2023
DOI: 10.1016/j.compeleceng.2023.108740
|View full text |Cite
|
Sign up to set email alerts
|

Supervised machine learning for jamming transition in traffic flow with fluctuations in acceleration and braking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…In addition, machine learning approaches can be optimized and computationally efficient, allowing researchers to make accurate predictions and successfully solve complex problems in a timely and reliable manner. Some possible applications of machine learning algorithms include the transition of disturbances due to changes in braking and acceleration in traffic flows 25 , heat transfer in a micropolar fluid with isothermal and isoflux boundary conditions 26 , stiffness solutions for polytropic. gas spheres and electric circuit models 27 , linearization of circular sector oscillator inelastic vibration analysis 28 and inclined longitudinal porous trapezoidal and rectangular trapezoidal fin heat transfer analysis.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, machine learning approaches can be optimized and computationally efficient, allowing researchers to make accurate predictions and successfully solve complex problems in a timely and reliable manner. Some possible applications of machine learning algorithms include the transition of disturbances due to changes in braking and acceleration in traffic flows 25 , heat transfer in a micropolar fluid with isothermal and isoflux boundary conditions 26 , stiffness solutions for polytropic. gas spheres and electric circuit models 27 , linearization of circular sector oscillator inelastic vibration analysis 28 and inclined longitudinal porous trapezoidal and rectangular trapezoidal fin heat transfer analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is crucial to identify them at the right moment and stop them from spreading to a wider group in order to maintain social peace and the status quo of law and order. Unapproved or shady computer or network activity is discovered and reported using intrusion detection systems (IDSs) [11,12] using machine learning techniques (ML) [13,14]. Whereas client-based IDSs, the focus of this research, are designed to monitor client system operations, network-based IDSs are used to analyze network traffic across multiple clients.…”
mentioning
confidence: 99%