Map Enhanced Route Travel Time Prediction using Deep Neural Networks
Authors:
Soumi Das,
Rajath Nandan Kalava,
Kolli Kiran Kumar,
Akhil Kandregula,
Kalpam Suhaas,
Sourangshu Bhattacharya,
Niloy Ganguly
Abstract:
Travel time estimation is a fundamental problem in transportation science with extensive literature. The study of these techniques has intensified due to availability of many publicly available large trip datasets. Recently developed deep learning based models have improved the generality and performance and have focused on estimating times for individual sub-trajectories and aggregating them to p…
▽ More
Travel time estimation is a fundamental problem in transportation science with extensive literature. The study of these techniques has intensified due to availability of many publicly available large trip datasets. Recently developed deep learning based models have improved the generality and performance and have focused on estimating times for individual sub-trajectories and aggregating them to predict the travel time of the entire trajectory. However, these techniques ignore the road network information. In this work, we propose and study techniques for incorporating road networks along with historical trips' data into travel time prediction. We incorporate both node embeddings as well as road distance into the existing model. Experiments on large real-world benchmark datasets suggest improved performance, especially when the train data is small. As expected, the proposed method performs better than the baseline when there is a larger difference between road distance and Vincenty distance between start and end points.
△ Less
Submitted 6 November, 2019;
originally announced November 2019.
Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security
Authors:
Srikanth Bethu,
K Kanthi Kumar,
MD Asrar Ahmed,
S. Soujanya
Abstract:
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet…
▽ More
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously.so we discuss their comparisons and performance evaluation of Packet Loss, Comparisons over Lossy Channels, Comparisons of Signature Schemes, computationational overheads etc.
△ Less
Submitted 23 November, 2013;
originally announced November 2013.