• Title/Summary/Keyword: Cloud Traffic

Search Result 148, Processing Time 0.022 seconds

Analysis of the Unstructured Traffic Report from Traffic Broadcasting Network by Adapting the Text Mining Methodology (텍스트 마이닝을 적용한 한국교통방송제보 비정형데이터의 분석)

  • Roh, You Jin;Bae, Sang Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.3
    • /
    • pp.87-97
    • /
    • 2018
  • The traffic accident reports that are generated by the Traffic Broadcasting Networks(TBN) are unstructured data. It, however, has the value as some sort of real-time traffic information generated by the viewpoint of the drives and/or pedestrians that were on the roads, the time and spots, not the offender or the victim who caused the traffic accidents. However, the traffic accident reports, which are big data, were not applied to traffic accident analysis and traffic related research commonly. This study adopting text-mining technique was able to provide a clue for utilizing it for the impacts of traffic accidents. Seven years of traffic reports were grasped by this analysis. By analyzing the reports, it was possible to identify the road names, accident spot names, time, and to identify factors that have the greatest influence on other drivers due to traffic accidents. Authors plan to combine unstructured accident data with traffic reports for further study.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

Cloud monitoring system for assembled beam bridge based on index of dynamic strain correlation coefficient

  • Zhao, Yiming;Dan, Danhui;Yan, Xingfei;Zhang, Kailong
    • Smart Structures and Systems
    • /
    • v.26 no.1
    • /
    • pp.11-21
    • /
    • 2020
  • The hinge joint is the key to the overall cooperative working performance of the assembled beam bridge, and it is also the weakest part during the service period. This paper proposes a method for monitoring and evaluating the lateral cooperative working performance of fabricated beam bridges based on dynamic strain correlation coefficient indicator. This method is suitable for monitoring and evaluation of hinge joints status between prefabricated girders and overall cooperative working performance of bridge, without interruption of traffic and easy implementation. The remote cloud monitoring and diagnosis system was designed and implemented on a real assembled beam bridge. The algorithms of data preprocessing, online indicator extraction and status diagnosis were given, and the corresponding software platform and scientific computing environment for cloud operation were developed. Through the analysis of real bridge monitoring data, the effectiveness and accuracy of the method are proved and it can be used in the health monitoring system of such bridges.

Security Enhancement through Comparison of Domestic and Overseas Cloud Security Policies (국내외 클라우드 보안 정책 비교를 통한 보안 강화 연구)

  • Lee, Sangwoong;Park, Moonhyung;Lee, Seon-a;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.268-270
    • /
    • 2021
  • Since the recent COVID-19 pandemic, Internet usage has increased rapidly and companies have shifted to telecommuting. In addition, as more time at home increases and network traffic through streaming services such as games, the Internet, and Netflix increases, cyberattacks and threats are also increasing. Many countries around the world, including Korea, the US, China, and Japan, have various cloud security policies, but they continue to suffer from various vulnerabilities and cyberattacks. This paper analyzes the current cloud security policies of each country and presents a plan to strengthen the cloud security policies in Korea.

  • PDF

A Study on the Role of Vessel Traffic Service System (해상교감관별 시스템의 지리적 후문에 관한 연구)

  • 이학선
    • Journal of the Korean Institute of Navigation
    • /
    • v.20 no.3
    • /
    • pp.43-63
    • /
    • 1996
  • The purpose of this study is to find out what is the functional role of VTS in order to get the people concerned with marine traffic/transportation understand about VTS. VTS could be described as the essential risk management system in both cost effective on cost-benefit analysis and the sea space or time management at port, coastal environment. The important role of the VTS are those functions such as the decision making infrastructure, the passive/active safety measures at sea. VTS could not control/regulate marine traffic as strong as ATC(Air Traffic Control) owing to the marine traffic characters. However, the right and responsibility of VTS finally are belong to the master, pilot and mariners. For the benefit of the electronic technology development, VTS system also cloud be upgraded to communication system from information system. In connection with these system upgrading, the right and responsibility of VTS/staff should be supported by domestic legal system. The followings are presented for VTS to be effective. First, the cooperation and understanding of VTS between the peoples concerned with marine traffic/transportation are essential. Because they are all data supplier and also information consumers. Second, VTS staff/regulator should be selected, educated, trained accordingly as per their career, ability, quality, qualification, certification and etc. Third, the port reliability from VTS users depends on the factors such as economic interests, safety and effectiveness/efficiency of VTS.

  • PDF

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Bandwidth Analysis of Massively Multiplayer Online Games based on Peer-to-Peer and Cloud Computing (P2P와 클라우드 컴퓨팅에 기반한 대규모 멀티플레이어 온라인 게임의 대역폭 분석)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.143-150
    • /
    • 2019
  • Cloud computing has recently become an attractive solution for massively multiplayer online games(MMOGs), as it lifts operators from the burden of buying and maintaining hardware. Peer-to-peer(P2P) -based solutions present several advantages, including the inherent scalability, self-repairing, and natural load distribution capabilities. We propose a hybrid architecture for MMOGs that combines technological advantages of two different paradigms, P2P and cloud computing. An efficient and effective provisioning of resources and mapping of load are mandatory to realize an architecture that scales in economical cost and quality of service to large communities of users. As the number of simultaneous players keeps growing, the hybrid architecture relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. For MMOGs, besides server time, bandwidth costs represent a major expense when renting on-demand resources. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed hybrid architecture can reduce the bandwidth at the server while utilizing enough bandwidth of players.

Taxi Stand Approach Sequence Management System to reduce Traffic Jam and Congestion around Taxi Stand (택시 승강장 주변 교통 정체 및 혼잡 감소를 위한 승강장 진입 순번 운용 시스템)

  • Gu, Bongen;Lee, Kwondong;Lee, Sangtae
    • Journal of Platform Technology
    • /
    • v.6 no.1
    • /
    • pp.17-23
    • /
    • 2018
  • Taxi's queue for entering into taxi stand makes traffic jam and congestion around taxi stand. If we make that taxi waits in another place around taxi stand, and can approach to taxi stand when it gets in its turn, these traffic jam and congestion around taxi stand can be reduced. In this paper, we propose entry sequence operating system for taxi stand to reduce traffic jam and congestion around taxi stand. In this system, taxi driver can request his sequence number, and the system issues sequence number to driver. When it is time to approach to taxi stand due to issued sequence number, the proposed system notifies to taxi driver via taxi terminal. Taxi getting the proposed service can wait in another place around taxi stand, and can approach to taxi stand after receiving notify for approaching. Therefore, the proposed system in this paper can reduce traffic jam and congestion around taxi stand because it can reduce or get rid of taxi's queue around taxi stand. We implement the taxi stand approach sequence management system proposed in this paper for taxi stand installed in Chungju-Si, Chungbuk. We use Google Cloud service and Android platform for implementing.

Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT (IoT 기반의 브리지를 이용한 스마트 홈 클라우드 제어 시스템 설계 및 구현)

  • Hao, Xu;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.865-872
    • /
    • 2017
  • Recently, in response to the Internet age, the demand for hardware devices has been increasing, centering on the rapidly growing smart home field, due to the growth and management of sensor and control technology, mobile application, network traffic, big data management and cloud computing. In order to maintain the sustainable development of the hardware system, it is necessary to update the system, and the hardware device is absolutely necessary in real time processing of complex data (voice, image, etc.) as well as data collection. In this paper, we propose a method to simplify the control and communication method by integrating the hardware devices in two operating systems in a unified structure to solve the simultaneous control and communication method of hardware under different operating systems. The performance evaluation results of the proposed integrated hardware and the cloud control system connected to the cloud server are described and the main directions to be studied in the field of internet smart home are described.

IoT Collaboration System Based on Edge Computing for Smart Livestock System (스마트 축사를 위한 에지 컴퓨팅 기반 IoT 협업 시스템)

  • Ahn, Chi-Hyun;Lee, Hyungtak;Chung, Kwangsue
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.258-264
    • /
    • 2022
  • The smart farm for livestock, in which information and communication technology (ICT) is combined with livestock farm, is mostly based on the cloud computing paradigm. A cloud-based smart livestock farm has disadvantages such as increased response time, burden on cloud resource caused by the increased number of IoT sensors, traffic burden on the network, and lack of failure resilience mechanisms through collaboration with adjacent IoT devices. In this paper, with these problems in mind, we propose an IoT collaboration system based on edge computing. By using the relatively limited computing resources of the edge device to share the cloud's web server function, we aim to reduce the cloud's resources needed and improve response time to user requests. In addition, through the heartbeat-based failure recovery mechanism, IoT device failures were detected and appropriate measures were taken.