• Title/Summary/Keyword: Application Traffic

Search Result 1,298, Processing Time 0.034 seconds

The Application of a Microwave Sensor for Traffic Signal Control on Urban Arterial (도시간선도로상에서 교통신호제어를 위한 초단파 검지기(RTMS)의 적용성에 관한 연구)

  • 오영태;오영태
    • Journal of Korean Society of Transportation
    • /
    • v.13 no.4
    • /
    • pp.133-151
    • /
    • 1995
  • The collective of highly reliable traffic data is necessary for traffic signal control. This study is to test application of RTMS sensor to traffic signal control. In order to find out the possibility of its application th traffic signal control, 5 types of experiments were performed. The major findings are as follows ; -The detection are a has been changing according to degree and gain. -At the results of experiments for interference are a measure, Degree 60 is stable condition. -At the results of reliability test for volume and speed. the error rate decreases as speed increases and that of Zone 1 is lower than that of Zone 3. -Two modes are set up for reliability test of traffic volume. It founds that the detection reliability of the stopped vehicles are higher than that of the passing vehicles at sidefire-intersection mode. It founds that the results are vice-versa at sidefire-highway mode. Conclusively, this sensor cannot directly apply to colection of traffic data for traffic signal control. However, this sensor can be substituted for a loop detector which is used popularly for signal control, and freeway traffic control if above faults are made up.

  • PDF

Fixed IP-port based Application-Level Internet Traffic Classification (고정 IP-port 기반 응용 레벨 인터넷 트래픽 분석에 관한 연구)

  • Yoon, Sung-Ho;Park, Jun-Sang;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.205-214
    • /
    • 2010
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic classification becomes important for the effective use of network resources. In this paper, we present an application traffic classification method based on fixed IP-port information. A fixed IP-port is a {IP address, port number, transport protocol}triple dedicated to only one application, which is automatically collected from the behavior analysis of individual applications. We can classify the Internet traffic more accurately and quickly by simple packet header matching to the collected fixed IP-port information. Therefore, we can construct a lightweight, fast, and accurate real-time traffic classification system than other classification method. In this paper we propose a novel algorithm to extract the fixed IP-port information and the system architecture. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Multi-Level based Application Traffic Classification Method (멀티 레벨 기반의 응용 트래픽 분석 방법)

  • Oh, Young-Suk;Park, Jun-Sang;Yoon, Sung-Ho;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1170-1178
    • /
    • 2010
  • Recently as the number of users and application traffic is increasing on high speed network, the importance of application traffic classification is growing more and more for efficient network resource management. Although a number of methods and algorithms for traffic classification have been introduced, they have some limitations in terms of accuracy and completeness. In this paper we propose an application traffic classification based multi-level architecture which integrates several signature-based methods and behavior algorithm, and analyzes traffic using correlation among traffic flows. By strengthening the strength and making up for the weakness of individual methods we could construct a flexible and robust multi-level classification system. Also, by experiments with our campus network traffic we proved the performance and validity of the proposed mechanism.

A Development of Traffic Safety Education Application Using Mixed Reality (혼합현실을 활용한 교통 안전교육 애플리케이션 개발)

  • Kim, Kang-Ho;Rhee, Dae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1602-1608
    • /
    • 2019
  • In this study, we developed a "Zetton Children's Traffic Safety Education" application using mixed reality to help children experience a variety of traffic situations indirectly and to help them defend themselves from accidents. We analyze the types of high mortality child traffic accidents to set learning goal. And we developed the experience-oriented contents that players could acquire signal systems and traffic information naturally and funny in the course of playing scenarios according to designed various traffic situations. In order to verify the educational effectiveness of the developed application, children were given traffic safety education through after-school education activities. The result shows that the frequency of right answers to questions related to traffic safety awareness and learning objectives is increased.

A Study on the Application of Glow Line Marking Technology Development for Reducing Traffic Accidents at Nighttime (도로의 야간 교통사고 저감을 위한 야광형 포장노면표시 기술개발의 적용성 연구)

  • Lee, Yong Mun;Kim, Heung Rae;Kim, Sang Tae
    • International Journal of Highway Engineering
    • /
    • v.17 no.3
    • /
    • pp.59-68
    • /
    • 2015
  • PURPOSES : This study suggests the application of glow line marking technology for reducing traffic accidents at nighttime. METHODS : In this study, using a statistical analysis, we analyzed the characteristics of traffic accidents occurring at nighttime. Next, the strength, weakness, opportunity, and threat (SWOT) factors were derived based on a current-status analysis of glow line marking technology and road environments. An SO strategy, ST strategy, WO strategy, and WT strategy were established in accordance with the four SWOT factors. RESULTS : This study suggests that the following strategies should be promoted to apply glow line marking technology to a road environment: 1) an activation strategy for the technological development of glow line markings for a new paradigm in reducing traffic accidents, 2) a benefit enhancement strategy applying glow line marking technology in places where nighttime traffic accidents frequently occur, 3) a strategy for the expansion of glow line marking by replacing streetlights, and 4) a strategy for enhancing road applications through the development of various line marking methods in consideration of both performance and costs. CONCLUSIONS : The application of glow line markings in a road environment can contribute to a reduction of traffic accidents at nighttime, and aid energy savings from the replacement of streetlights.

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

STUDY ON DESIGN AND APPLICATION FOR TRAFFIC THEMATIC MAP LEVEL 1 DATA

  • Kim, Soo-Ho;Ahn, Ki-Seok;Kim, Moon-Gie
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.262-265
    • /
    • 2008
  • We design level 1 traffic thematic map for common data structure. Level 1 means the road that can passing cars. If public office and private company use this form, they can save amount of money from overlapping update. And widely use of traffic analysis, navigation and traffic information system. For design common data structure we compared several data structure(traffic thematic map, ITS standard node/link, Car navigation map), and generalization these characteristic data. After generalization we considered about application parts. It can use of public part(traffic analysis, road management, accident management) and private part(car navigation, map product, marketing by variable analysis) etc.

  • PDF

Three Degrees of Freedom Global Calibration Method for Measurement Systems with Binocular Vision

  • Xu, Guan;Zhang, Xinyuan;Li, Xiaotao;Su, Jian;Lu, Xue;Liu, Huanping;Hao, Zhaobing
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.107-117
    • /
    • 2016
  • We develop a new method to globally calibrate the feature points that are derived from the binocular systems at different positions. A three-DOF (degree of freedom) global calibration system is established to move and rotate the 3D calibration board to an arbitrary position. A three-DOF global calibration model is constructed for the binocular systems at different positions. The three-DOF calibration model unifies the 3D coordinates of the feature points from different binocular systems into a unique world coordinate system that is determined by the initial position of the calibration board. Experiments are conducted on the binocular systems at the coaxial and diagonal positions. The experimental root-mean-square errors between the true and reconstructed 3D coordinates of the feature points are 0.573 mm, 0.520 mm and 0.528 mm at the coaxial positions. The experimental root-mean-square errors between the true and reconstructed 3D coordinates of the feature points are 0.495 mm, 0.556 mm and 0.627 mm at the diagonal positions. This method provides a global and accurate calibration to unity the measurement points of different binocular vision systems into the same world coordinate system.

A New Class-Based Traffic Queue Management Algorithm in the Internet

  • Zhu, Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.575-596
    • /
    • 2009
  • Facing limited network resources such as bandwidth and processing capability, the Internet will have congestion from time to time. In this paper, we propose a scheme to maximize the total utility offered by the network to the end user during congested times. We believe the only way to achieve our goal is to make the scheme application-aware, that is, to take advantage of the characteristics of the application. To make our scheme scalable, it is designed to be class-based. Traffic from applications with similar characteristics is classified into the same class. We adopted the RED queue management mechanism to adaptively control the traffic belonging to the same class. To achieve the optimal utility, the traffic belonging to different classes should be controlled differently. By adjusting link bandwidth assignments of different classes, the scheme can achieve the goal and adapt to the changes of dynamical incoming traffic. We use the control theoretical approach to analyze our scheme. In this paper, we focus on optimizing the control on two types of traffic flows: TCP and Simple UDP (SUDP, modeling audio or video applications based on UDP). We derive the differential equations to model the dynamics of SUDP traffic flows and drive stability conditions for the system with both SUDP and TCP traffic flows. In our study, we also find analytical results on the TCP traffic stable point are not accurate, so we derived new formulas on the TCP traffic stable point. We verified the proposed scheme with extensive NS2 simulations.