure but empty interior answering a question from ...

5

Show all 10000 documents...

Related subjects