Loading...
Search for: traffic
0.008 seconds
Total 506 records

    Traffic behavior at urban intersection stop sign and blinking red signal: The Iranian experience

    , Article Scientia Iranica ; Volume 10, Issue 2 , 2003 , Pages 131-141 ; 10263098 (ISSN) Vaziri, M ; Maher, M ; Sharif University of Technology
    Sharif University of Technology  2003
    Abstract
    In this paper, an attempt to identify and characterize minor road traffic behavior at unsignalized urban intersections in a city situated in a developing country is described. Information about the particular traffic behavior was collected using video cameras placed at 12 unsignalized intersections connecting minor to major roadways in Tehran. Stop signs and/or blinking red signals provided the stopping message at the minor approaches of the selected intersections. Relevant information about the behavior of more than 2400 vehicles was extracted from the video displays and the database records consisted of 31 variables reflecting driver, pedestrian, passenger, vehicle and intersection... 

    A comparison between Single Point and Conventional Urban Diamond Interchanges based on estimated delay

    , Article Scientia Iranica ; Volume 10, Issue 2 , 2003 , Pages 252-259 ; 10263098 (ISSN) Shafahi, Y ; Haghani, A ; Sharif University of Technology
    Sharif University of Technology  2003
    Abstract
    In this paper, the results of a study comparing the performance of two types of interchange, i.e., Conventional Diamond Interchange and Single Point Urban Diamond Interchange, are reported. The analysis is based on simulation of a Single Point Urban Diamond Interchange. The real data that is collected from two different existing Conventional Diamond Interchanges during peak hours is used as input for analysis. Highway capacity software is used to analyze the performance of the Conventional Diamond Interchanges while a simulation model is used for analyzing the performance of the Single Point Urban Diamond Interchanges. The results indicate that the performance of the Single Point Urban... 

    Cordon Location and Congestion Pricing in Transportation Networks

    , M.Sc. Thesis Sharif University of Technology Parsafard, Mohsen (Author) ; Zakaei Ashtian, Hedayat (Supervisor)
    Abstract
    Cordon pricing is one of the methods for charging transportation network. In a cordon based pricing scheme, users who want to drive into the congested area of city and pass some special links which form the cordon, have to pay toll. The most important things in this method of pricing are finding the appropriate links which can shape the cordon and determining the tool level. This study, investigates an algorithm to find the optimal cordon location and toll level simultaneously in order to maximize social welfare. At first, assuming that cordon location is fixed and links that form the cordon are identified, a golden section method has been proposed for finding the optimal toll level. Then,... 

    On the gaussian characteristics of aggregated short-lived flows on high-bandwidth links

    , Article Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops ; 2013 , Pages 860-865 ; 9780769549521 (ISBN) Kahe, G ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Traffic modeling, traffic decomposition, and traffic engineering are some of the applications of traffic characterization that are mainly based on statistical characteristics of the network traffic. Many empirical analyses on Internet traffic traces show that the flow inter-arrival time distribution generally follows the Weibull distribution. As the scale of the network becomes larger, the Weibull distribution degrades to the Poisson distribution and when the flow arrival rate is high, it asymptotically converges to the Normal distribution. The aggregated traffic on high bandwidth links is the result of statistical multiplexing of many traffic sources, and the flow arrival rate on these... 

    Design of Realistic Network Traffic Generator and Traffic Anomalies

    , M.Sc. Thesis Sharif University of Technology Azadmanesh, Maryam (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Generating realistic network traffic serves capacity planning, traffic engineering, understanding internet service performance and anomaly detection. A useful traffic generator must generate characteristics in flows and packets, and add known internet anomalies to legitimate traffic. In this dissertation, we develop a tool for generating realistic and anomalous traffic. This generator can generate traffic in a scalable, reproducible and stochastic manner. Two methods are proposed for this purpose. In the first method, the traffic is generated according to statistical distribution of packets and flow charactristics. In the second method, traffic is generated by modeling the behavior of... 

    An interruption in the highway: New approach to modeling the car-traffic

    , Article Electronic Journal of Theoretical Physics ; Volume 6, Issue 23 , 2009 , Pages 123-136 ; 17295254 (ISSN) Rezaeezadeh, A ; Sharif University of Technology
    2009
    Abstract
    A very common phenomena in car-traffic system is investigated in this article. The problem is one-dimensional. We try to find the wave equation of the traffic and then, we'll talk more about the simulation of the system using Matlab7.6  

    Efficient analysis of traffic intersection scenes by employing traffic phase information

    , Article Iranian Journal of Electrical and Electronic Engineering ; Volume 15, Issue 2 , 2019 , Pages 203-210 ; 17352827 (ISSN) Ahmadi, P ; Gholampour, I ; Sharif University of Technology
    Iran University of Science and Technology  2019
    Abstract
    Analyzing motion patterns in traffic videos can be employed directly to generate high-level descriptions of their content. For traffic videos captured from intersections, usually, we can easily provide additional information about traffic phases. Such information can be obtained directly from the traffic lights or through traffic lights controllers. In this paper, we focus on incorporating additional information to analyze the traffic videos more efficiently. Using side information on traffic phases, the semantic of motion patterns from traffic intersection scenes can be learned more effectively. The learning is performed based on optical flow features extracted from training video clips,... 

    Gender differences in the use of ADAS technologies: A systematic review

    , Article Transportation Research Part F: Traffic Psychology and Behaviour ; Volume 78 , 2021 , Pages 1-15 ; 13698478 (ISSN) Rezaei, M ; Yazdani, M ; Jafari, M ; Saadati, M ; Sharif University of Technology
    Elsevier Ltd  2021
    Abstract
    Background: In recent years, Advanced Driving Assistance Systems (ADAS) have been significantly progressed, opening novel horizons in reducing traffic accidents. Driver gender can be an affecting factor in the utilization of these systems. The purpose of this study is to review articles examining the effect of gender on the use of ADAS technologies. Methods: This systematic review was conducted in Scopus, Science Direct and PubMed databases using defined key-words in 2018. The retrieved articles were managed and screened through PRISMA-P protocol using EndNote X7 software. The extracted variables were divided into three categories of reaction, behavior, and outcome and also the relevant... 

    ITS deployment, from strategy to action case study: Resalat tunnels

    , Article 13th World Congress on Intelligent Transport Systems and Services, ITS 2006, 8 October 2006 through 12 October 2006 ; 2006 Isaai, M. T ; Behruz, H ; Moraveji, G. R ; Sharif University of Technology
    Intelligent Transport Systems (ITS)  2006
    Abstract
    This paper presents an ITS project in Iran, as the first intelligent tunnel management system to be deployed in support of urban traffic management. It aims to protect highway users from possible hazards, provide them travel information and support traffic controllers in efficient and effective exercise of daily works. The project concerns a high trafficked tunnel which has been inaugurated in July 2006 to connect two parts of a highway in Tehran, linking the northwest districts to northeast ones. This corridor was selected as a good candidate, due in particular, to the variety of problems encountered [1]. In order to launch the project a co-operation has been negotiated in late 2005 between... 

    Crypted Traffic Classification

    , M.Sc. Thesis Sharif University of Technology Saeid Shahrab (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    A traffic classifier maps each input stream into a pre-defined traffic class. If the traffic is encrypted using a protocol, such as SSL, or is protected using an encrypted tunnel, it's content would be hidden from the classifier, in which case the common traffic classification methods will be ineffective. Although common security mechanisms which provide information confidentiality to user can't hide all properties of messages, including length and time. Some of the newly presented methods of traffic classification utilize these properties and can actually classify messages without accessing their content. We will study such methods and their limitations in this thesis. Of all the encrypted... 

    Poster: Impact of traffic characteristics on request aggregation in an NDN router

    , Article 2019 IFIP Networking Conference, IFIP Networking 2019, 20 May 2019 through 22 May 2019 ; Volume 2019-January , 2019 ; 9783903176164 (ISBN) Ahmadi, M ; Roberts, J ; Leonardi, E ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The paper revisits the performance evaluation of caching in a Named Data Networking (NDN) router where the content store (CS) is supplemented by a pending interest table (PIT) which aggregates requests for a given content that arrive within the download delay. We extend prior work on caching with non-zero download delay by proposing a novel mathematical framework that is applicable to general traffic models and alternative cache insertion policies. Specifically we consider the impact of time locality in demand due to finite content lifetimes and we evaluate the use of an LRU filter to improve CS hit rate performance. The analysis is used to demonstrate that the impact of the PIT on upstream... 

    Improving a fault-tolerant routing algorithm using detailed traffic analysis

    , Article 3rd International Conference on High Performance Computing and Communications, HPCC 2007, Houston, TX, 26 September 2007 through 28 September 2007 ; Volume 4782 LNCS , 2007 , Pages 766-775 ; 03029743 (ISSN); 9783540754435 (ISBN) Nayebi, A ; Shamaei, A ; Sarbazi Azad, H ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Currently, some coarse measures like global network latency are used to compare routing protocols. These measures do not provide enough insight of traffic distribution among network nodes in presence of different fault regions. This paper presents a detailed traffic analysis of f-cube routing algorithm achieved by a especially developed tool. Per-node traffic analysis illustrates the traffic hotspots caused by fault regions and provides a great assistance in developing fault tolerant routing algorithms. Based on such detailed information, a simple yet effective improvement of f-cube is suggested. Moreover, the effect of a traffic hotspot on the traffic of neighboring nodes and global... 

    Performance modeling of wormhole hypermeshes under hotspot traffic

    , Article 2nd International Symposium on Computer Science in Russia, CSR 2007, Ekaterinburg, 3 September 2007 through 7 September 2007 ; Volume 4649 LNCS , 2007 , Pages 290-302 ; 03029743 (ISSN); 9783540745099 (ISBN) Moraveji, R ; Sarbazi Azad, H ; Nayebi, A ; Navi, K ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Traffic pattern is a point of concern in today's modeling approach of network-based computing systems including NoCs and Clusters. Hypermesh is a promising network topology suitable for a range of networks. Although there are few models reported for hypermeshes with uniform traffic pattern, no analytical model has been reported yet that deal with hotspot traffic load. Since uniform traffic assumption is not always justifiable in practice as there are many parallel applications that exhibit non-uniform traffic patterns, which can produce hotspots in the network, in this study we propose a novel analytical model to analyze the mean message latency in wormhole-switched hypermesh in the presence... 

    The treatment of uncertainty in the dynamic origin–destination estimation problem using a fuzzy approach

    , Article Transportation Planning and Technology ; Volume 38, Issue 7 , 2015 , Pages 795-815 ; 03081060 (ISSN) Talebian, A ; Shafahi, Y ; Sharif University of Technology
    Routledge  2015
    Abstract
    Regardless of existing types of transportation and traffic model and their applications, the essential input to these models is travel demand, which is usually described using origin–destination (OD) matrices. Due to the high cost and time required for the direct development of such matrices, they are sometimes estimated indirectly from traffic measurements recorded from the transportation network. Based on an assumed demand profile, OD estimation problems can be categorized into static or dynamic groups. Dynamic OD demand provides valuable information on the within-day fluctuation of traffic, which can be employed to analyse congestion dissipation. In addition, OD estimates are essential... 

    Traffic pattern detection using topic modeling for speed cameras based on big data abstraction

    , Article Transportation Letters ; 2020 Gholampour, I ; Mirzahossein, H ; Chiu, Y. C ; Sharif University of Technology
    Taylor and Francis Ltd  2020
    Abstract
    The importance of traffic pattern prediction for traffic management systems has significantly increased in recent years. This paper presents a novel method to find unusual traffic patterns by using topic modeling. We have employed topic models to provide an abstraction of speed camera data from Tehran, the capital of Iran. In this methodology, topic modeling is applied to days of weeks and months in a year and extracts weekly and monthly traffic patterns. Analysis of the abstract descriptions and their adaptation to actual urban traffic patterns prove the effectiveness of the proposed method. The model training convergence is also practically verified. Based on our experiments, our method... 

    Traffic information use modeling in the context of a developing country

    , Article Periodica Polytechnica Transportation Engineering ; Volume 33, Issue 1-2 , 2005 , Pages 125-137 ; 03037800 (ISSN) Mamdoohi, A. R ; Kermanshah, M ; Sharif University of Technology
    Technical University of Budapest  2005
    Abstract
    The use of traffic information in the form of radio reports, as a solution to the problem of congestion, is one of the issues, which are of particular importance for large cities like Tehran. In this study, factors affecting the use of traffic information in the context of a developing country are examined for commuters in the city of Tehran using ordered logit models. Results based on the particular survey designed for this purpose are compared to those of a developed country. Regarding the use of information in the form of listening to the radio traffic reports, the models show that older commuters, commuters who adjust their departure time according to traffic conditions (those who are... 

    Traffic pattern detection using topic modeling for speed cameras based on big data abstraction

    , Article Transportation Letters ; Volume 14, Issue 4 , 2022 , Pages 339-346 ; 19427867 (ISSN) Gholampour, I ; Mirzahossein, H ; Chiu, Y. C ; Sharif University of Technology
    Taylor and Francis Ltd  2022
    Abstract
    The importance of traffic pattern prediction for traffic management systems has significantly increased in recent years. This paper presents a novel method to find unusual traffic patterns by using topic modeling. We have employed topic models to provide an abstraction of speed camera data from Tehran, the capital of Iran. In this methodology, topic modeling is applied to days of weeks and months in a year and extracts weekly and monthly traffic patterns. Analysis of the abstract descriptions and their adaptation to actual urban traffic patterns prove the effectiveness of the proposed method. The model training convergence is also practically verified. Based on our experiments, our method... 

    A Protocol to Improve Privacy and Security of Anonymity Networks

    , M.Sc. Thesis Sharif University of Technology Soltani, Mahdi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In recent two decades, different anonymous communication systems has been proposed. These systems are interested by journalists, bank employees, military forces, and human rights advocates. Tor is one of the most popular anonymous communication systems. Tor uses onion routing for privacy preserving. Re-cently, many attacks has been introduced against the anonymity of Tor users.In these attacks entry and exit nodes are compromised. One of these malicious nodes, makes the attack on the intented flow and the other one recognizes the flow. All these attacks admit their vulnerability against dummy messages. They state that, because of dynamics of onion’s keys, any dummy injection will dis-turb... 

    Encrypted Traffic Analysis of a Messaging Service

    , M.Sc. Thesis Sharif University of Technology Alimadadi, Zahra (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Nowadays, with the increasing growth of internet’s speed and accessibility, and the explosion of potentials and services that smartphone applications offer, smartphones have become an inseparable part of most people's lives. At the same time, free messenger applications attract lots of people since they reduce costs, increase speed, and make communication much easier, in a way that almost all smartphone users utilize at least one of these messaging services. Moreover, the emerging use of messaging services has triggered privacy concerns and personal data treatment for users. In recent years, lots of studies focused on identifying users’ activities on the encrypted traffic, mostly with the... 

    A comparative performance analysis of n-cubes and star graphs

    , Article 20th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2006, 25 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 1424400546 (ISBN); 9781424400546 (ISBN) Kiasari, A.E ; Sarbazi Azad, H ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Many theoretical-based comparison studies, relying on the graph theoretical viewpoints with using structural and algorithmic properties, have been conducted for the hypercube and the star graph. None of these studies, however, considered real working conditions and implementation limits. We have compared the performance of the star and hypercube networks for different message length and virtual channels and considered two implementation constraints, namely the constant bisection bandwidth and constant node pin-out. We use two accurate analytical models already proposed for the star graph and hypercube and implement the parameter changes imposed by technological implementation constraints....