Home

Results 1 - 10 of 126,451 for Traffic keywords. Search took 1.003 seconds.  
Sort by date/Sort by relevance
They can only monitor the volume of traffic which is carried on base stations in limited areas, but cannot monitor the whole base stations in one point. Also through the common network management equipment, they cannot know which service generates the traffic and who uses the traffic. In conclusion, the existing methods cannot fully understand the whole situation of a mobile network. In addition, they are unproductive and inefficient at analysing the traffic. In mobile network planning, traditional methods generally calculate the quantity and capacity of base stations according to the population size of an area and the corresponding measurement of traffic, choosing the base station location according to the drive test results and customers' complaint records.
Language:English
Score: 1530160.5 - https://www.itu.int/en/publica.../files/basic-html/page324.html
Data Source: un
The keywords "is recommended" indicate a requirement which is recommended but which is not absolutely required. (...) A moving vehicle requires various capabilities including the support of networked vehicle services and applications such as road safety, traffic status, automatic toll road billing and emergency information. (...) Roadside station and central station (e.g., traffic information centre) are examples of elements within ITS infrastructure. 634 Rec.
Language:English
Score: 1523689.6 - https://www.itu.int/wftp3/Publ.../files/basic-html/page648.html
Data Source: un
Based on this, we further provide a traffic first few packets of a flow may contain visible information classification framework in which unlabeled traffic is like handshake details [2]. (...) It provides an end-to-end solution for encrypted Keywords – Deep learning, dynamic word embedding, traffic classification where the direct relationship between encrypted traffic classification, natural language raw traffic data and its categories is learned. (...) It encrypted traffic classification task. is susceptible to the port number changing and port disguise. 2) Deep packet inspection (DPI), a method which aims to locate patterns and keywords from traffic packets, is not suitable for identifying encrypted traffic because it heavily relies on unencrypted information. 3) The machine learning 978-92-61-31391-3/CFP2068P @ ITU 2020 – 143 – Kaleidoscope     196     197     198     199     200     201     202     203     204     205     206          
Language:English
Score: 1520771.6 - https://www.itu.int/en/publica.../files/basic-html/page201.html
Data Source: un
CASE LAW ON UNCITRAL TEXTS (CLOUT)
Typhoon Capital BV (26 January 2016) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Case 1653: MAL 35(2); 36(1)(a)(ii); 36(1)(b)(ii) — Canada: Superior Court of Justice of Ontario (First instance), 2015 ONSC 999, Depo Traffic v. Viked International (18 February 2015) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Case 1654: MAL 8(1); 9; 17 — Canada: Supreme Court of British Columbia (First instance) 2014 BCSC 2130, African Mixing Technologies Ltd v. (...) Abstracts on cases interpreting the UNCITRAL Model Law on Cross-Border Insolvency also include keyword references. The abstracts are searchable on the database available through the UNCITRAL web-site by reference to all key identifying features, i.e. (...) Case 1653: MAL 35(2), 36(1)(a)(ii), 36(1)(b)(ii) Canada: Superior Court of Justice of Ontario (First instance) 2015 ONSC 999 Depo Traffic v. Vikeda International 18 February 2015 Original in English Available at: http://canlii.ca/t/ggd2g Abstract prepared by Frédéric Bachand, National Correspondent, and Giacomo Marchisio [Keywords: award-recognition and enforcement; due process; public policy] The applicant, a Chinese company, sought the recognition and enforcement of an award rendered against a Canadian company further to an arbitration before the Shanghai International Arbitration Commission.
Language:English
Score: 1491025.6 - https://daccess-ods.un.org/acc...N.9/SER.C/ABSTRACTS/178&Lang=E
Data Source: ods
embeded-mod.mgp Security Protection of TDR Traffic Hiroyuki Ohno, Ph.D (hohno@ohnolab.org) Communications Research Laboratory, Japan Rapporteur Q10/SG17, ITU-T Security Protection of Telecommunications (1) Keywords: Trustness (Application) Authentication (Transpsort) QoS (Transport) Confidentiality (Network) Integrity (Network) Availability (Network) Security Protection of Telecommunications (2) Keywords: Auditing Security Policy ... Security Protection for "TDR Traffic" Requirement is almost as same as the "normal" situation but... (...) Security Protection for "TDR Traffic" How should we : organize authenticatoin ?
Language:English
Score: 1485785.4 - https://www.itu.int/itudoc/itu-t/workshop/ets/s8p3.pdf
Data Source: un
 Page 319 - Big data - Concept and application for telecommunications           Basic HTML Version Table of Contents View Full Version Page 319 - Big data - Concept and application for telecommunications P. 319 Big data - Concept and application for telecommunications 5 5.6 Recommendation ITU-T Y.3651 (12/2018), Big-data-driven networking – mobile network traffic management and planning Summary In a mobile network, a great deal of traffic data which reflects the real status of the mobile network and customers' actual experience is generated all the time. (...) In order to study related content, Recommendation ITU-T Y.3651 specifies some technology aspects related to big-data-driven networking – mobile network traffic management and planning. The scope of this Recommendation includes: requirements, framework, reference points, performance aspects and security considerations of big-data-driven networking – mobile network traffic management and planning. Keywords bDDN, mobile network traffic management, mobile network planning Network and infrastructure 311     314     315     316     317     318     319     320     321     322     323     324          
Language:English
Score: 1453224.4 - https://www.itu.int/en/publica.../files/basic-html/page319.html
Data Source: un
DAILY LIST : 4 - 6 MARCH 2005
NEAR-EARTH OBJECTS A C E F R S A/AC.105/C.1/L.281 AGENDA ITEM 8—USE OF NUCLEAR POWER SOURCES IN OUTER SPACE—INTERIM PROGRESS REPORT OF THE WORKING GROUP ON NUCLEAR POWER SOURCES IN OUTER SPACE: PLANNING AND TERMS OF REFERENCE FOR THE WORKSHOP TO BE ORGANIZED IN FEBRUARY 2006 DURING THE FORTY-THIRD SESSION OF THE SCIENTIFIC AND TECHNICAL SUBCOMMITTEE A C E F R S A/AC.105/C.1/ WGW/2005/L.1 DRAFT REPORT OF THE WORKING GROUP OF THE WHOLE A C E F R S ST/SG/SER.E/463 INFORMATION FURNISHED IN CONFORMITY WITH THE CONVENTION ON REGISTRATION OF OBJECTS LAUNCHED INTO OUTER SPACE—NOTE VERBALE DATED 5 JANUARY 2005 FROM THE PERMANENT MISSION OF JAPAN TO THE UNITED NATIONS (VIENNA) ADDRESSED TO THE SECRETARY-GENERAL A C E F R S ST/SG/SER.E/464 NOTE VERBALE DATED 14 JANUARY 2005 FROM THE PERMANENT MISSION OF THE RUSSIAN FEDERATION TO THE UNITED NATIONS (VIENNA) ADDRESSED TO THE SECRETARY-GENERAL A C E F R S ST/SG/SER.E/465 NOTE VERBALE DATED 20 JANUARY 2005 FROM THE PERMANENT MISSION OF THE UNITED STATES OF AMERICA TO THE UNITED NATIONS (VIENNA) ADDRESSED TO THE SECRETARY-GENERAL A C E F R S ST/SG/SER.E/466 NOTE VERBALE DATED 24 JANUARY 2005 FROM THE PERMANENT MISSION OF UKRAINE TO THE UNITED NATIONS (VIENNA) ADDRESSED TO THE SECRETARY-GENERAL A C E F R S - 2 - OFFICE OF LEGAL AFFAIRS A/CN.9/SER.C/ ABSTRACTS/44 UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW— CASE LAW ON UNCITRAL TEXTS (CLOUT) S A/CN.9/SER.C/ INDEX/5 UNCITRAL INDEX OF THE UNCITRAL MODEL LAW ON INTERNATIONAL COMMERCIAL ARBITRATION F A/CN.9/SER.C/ INDEX/5/Add.1 ADDENDUM: INDEXED BY MAL THESAURUS KEYWORD (PART 1) F A/CN.9/SER.C/ INDEX/5/Add.2 ADDENDUM: INDEXED BY MAL THESAURUS KEYWORD (PART 2) F A/CN.9/SER.C/ INDEX/5/Add.3 ARBITRATION ADDENDUM: INDEXED BY MAL THESAURUS KEYWORD (PART 3) F A/CN.9/SER.C/ INDEX/5/Add.4 ADDENDUM: INDEXED BY JURISDICTION AND DATE F UNITED NATIONS INTERNATIONAL DRUG CONTROL PROGRAMME E/CN.7/2005/5/Add.1 COMMISSION ON NARCOTIC DRUGS—FORTY-EIGHTH SESSION—VIENNA, 7-14 MARCH 2005—ITEM 6 (A) OF THE PROVISIONAL AGENDA—ILLICIT DRUG TRAFFIC AND SUPPLY: WORLD SITUATION WITH REGARD TO DRUG TRAFFICKING AND ACTION TAKEN BY THE SUBSIDIARY BODIES OF THE COMMISSION—ACTION TAKEN BY SUBSIDIARY BODIES OF THE COMMISSION ON NARCOTIC DRUGS—REPORT OF THE SECRETARIAT— ADDENDUM A F UNODC/HONEURO/ 2005/5 SIXTH MEETING OF HEADS OF NATIONAL DRUG LAW ENFORCEMENT AGENCIES, EUROPE—VIENNA, 7-11 FEBRUARY 2005—REPORT OF THE SIXTH MEETING OF HEADS OF NATIONAL DRUG LAW ENFORCEMENT AGENCIES, EUROPE, HELD IN VIENNA FROM 7 TO 11 FEBRUARY 2005 S
Language:English
Score: 1431976.8 - daccess-ods.un.org/acce...t?open&DS=DL/VN/2005/17&Lang=E
Data Source: ods
Identification is the process by which censors classify specific traffic to be blocked or impaired, i.e. the censor blocks or impairs all webpages containing "sex" in the title or traffic to sex.com. (...) Empirical examples: Iran is known to shape the bandwidth available to HTTPS traffic to encourage unencrypted HTTP traffic [ Aryan-2012 ]. 4.2 . Packet Dropping Packet dropping is a simple mechanism to prevent undesirable traffic. The censor identifies undesirable traffic and chooses to not properly forward any packets it sees associated with the traversing undesirable traffic instead of following a normal routing protocol.
Language:English
Score: 1424853.7 - https://www.ohchr.org/sites/de...communications/CDTPart_III.pdf
Data Source: un
Step 4: The cloud computing platform obtains the video stream from the corresponding camera, and then forwards the video stream to the CU. 6.2 Video transcoding The cloud computing platform in a VS system can support video-transcoding functions, e.g., code rate transformation and video format conversion. The traffic department of a city has deployed a large-scale VS system in the city streets with high-definition network cameras. Users want to view the current traffic situation on their way home with their mobile phones. Due to the limited bandwidth of mobile devices and mobile data traffic limits, high-definition surveillance video needs to be transcoded to low-resolution video before forwarding to the CU.
Language:English
Score: 1414984 - https://www.itu.int/en/publica.../files/basic-html/page771.html
Data Source: un
r=eyJrIjoiZGIwMWFhOGYtYmQxYi00ZjFjLWE2MGUtYzMxYTI2… Last updated on Sun, 12/31/2017 - 12:00 Related initiatives Trade & industry statistics Advanced traffic management systems in Palestinian cities Advanced traffic management systems in Palestinian cities fghorra Fri, 05/20/2022 - 16:07 The Ministry of Transport in the State of Palestine seeks to promote the transport industry in order to access an integrated, multi-modal transport system, advancing the Palestinian economy. (...) Intelligent Transport Systems (ITS) is a combination of leading-edge information and communication technologies used in transport and traffic management systems. In 2019 a national strategic framework for ITS in Palestine was prepared.  The workshop presents the components and implementation processes of advanced traffic management systems to the Palestinian Ministry of Transport team, benefitting from the experience of the establishment of the Traffic Control Center in Beirut.
Language:English
Score: 1404369 - https://www.unescwa.org/taxonomy/term/38/feed
Data Source: un