To see the other types of publications on this topic, follow the link: Traffic protection.

Journal articles on the topic 'Traffic protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Traffic protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mohapatra, Baibaswata, Rajendra K. Nagaria, and Sudarshan Tiwari. "Guaranteed Protection in Survivable WDM Mesh Networks – New ILP Formulations for Link Protection and Path Protection." Journal of Telecommunications and Information Technology, no. 4 (June 28, 2023): 108–14. http://dx.doi.org/10.26636/jtit.2011.4.1187.

Full text
Abstract:
In this paper we propose new simple integer linear programs (ILPs) formulations for minimizing capacity (in wavelength link) utilization in survivable WDM network. The study examines the performance of shared based protection schemes, such as path protection scheme and link protection scheme under single fiber failure. The numerical results obtained show a reduction in capacity utilization using random traffic compared to the reported ILP formulation. We also present the results using Poisson’s traffic to identify the frequently used links for the widely used NSF network. The proposed work not
APA, Harvard, Vancouver, ISO, and other styles
2

Kusuma, Ida Bagus Ananta, I. Nyoman Sukandia, and I. Nyoman Sutama. "Perlindungan Hukum Terhadap Penumpang Angkutan Umum Ditinjau dari Undang-Undang Nomor 22 Tahun 2009 Tentang Lalu Lintas dan Angkutan Jalan." Jurnal Analogi Hukum 6, no. 1 (2024): 79–86. http://dx.doi.org/10.22225/jah.6.1.2024.79-86.

Full text
Abstract:
For Indonesians, transportation is a very significant activity. It is essential to understand the availability of transportation services that are orderly and entertaining, as well as appropriate to the level of traffic demand. Consequently, a single national transportation system must be created to coordinate road and transit traffic. According to Law No. 22 of 2009 on Road Traffic and Transport and Carrier Liability regarding passenger accidents in public transport on Road Traffic and Transport, the purpose of this review is to outline the various legal protections available to public transp
APA, Harvard, Vancouver, ISO, and other styles
3

Chaddad, Louma, Ali Chehab, and Ayman Kayssi. "OPriv: Optimizing Privacy Protection for Network Traffic." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 38. http://dx.doi.org/10.3390/jsan10030038.

Full text
Abstract:
Statistical traffic analysis has absolutely exposed the privacy of supposedly secure network traffic, proving that encryption is not effective anymore. In this work, we present an optimal countermeasure to prevent an adversary from inferring users’ online activities, using traffic analysis. First, we formulate analytically a constrained optimization problem to maximize network traffic obfuscation while minimizing overhead costs. Then, we provide OPriv, a practical and efficient algorithm to solve dynamically the non-linear programming (NLP) problem, using Cplex optimization. Our heuristic algo
APA, Harvard, Vancouver, ISO, and other styles
4

Şahin, Gökhan, and Murat Azizoğlu. "Optical layer survivability for single and multiple service classes." Journal of High Speed Networks 10, no. 2 (2001): 91–108. https://doi.org/10.3233/hsn-2001-197.

Full text
Abstract:
This paper considers capacity provisioning for service and restoration in a WDM optical network which provides lightpaths to higher layer networks. An optical network will likely serve several client networks with different protection requirements from the optical layer. In this paper, a framework is developed for jointly assigning wavelengths to service and restoration paths for all failures, for traffic patterns with single or multiple classes of protection. For various restoration methods, the problem is reduced to a vertex coloring problem in a graph. We present routing and wavelength assi
APA, Harvard, Vancouver, ISO, and other styles
5

Ilyenko, Anna, Sergii Ilyenko, and Oleksandr Vertypolokh. "METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 75–87. http://dx.doi.org/10.28925/2663-4023.2020.10.7587.

Full text
Abstract:
This article discusses further ways to protect traffic from DPI systems. The possibilities of using network protocols and application of DPI systems are investigated in the article. The analysis of the problem made it possible to identify vulnerabilities in the DNS protocol, which is based on the UDP protocol. These vulnerabilities include spoofing, interception, and traffic tethering. Also on the basis of the analysis of methods of protection of DNS traffic from interference, the authors substantiate and define the following: 1) all DNS queries are transmitted in the open; 2) existing approac
APA, Harvard, Vancouver, ISO, and other styles
6

Adama, Nabila Azizah, Feibe Engeline Pijoh, and Isye Junita Melo. "LEGAL ANALYSIS OF CONSUMER PROTECTION OF PUBLIC TRANSPORTATION SERVICES FOR TRAFFIC ACCIDENT VICTIMS." International Journal of Applied Science and Sustainable Development (IJASSD) 7, no. 1 (2025): 32–38. https://doi.org/10.36733/ijassd.v7i1.9450.

Full text
Abstract:
Apart from causing casualties such as injuries and deaths, traffic accidents also cause material losses. Material losses resulting from traffic accidents are certainly not small, especially for victims who have experienced physical losses and also experienced material losses, as well as the families of victims who have died There is an obligation for public transportation companies to take responsibility for traffic accidents because the vehicle crew works under the authority of the owner of the public transportation. However, in reality, not all public transportation companies carry out their
APA, Harvard, Vancouver, ISO, and other styles
7

Róka, Rastislav, Radek Fujdiak, Eva Holasova, Karel Kuchar, Milos Orgon, and Jiri Misurec. "Protection Schemes in HPON Networks Based on the PWFBA Algorithm." Sensors 22, no. 24 (2022): 9885. http://dx.doi.org/10.3390/s22249885.

Full text
Abstract:
In this paper, possibilities for network traffic protection in future hybrid passive optical networks are presented, and reasons for realizing and utilizing advanced network traffic protection schemes for various network traffic classes in these networks are analyzed. Next, principles of the Prediction-based Fair Wavelength and Bandwidth Allocation (PFWBA) algorithm are introduced in detail, focusing on the Prediction-based Fair Excessive Bandwidth Reallocation (PFEBR) algorithm with the Early Dynamic Bandwidth Allocation (E-DBA) mechanism and subsequent Dynamic Wavelength Allocation (DWA) sch
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Ming Yue, and Gen Yang Zhao. "Study on Environmental Protection of Urban Transport Development." Advanced Materials Research 962-965 (June 2014): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amr.962-965.2665.

Full text
Abstract:
The article investigates environmental protection during the periods of urban traffic developing mainly, following the moderate-scale urban construction, which analyzes the relationships between road traffic construction and urban environmental protection. In the end, the author puts forward supervisory suggestions that the sharp contradiction of road traffic construction and urban environmental protection should be solved from the aspects such as planning, management and legal, and then gives the rationalization proposals of building green transportation system.
APA, Harvard, Vancouver, ISO, and other styles
9

Imam, Maladi, Persada Putera Andika, and Adriano. "Legal Protection for Traffic Police in Handling The Covid-19 Pandemic." International Journal of Social Science And Human Research 04, no. 12 (2021): 3936–40. https://doi.org/10.47191/ijsshr/v4-i12-66.

Full text
Abstract:
This article aims to analyze the legal aspects of the traffic police's police in handling the covid-19 pandemic related to the legal basis of the traffic police's actions and analyze the legal protection of the traffic police who act as the Covid-19 chain breaker. Through normative legal research related to the legal aspects of traffic police actions as a Covid-19 chain breaker. In this study, the author uses a type of research, namely normative legal research. Normative research is research conducted by examining library materials or secondary data consisting of primary legal material
APA, Harvard, Vancouver, ISO, and other styles
10

Indra Priyatna and Antoine Gatinaud. "The Role of Vessel Traffic Services in Traffic Separation Scheme." PROSIDING POLITEKNIK ILMU PELAYARAN MAKASSAR 1, no. 4 (2020): 10–21. http://dx.doi.org/10.48192/prc.v1i4.317.

Full text
Abstract:
The transportation of goods, passenger and livestock by sea is growing rapidly and rise a need for safety, security and environment protection. Now Indonesia is in the process of implementing E-Navigation. But since E-Navigation is complex and need a lot of system interoperability, then Indonesia may start the implementation by introducing VTS (Vessel Traffic Services) as a system designed to achieve the highest level of safety at sea, increase fleet efficiency and simplify everyday tasks both ashore and on board and therefore the operations are processed seamlessly, the compliance is guarante
APA, Harvard, Vancouver, ISO, and other styles
11

Yang, Yong, Buhong Wang, Jiwei Tian, and Peng Luo. "Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks." Electronics 13, no. 13 (2024): 2664. http://dx.doi.org/10.3390/electronics13132664.

Full text
Abstract:
With the continuous development of the civil aviation industry toward digitalization and intelligence, the closed architecture of traditional air traffic information networks struggles to meet the rapidly growing demands for air traffic services. Network function virtualization (NFV) is one of the key technologies that can address the rigidity of traditional air traffic information networks. NFV technology has facilitated the flexible deployment of air traffic services, but it has also expanded the attack surface of the network. In addressing the network attack risks faced by service function
APA, Harvard, Vancouver, ISO, and other styles
12

Plevnik, Aljaš. "Environmental protection and traffic regulation in Slovenia." Urbani izziv 9, no. 1 (1998): 136. http://dx.doi.org/10.5379/urbani-izziv-en-1998-09-01-005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Addis, Bernardetta, Giuliana Carello, and Sara Mattia. "Survivable green traffic engineering with shared protection." Networks 69, no. 1 (2016): 6–22. http://dx.doi.org/10.1002/net.21717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hongjun, Li. "Study on Sustainable Development Highway Traffic." E3S Web of Conferences 165 (2020): 04043. http://dx.doi.org/10.1051/e3sconf/202016504043.

Full text
Abstract:
The rapid development of road traffic has provided a driving force for socio-economic development. By analyzing the current status of highway transportation development and investment in environmental protection of highway transportation, it is concluded that only by coordinating the relationship between the development of highway transportation and environmental protection can sustainable highway transportation be realized. By analyzing the practice of highway transportation development, this paper concluded that sustainable transportation development can only be achieved by adhering to resou
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Zhipan, Haonan Ding, and Shuai Li. "Analysis of Highway Subgrade Slope Protection and Support Technologies." Journal of World Architecture 7, no. 4 (2023): 1–5. http://dx.doi.org/10.26689/jwa.v7i4.4773.

Full text
Abstract:
As an important transportation hub in China the traffic volume and driving speed are important aspects of expressways. Therefore the protection requirements for roadbed side slopes are higher and it is necessary to resist rainwater erosion and other damages by protecting the side slopes. Therefore it is necessary to adopt effective technical means of subgrade protection and support. This paper mainly summarizes the characteristics of highway subgrade slope protection construction and slope protection and support technologies.
APA, Harvard, Vancouver, ISO, and other styles
16

Fansuri, Arif, Elwi Danil, and Siska Elvandari. "The Implementation of Presumption of Innocent in E-Tilang (Electronic Fine for Traffic Rules Violation)in Padang Panjang District Court." International Journal of Multicultural and Multireligious Understanding 6, no. 5 (2019): 413. http://dx.doi.org/10.18415/ijmmu.v6i5.1107.

Full text
Abstract:
The objectives of this present research are: 1) to Know the Implementation of Presumption of Innocent in Law Enforcement towards Traffic Rules Violation before Using Electroning Fine System; 2) to Know the Implementation of Presumption of Innocent in Law Enforcement towards Traffic Rules Violation by Using Electroning Fine System. The approach method used in this research is sociological judicial method. The research results show that: 1. Law enforcement towards traffic rules violation before the prevailing of E-Tilang (Eletronic Fine for Traffic Rules Violation) which refers to Decree of Supr
APA, Harvard, Vancouver, ISO, and other styles
17

Yan, Xiaodan. "Deep Learning-Based Efficient Analysis for Encrypted Traffic." Applied Sciences 13, no. 21 (2023): 11776. http://dx.doi.org/10.3390/app132111776.

Full text
Abstract:
To safeguard user privacy, critical Internet traffic is often transmitted using encryption. While encryption is crucial for protecting sensitive information, it poses challenges for traffic identification and poses hidden dangers to network security. As a result, the precise classification of encrypted network traffic has become a crucial problem in network security. In light of this, our paper proposes an encrypted traffic identification method based on the C-LSTM model for encrypted traffic recognition by leveraging the power of deep learning. This method can effectively extract spatial and
APA, Harvard, Vancouver, ISO, and other styles
18

Yeh, Chien-Hung, Wen-Piao Lin, Syu-Yang Jiang, Shang-En Hsieh, Ching-Hsuan Hsu, and Chi-Wai Chow. "Integrated Fiber-FSO WDM Access System with Fiber Fault Protection." Electronics 11, no. 13 (2022): 2101. http://dx.doi.org/10.3390/electronics11132101.

Full text
Abstract:
In this study, we propose a new wavelength-division-multiplexing passive optical network (WDM-PON) system to support the blended fiber-free space optics (FSO) signal access. To provide the fiber and FSO traffics simultaneously, the C- and L-band channels are applied in the presented PON, respectively. Moreover, to avoid the fiber breakpoint in the fiber access traffic, the proposed WDM access architecture also can provide the self-restored mechanism by applying simple fiber routing path. In addition, the corresponding signal performances of fiber and FSO channels are also executed experimental
APA, Harvard, Vancouver, ISO, and other styles
19

Khalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, et al. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.

Full text
Abstract:
Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding attack that could target those resources. The DDoS attack consumes network available resources such as bandwidth, processing power, and memory, thereby limiting or withholding accessibility to users. The Flash Crowd (FC) is quite similar to the DDoS attack whereby many legitimate users concurrently access a particular service, the number of which results in the
APA, Harvard, Vancouver, ISO, and other styles
20

Dragović, Nada, Snežana Radulović Jevremović, and Mimoza Jeličić. "Environmental protection and the road database." Put i saobraćaj 69, no. 3 (2023): 33–37. http://dx.doi.org/10.31075/pis.69.03.05.

Full text
Abstract:
In recent years, we have witnessed the intensive construction of road routes through Serbia. Mitigation plans have been designed on all newly constructed sections and environmental monitoring is foreseen. In order to successfully implement mitigation and monitoring plans, there is a need to consolidate a large number and type of data. Within the PE "Roads of Serbia" there is a Database department responsible for the management, collection, updating and analysis of the data referring to roads, traffic, traffic signage and equipment, traffic accidents, structures, etc. This paper points to the n
APA, Harvard, Vancouver, ISO, and other styles
21

Zhelenkova, M. B. "DESIGNING OF ENCRYPTION ALGORITHMS FOR PROTECTION OF NETWORK TRAFFIC IN TELECOMMUNICATION SYSTEMS ON TRANSPORT." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 242 (August 2024): 43–48. http://dx.doi.org/10.14489/vkit.2024.08.pp.043-048.

Full text
Abstract:
The text of the article is devoted to the current problem of ensuring the security of network traffic of telecommunication systems in transport. The existing methods of protecting network traffic, their advantages and disadvantages, the significance of each approach to data protection are considered, from which it was concluded that encryption algorithms are important in the process of ensuring information security. Such algorithms represent the basis for protecting data on the network, since they are able to ensure the security of information after it is intercepted by third parties. The impo
APA, Harvard, Vancouver, ISO, and other styles
22

Cha, In-Hyuk, Joo-yun Kim, and Hyun-sung Lee. "A Study on Traffic Safety Facilities in Child Protective Areas: Based on children's behavioral types." korea soc pub des 7 (December 31, 2022): 49–58. http://dx.doi.org/10.54545/kspd.2022.7.49.

Full text
Abstract:
Despite improvements in the Traffic Law and the Child Safety Protection Law in child protection zones, traffic accidents in children are continuously increasing and decreasing. In response to this problem, this study was conducted to analyze the improved characteristics of public facilities installed in children's protected areas, and to provide a method for deriving traffic safety facility types that reflect children's behavior types. For this study, we theoretically examined the affordance theory for user behavior types and the designation guidelines and regulations for child protection zone
APA, Harvard, Vancouver, ISO, and other styles
23

Irawan, Hengki, Sri Endah Wahyuningsih, and Jawade Hafidz. "Legal Protection For Victims Of Traffic Violations That Lead To Death (Case Study On Police Traffic of Rembang)." Jurnal Daulat Hukum 2, no. 4 (2020): 485. http://dx.doi.org/10.30659/jdh.v2i4.8349.

Full text
Abstract:
The purpose of this study is to know, shortly describe, analyze and assess the implementation, barriers, and the remedies to overcome obstacles in the legal protection for victims of traffic abuses resulting in death by Police Traffic of Rembang. The method used in this study, using a kind of sociological juridical research, analytical, descriptive, with data used are primary data and secondary data, and analyzed Qualitative. The results of this study are: (1) legal protection for victims of traffic abuses resulting in death by Police Traffic of Rembang preferably through peace settlement with
APA, Harvard, Vancouver, ISO, and other styles
24

КРЕМІНЬ, ІГОР, СЕРГІЙ КРЕМІНЬ та ОЛЕКСАНДР МІНДЗЯ. "ЗАХИСТ WEB РЕСУРСІВ ВІД DDOS АТАК ЗА ДОПОМОГОЮ CDN". Herald of Khmelnytskyi National University. Technical sciences 347, № 1 (2025): 145–49. https://doi.org/10.31891/2307-5732-2025-347-19.

Full text
Abstract:
Protecting web resources from DDoS attacks (Distributed Denial of Service attacks) is a crucial issue in information security. These attacks can cause significant financial losses and damage user trust. Today, DDoS attacks are becoming more complex and powerful, using large amounts of harmful traffic to overload servers and network infrastructure. One of the effective methods to protect web resources from such attacks is by using a Content Delivery Network, or CDN. A CDN not only optimizes content delivery but also spreads the load across multiple servers, reducing the impact of DDoS attacks b
APA, Harvard, Vancouver, ISO, and other styles
25

Gardziejczyk, Władysław. "SELECTED PROBLEMS OF PROTECTION AGAINST ROAD TRAFFIC NOISE." Inżynieria Ekologiczna, no. 45 (2015): 82–88. http://dx.doi.org/10.12912/23920629/60598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Canhui Ou, Keyao Zhu, Hui Zang, L. H. Sahasrabuddhe, and B. Mukherjee. "Traffic grooming for survivable WDM networks-shared protection." IEEE Journal on Selected Areas in Communications 21, no. 9 (2003): 1367–83. http://dx.doi.org/10.1109/jsac.2003.818233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Brinkmann, Volker, Daniel D. Pinschewer, Lili Feng, and Shizhong Chen. "FTY720: ALTERED LYMPHOCYTE TRAFFIC RESULTS IN ALLOGRAFT PROTECTION." Transplantation 72, no. 5 (2001): 764–69. http://dx.doi.org/10.1097/00007890-200109150-00002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

PREDA, Valentin, Răzvan GHICA, Iulian BLENDEA, Dumitru DIACU, Alin GHIȚĂ, and Andrei-Mihai LUCHIAN. "AIR PROTECTION ENCRYPTION PROTOCOLS FOR SECURING AIR TRAFFIC CONTROL COMMUNICATION." Review of the Air Force Academy 22, no. 1 (2024): 11–18. http://dx.doi.org/10.19062/1842-9238.2024.22.1.2.

Full text
Abstract:
The article presents a detailed analysis of the encryption protocols used in air traffic control systems to ensure the security of communication between aircraft and ground systems. The importance of secure communication in air traffic management is highlighted and encryption protocols such as AES, RSA and ECC are examined within the specific context of air traffic control. Special emphasis is placed on secure communication architecture and cryptographic key management solutions. Challenges and solutions in implementing these protocols in complex environments with high security requirements ar
APA, Harvard, Vancouver, ISO, and other styles
29

Cha, In-Hyuk, Joo-Yun Kim, and Hyun-Sung Lee. "A Study on the Visual Perception Characteristics of Gestalt on Traffic Safety Facilities in Children's Protected Areas." korea soc pub des 11 (December 31, 2023): 41–52. http://dx.doi.org/10.54545/kspd.2023.12.41.

Full text
Abstract:
In this study, when looking at statistics on traffic accidents in child protection zones, children's traffic accidents in child protection zones have continued to increase and decrease irregularly. Against this background, to prevent continuous traffic accidents in child protection zones, we would like to examine four traffic safety facilities that provide safety and recognition to children, pedestrians and drivers from the perspective of perception during gestalt. Also, the shape and size contained within it. The facility is analyzed and evaluated by color, material environmental factors, and
APA, Harvard, Vancouver, ISO, and other styles
30

Suwitno, Suwitno. "Legal Protection of Vehicle Users by Under Age (Minors) Viewed from The Perspective at Present Act No.22 of 2009 on Traffic and Transportation." Jurnal Daulat Hukum 1, no. 2 (2018): 501. http://dx.doi.org/10.30659/jdh.v1i2.3323.

Full text
Abstract:
The research problems are how the legal protection of motorists under the age of the offenses traffic violations and how efforts and the role of the police in dealing with traffic violations committed minors. Research result This is the legal protection of motorists under the age of criminal acts against traffic violations that should Criminal sanctions imposed on the child must be based on truth, justice, and child welfare. Criminal punishment or actions to be accountable and beneficial for children. The judge shall consider the situation of children, the state house, state of the environment
APA, Harvard, Vancouver, ISO, and other styles
31

Yunita, Yunita, M. Citra Ramadhan, and Isnaini Isnaini. "Pertanggungjawaban Perusahaan Asuransi PT. Jasa Raharja (Persero) Kantor Perwakilan Padangsidimpuan Terhadap Korban dalam Kecelakaan Lalu Lintas Berbasis Perlindungan Hukum." Journal of Education, Humaniora and Social Sciences (JEHSS) 5, no. 4 (2023): 3246–59. http://dx.doi.org/10.34007/jehss.v5i4.1709.

Full text
Abstract:
This study aims to analyze the role, responsibilities, implementation, and accountability of PT. Jasa Raharja (Persero) Kantor Perwakilan Padang Sidempuan, an insurance company, towards victims of traffic accidents based on legal protection. The research utilized an empirical legal research method with a descriptive analytical approach. Data were obtained through literature review and qualitative analysis of field research. The findings indicate that PT. Jasa Raharja (Persero) has a role in collecting mandatory contributions and donations from transportation owners/operators and public transpo
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Shuo, Fangyu Shen, Yaping Liu, Zhikai Yang, and Xinyu Lv. "A Novel Traffic Obfuscation Technology for Smart Home." Electronics 12, no. 16 (2023): 3477. http://dx.doi.org/10.3390/electronics12163477.

Full text
Abstract:
With the widespread popularity of smart home devices and the emergence of smart home integration platforms such as Google, Amazon, and Xiaomi, the smart home industry is in a stage of vigorous development. While smart homes provide users with convenient and intelligent living, the problem of smart home devices leaking user privacy has become increasingly prominent. Smart home devices give users the ability to remotely control home devices, but they also reflect user home activities in traffic data, which brings the risk of privacy leaks. Potential attackers can use traffic classification techn
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Jie, Jinde Cao, Ming Li, and Maobin Hu. "Optimizing protection resource allocation for traffic-driven epidemic spreading." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 8 (2022): 083141. http://dx.doi.org/10.1063/5.0098384.

Full text
Abstract:
Optimizing the allocation of protection resources to control the spreading process in networks is a central problem in public health and network security. In this paper, we propose a comprehensive adjustable resource allocation mechanism in which the over allocation of resources can be also numerically reflected and study the effects of this mechanism on traffic-driven epidemic spreading. We observe that an inappropriate resource allocation scheme can induce epidemic spreading, while an optimized heterogeneous resource allocation scheme can significantly suppress the outbreak of the epidemic.
APA, Harvard, Vancouver, ISO, and other styles
34

Tang, Shiu Keung, Mors Leung, Sherman S. L. Yip, and Rudolf Y. C. Lee. "On the acoustical protection of acoustic balconies." INTER-NOISE and NOISE-CON Congress and Conference Proceedings 268, no. 2 (2023): 6111–15. http://dx.doi.org/10.3397/in_2023_0899.

Full text
Abstract:
Acoustic balcony is a recent development in Hong Kong for use as a noise screening device on high-rise building façades. It is in principle a balcony equipped with sound absorption materials (NRC 0.7) on its ceiling and side walls, as well as an inclined panel at its parapet. Windows are installed on the space above the parapet to block the direct noise intrusion path from outside to the indoor. In the present study, a full size balcony mockup is adopted in an open-air laboratory and the sound transmission loss of the balcony at different sound source orientations and elevations examined. A lo
APA, Harvard, Vancouver, ISO, and other styles
35

Papanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, and Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection." Electronics 12, no. 6 (2023): 1484. http://dx.doi.org/10.3390/electronics12061484.

Full text
Abstract:
Network traffic analysis can raise privacy concerns due to its ability to reveal sensitive information about individuals and organizations. This paper proposes a privacy-preserving Block-chained AutoML Network Traffic Analyzer (BANTA). The system securely stores network traffic logs in a decentralized manner, providing transparency and security. Differential privacy algorithms protect sensitive information in the network flow logs while allowing administrators to analyze network traffic without the risk of leakages. The BANTA uses blockchain technology, where smart contracts automate the proce
APA, Harvard, Vancouver, ISO, and other styles
36

Đekić, Aleksandar. "The specificities and characteristics of the offence of endangering road traffic safty and police action regarding this offense." Zurnal za bezbjednost i kriminalistiku 4, no. 2 (2022): 61–74. http://dx.doi.org/10.5937/zurbezkrim2202061d.

Full text
Abstract:
In modern society, traffic represents one of the basic human needs. Traffic is a daily human activity, which is reflected in the change in the position of people, things or messages. The goal of the state is to establish a favorable state of security, and therefore traffic safety, in other words, to establish traffic with as few negative effects as possible. On the other hand, to regulate and improve road traffic safety, road traffic laws have been enacted. Traffic laws regulate the basis of development and participation in road traffic, including road traffic offenses as basic forms of traffi
APA, Harvard, Vancouver, ISO, and other styles
37

Qu, Shiqing. "Research on the Promotion Mechanism of the Xianyu Double Eleven Green Partner Program on App Traffic." Advances in Economics, Management and Political Sciences 96, no. 1 (2024): 246–51. http://dx.doi.org/10.54254/2754-1169/96/2024mur0058.

Full text
Abstract:
Green environmental protection is one of the key research topics today. Researchers have found that when apps are linked to green environmental protection, they often have varying degrees of promotional effects on traffic. At present, many platforms have carried out green environmental protection activities in a continuous manner. However, there is still a lack of unified explanation for the promotion mechanism of green plans on app traffic. Therefore, taking the Xianyu app, which actively carries out the Green Partner Program, as an example, the research topic of this article is the promotion
APA, Harvard, Vancouver, ISO, and other styles
38

Eisenberg, Y. "PIER PROTECTION SYSTEM FOR THE DUWAMISH SHIP CHANNEL IN SEATTLE." Coastal Engineering Proceedings 1, no. 20 (1986): 137. http://dx.doi.org/10.9753/icce.v20.137.

Full text
Abstract:
In 1978 an out-of-control ship hit and severely damaged a bascule bridge across the Duwamish West Waterway in Seattle seriously affecting both ship and highway traffic. The high level West Seattle Bridge was subsequently constructed to handle all through-highway traffic. A swing bridge was also designed to handle local traffic over the ship channel. The function of the pier protection system described in this paper is to protect the pivot piers and swing spans of this new bridge from damage by absorbing the part of the tranverse energy component imparted by a colliding ship, which is not absor
APA, Harvard, Vancouver, ISO, and other styles
39

Lesov, Kuvandyk, Muslim Ortikboyev, and Nafisa Yuldasheva. "Design of rockfall protection structures." E3S Web of Conferences 383 (2023): 02014. http://dx.doi.org/10.1051/e3sconf/202338302014.

Full text
Abstract:
The article analyses the rockfall phenomena that disrupt the continuity and safety of railway traffic in mountainous areas. The reasons causing rockfall phenomena are given. Recommendations are given for the choice of rockfall-proof structures design to ensure safe operation of facilities against rockfall processes depending on a number of initial parameters.
APA, Harvard, Vancouver, ISO, and other styles
40

Neamțu, Gheorghe, and Marinela Ință. "Safety of vulnerable persons in European road traffic." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 987–1000. https://doi.org/10.62225/2583049x.2024.4.6.3541.

Full text
Abstract:
The scientific paper presents a concrete research carried out by the authors in order to implement some technical concepts, so that those interested in this field can become acquainted with a certain way of presenting the problems related to the safety of vulnerable persons in road traffic. In specialist literature, vulnerable persons in road traffic are persons other than drivers of road vehicles who participate in road traffic (pedestrians, cyclists, persons on scooters, bicycles, mopeds or motorcycles), who are exposed to danger or accidents, whose means of transport or locomotion, two or t
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Jin, and Zeng Kai Wang. "DGMM Based Network Traffic Prediction for Smart Substation." Applied Mechanics and Materials 339 (July 2013): 401–8. http://dx.doi.org/10.4028/www.scientific.net/amm.339.401.

Full text
Abstract:
Compared with traditional substation, smart substation process layer network, which has the same meaning as relay protection and safety automatic devices, is actually equivalent to the secondary circuit of traditional substation protection. Once an exception occurs in the network traffic of process layer, it will directly affect the reliability, rapidity and agility of relay protection action. According to the characteristics of network traffic of smart substation, this paper proposed a novel dynamic grey Markov model (DGMM) based network traffic prediction approach, which could assist decisio
APA, Harvard, Vancouver, ISO, and other styles
42

Asrizal and Sukendar Situmorang Suhadi. "Legal Protection of the use of Public Transport Services in Mandau District Bengkalis District." International Journal of Trend in Scientific Research and Development 3, no. 6 (2019): 1233–38. https://doi.org/10.5281/zenodo.3589583.

Full text
Abstract:
The community in general uses city transportation services such as Microbuses, city buses or other city transportation to facilitate activities from one place to another. By realizing the importance of the role of transportation, traffic and road transportation must be arranged in an integrated national transportation system and be able to realize the availability of transportation services that are in accordance with the level of traffic demand and orderly, convenient, fast, smooth and affordable transportation services. peoples purchasing power. According to Undang Undang Number 22 2009 Conc
APA, Harvard, Vancouver, ISO, and other styles
43

Kusuma, Rizky, Lucky Ferdiles, and Darwati Darwati. "Consumer Protection for Traffic Accident Victims Due to a collision with an online motorcycle taxi that violates." Blantika: Multidisciplinary Journal 2, no. 7 (2024): 705–15. http://dx.doi.org/10.57096/blantika.v2i7.169.

Full text
Abstract:
In the era of globalization, the number of private vehicles is increasingly two-wheeled. Hit-and-run traffic violations in Gelora Karno, Central Jakarta Polrestabes area between scooters against and private motorcycles and traffic accidents between online motorcycle taxis that go against the flow and private motorcycles. This study aims to determine consumer safety standards against traffic accidents caused by online motorcycle taxi drivers. The legal research method that the author uses is empirical juridical, the method is carried out by examining the law or from facts that are actually obta
APA, Harvard, Vancouver, ISO, and other styles
44

Poniatowski, Piotr. "The Legal Basis for Protection against Road Traffic Noise (with Particular Emphasis on the Preparation and Implementation of Road Project and the Stage of Road Operation)." Studia Iuridica Lublinensia 33, no. 2 (2024): 259–80. http://dx.doi.org/10.17951/sil.2024.33.2.259-280.

Full text
Abstract:
The article discusses the regulations under which information on the state of the environment is collected, which can be used at the stage of planning, designing, constructing and operating roads (state environmental monitoring, programmes of environment protection against noise, strategic noise maps). It also addresses the issue of protection against road traffic noise at the stage of road design, construction and alteration, as well as at the stage of road operation. It also identifies environmental protection authorities that play an important role in the context of supervising compliance w
APA, Harvard, Vancouver, ISO, and other styles
45

Klinkowski, Mirosław. "Dedicated Path Protection with Flexible Switching Selection in Passive Optical 5G Xhaul Access Networks." Photonics 11, no. 10 (2024): 908. http://dx.doi.org/10.3390/photonics11100908.

Full text
Abstract:
This work addresses the optimized planning of survivable optical 5G Xhaul access networks employing passive Wavelength Division Multiplexing (WDM) technologies. Specifically, it focuses on the reliability of optical transmission paths connecting remote radio sites to a central hub ensured by using a novel, cost-effective, flexible, and dedicated path protection (DPP-F) scheme, protecting against single-link failures. The proposed DPP-F network protection approach allows for switching of individual wavelengths or the complete multiplexed WDM signal, flexibly applying the best switching option a
APA, Harvard, Vancouver, ISO, and other styles
46

Risnadinata, Putu Martha, I. Nyoman Satya Kumara, and Wayan Gede Ariastina. "The Management Of Flood Protection System Of Dewa Ruci Underpass In Bali." Journal of Electrical, Electronics and Informatics 4, no. 2 (2020): 57. http://dx.doi.org/10.24843/jeei.2020.v04.i02.p04.

Full text
Abstract:
Dewa Ruci intersection is one point of traffic congestion point in Bali. Dewa Ruci is a major intersection that connects the city of Denpasar, Kuta, Jimbaran, and Nusa Dua. In addressing traffic congestion, built underpass so that traffic becomes smooth when passing through the intersection Dewa Ruci. Part of the Dewa Ruci intersection is below the ground level, so risks of flooding. The source of water that potentially fills the underpass is groundwater seepage and rainfall. The flood protection of the underpass is capable of storing 1344 m3 water and with the pumping system. In this research
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Maoli, Bowen Zhang, Xiaodong Zang, Kang Wang, and Xu Ma. "Malicious Traffic Classification via Edge Intelligence in IIoT." Mathematics 11, no. 18 (2023): 3951. http://dx.doi.org/10.3390/math11183951.

Full text
Abstract:
The proliferation of smart devices in the 5G era of industrial IoT (IIoT) produces significant traffic data, some of which is encrypted malicious traffic, creating a significant problem for malicious traffic detection. Malicious traffic classification is one of the most efficient techniques for detecting malicious traffic. Although it is a labor-intensive and time-consuming process to gather large labeled datasets, the majority of prior studies on the classification of malicious traffic use supervised learning approaches and provide decent classification results when a substantial quantity of
APA, Harvard, Vancouver, ISO, and other styles
48

Bohatkiewicz, Janusz. "Protection against traffic noise in urban areas in relation to noise control plans." Budownictwo i Architektura 13, no. 4 (2014): 075–82. http://dx.doi.org/10.35784/bud-arch.1708.

Full text
Abstract:
Exposure to traffic noise belongs to the most harmful impacts affecting people who live in towns. Nearly one third of residents of big towns in Poland suffers from permanent exposure to traffic noise, which may have adverse effects on health. The same refers to most European cities. The problems of noise is regulated by identical legislation in the EU and in Poland. Noise control in big towns arises from regulations related to obligatory provision of noise mapping and noise control plans. The plans contain, among other things, site-specific methods of protection against traffic noise. Those si
APA, Harvard, Vancouver, ISO, and other styles
49

Dzyuba, N., T. Kaverzneva, N. Leonova, and I. Skripnik. "Protection Against Traffic Noise Acoustic Screens with Solar Cells." IOP Conference Series: Earth and Environmental Science 988, no. 3 (2022): 032003. http://dx.doi.org/10.1088/1755-1315/988/3/032003.

Full text
Abstract:
Abstract In connection with the growth of cities and the increase in building density, the problem of noise control in the city is becoming increasingly relevant. To protect residential areas from the noise of traffic flows in megacities, acoustic barriers with their own design features are widely used. These features can be based on a number of reasons: a complex noise picture, imperfection of noise insulation or noise absorption materials, high cost of execution, and other reasons. The article shows that the use of transport acoustic barriers with hoods, the design of which includes solar pa
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Menglin, Massimo Tornatore, and Biswanath Mukherjee. "Survivable Traffic Grooming in Elastic Optical Networks—Shared Protection." Journal of Lightwave Technology 31, no. 6 (2013): 903–9. http://dx.doi.org/10.1109/jlt.2012.2231663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!