• Title/Summary/Keyword: Detour Route

Search Result 29, Processing Time 0.032 seconds

Packet switched WDM backbone network designing regarding detour route (대체 경로를 고려한 패킷교환 방식의 WOM 기간망 설계ml 대한 연구)

  • 이순화;김경민;김장복
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.247-250
    • /
    • 2002
  • It is predicted that the existing backbone network has encountered its limit due to massive growth in data traffic. Perhaps new WDM methods utilizing optical fibers are desirable. Also to assure reliance of the network detour routes fur collision recovery must be considered. But due to the redundancy occurred by allocating bandwidths to the detour route, the efficiency of the link my decline. In this paper, we designed a detour route to minimize the redundancy.

  • PDF

Detour Behavior on the Expressway using Route Travel Data (경로형 통행데이터 기반 고속도로 우회행태 분석)

  • Lee, Sujin;Son, Sanghoon;Kim, Hyungjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.58-70
    • /
    • 2020
  • Detour behavior on the expressway means that the driver uses the local road by passing the part of the expressway which is stagnant at the time of the traffic demand such as holidays. Since the detour rate was estimated through the survey at toll gate in the past, there was a difficulty in estimating the actual detour rate due to the small sample of the survey. In this study, we use DSRC-based route travel data to conduct empirical studies on detour patterns such as the estimation of actual detour rate, the improvement of travel time using detour road, and the correlation between traffic conditions on the expressway and detour rate. On the day of Chuseok and the day before Chuseok, the analysis of Giheung-DongtanIC→OsanIC and Seopyeongtaek IC→Walgott JC showed that the use of detour roads increased gradually during the congestion of the main line and travel time reduced when using detour roads, However, when the traffic congestion of the main line is not severe, the travel time increases when using the detour roads. The correlation between the traffic condition of the expressway and the actual detour rate has a negative correlation, which is consistent with the congestion pattern of the main line. The results of this study can be used to overcome limitations of detour pattern research based on surveys in the past and to establish a detour strategy for expressway sections where traffic demand is concentrated.

Comparative Analysis of Cosmic Radiation Exposure Dose Due to the Russian Detour Route

  • Hee-Bok Ahn;Jaeyoung Kwak;Junga Hwang
    • Journal of Astronomy and Space Sciences
    • /
    • v.40 no.2
    • /
    • pp.59-66
    • /
    • 2023
  • Since the World Health Organization (WHO) officially announced a global pandemic on March 12, 2020, the aviation industry in the world has been experiencing difficulties for a long time. Meanwhile, the Ukraine war broke out in February, and from March 15, domestic airlines must operate air routes bypassing Russian airspace despite the longer flight time. Therefore, as the flight time increases, the cosmic radiation exposure dose of the crew members is also expected to increase. Here we compare the radiation exposure dose between the route doses for the eastern United States and Europe before and after the detour route usage. Through the comparison analysis, we tried to understand how cosmic radiation changes depending on the flight time and the latitude and which one contributes more. We expect that this study can be used for the policy update for the safety management of cosmic radiation for aircrews in Korea.

Development of Detour Route and Evacuation Route Guidance System Using Disaster Information (재해정보를 이용한 우회경로 및 대피경로 안내시스템 개발)

  • Kwon, Won-Seok;Kim, Chang-Soo;Kim, Young-Seup
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2012
  • Life and Property damage has increased during traffic congestion and isolation because natural disasters such as flood and landslide have occurred every year. When disaster occurs, if there is insufficient information in advance when entering the flooding areas which subsequently cause confusion. In this paper, we developed the system that could provide display of detour route using disaster information and evacuation route in disaster areas. User will receive result of analysis using smart phone application to prevent additional damages when disaster areas were entered by manager.

Strategies for Providing Detour Route Information and Traffic Flow Management for Flood Disasters (수해 재난 시 우회교통정보 제공 및 교통류 관리전략)

  • Sin, Seong-Il;Jo, Yong-Chan;Lee, Chang-Ju
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.33-42
    • /
    • 2007
  • This research proposes strategies about providing detour route information and traffic management for flood disasters. Suggested strategies are based on prevention and preparation concepts including prediction, optimization, and simulation in order to minimize damage. Specifically, this study shows the possibility that average travel speed is increased by proper signal progression during downpours or heavy snowfalls. In addition, in order to protect the drivers and vehicles from dangerous situations, this study proposes a route guidance strategy based on variational inequalities such as flooding. However, other roads can have traffic congestion by the suggested strategies. Thus, this study also shows the possibility to solve traffic congestion of other roads in networks with emergency signal modes.

Drivers Detour Decision Factor Analysis with Combined Method of Decision Tree and Neural Network Algorithm (의사결정나무와 신경망 모형 결합에 의한 운전자 우회결정요인 분석)

  • Kang, Jin-Woong;Kum, Ki-Jung;Son, Seung-Neo
    • International Journal of Highway Engineering
    • /
    • v.13 no.3
    • /
    • pp.167-176
    • /
    • 2011
  • This study's purpose is to analyse factors of determination about detouring for makinga standard model in regard of unfavorableness and uncertainty when unspecified individual recipients make a decision at the time of course detour. In order to achieve this, we surveyed SP investigation whether making a detour or not for drivers as a target who take a high way and National highway. Based on this result, we analysed detour determination factors of drivers, establishing a combination model of Decision Tree and Neural Network model. The result demonstrates the effected factors on drivers' detour determination are in ordering of the recognition of alternative routevs, reliable and frequency of using traffic information, frequency of transition routes and age. Moreover, from the outcome in comparison with an existing model and prediction through undistributed data, the rate of combination model 8.7% illustrates the most predictable way in contrast with logit model 12.8%, and Individual Model of Decision Tree 13.8% which are existed. This reveals that the analysis of drivers' detour determination factors is valid to apply. Hence, overall study considers as a practical foundation to make effective detour strategies for increasing the utility of route networking and dispersion in the volume of traffic from now on.

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

  • Borisov, Nikita;Klonowski, Marek;Kutylowski, Miroslaw;Lauks-Dutka, Anna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.380-399
    • /
    • 2010
  • In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present modifications to the ModOnion protocol that dramatically reduce the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.

Indirect Cost Effects on Life-Cycle-Cost Effective Optimum Design of Steel Box Girder Bridge (강상자형교의 LCC 최적설계에 미치는 간접비용의 영향)

  • Lee, Kwang Min;Cho, Hyo Nam;Cha, Chul Jun;Eom, In Su
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.2 s.75
    • /
    • pp.115-130
    • /
    • 2005
  • This paper presents the effects of indirect costs on Life-Cycle-Cost(LCC) effective optimum design of steel-box girder bridges. The LCC formulations considered in the LCC optimization of the bridges consist of initial cost and expected rehabilitation costs including repair/replacement costs, loss of contents or fatality and injury losses, and indirect costs such as road user costs and indirect socio-economic losses. To demonstrate the LCC-effectiveness for optimum design of the bridges, an actual steel box girder bridge having two continuous spans(2@50m=100m) is considered as a numerical example. And also, in this paper, various sensitivity analyses are performed to investigate the effects of indirect costs caused by traffic conditions such as number of detour route, number of lane on detour route, length of detour route, and traffic volumes on the LCC-effective optimum design. From the numerical investigations, it may be concluded that indirect costs caused by traffic network may sensitively influence on the LCC-effective optimum design of steel-box girder bridges. Therefore, it may be stated that the traffic conditions should be considered as one of the important items in the LCC-effective optimum design of the bridges.

Development of a Model for Dynamic Station Assignmentto Optimize Demand Responsive Transit Operation (수요대응형 모빌리티 최적 운영을 위한 동적정류장 배정 모형 개발)

  • Kim, Jinju;Bang, Soohyuk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.17-34
    • /
    • 2022
  • This paper develops a model for dynamic station assignment to optimize the Demand Responsive Transit (DRT) operation. In the process of optimization, we use the bus travel time as a variable for DRT management. In addition, walking time, waiting time, and delay due to detour to take other passengers (detour time) are added as optimization variables and entered for each DRT passenger. Based on a network around Anaheim, California, reserved origins and destinations of passengers are assigned to each demand responsive bus, using K-means clustering. We create a model for selecting the dynamic station and bus route and use Non-dominated Sorting Genetic Algorithm-III to analyze seven scenarios composed combination of the variables. The result of the study concluded that if the DRT operation is optimized for the DRT management, then the bus travel time and waiting time should be considered in the optimization. Moreover, it was concluded that the bus travel time, walking time, and detour time are required for the passenger.

A Study on Efficient Routing and Authentication Scheme in Ad-Hoc Environment (Ad-Hoc환경에서 효율적인 라우팅 및 인증 기술에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1121-1128
    • /
    • 2008
  • Ad-Hoc network is consisted with the device of wireless communication. Therefore, the organization of network is dynamic and the changing communication channel is essential. According this, the study of secure routing route and certification technique has to be needed. In we research, we suggest not only the secure routing scheme in Ad-Hoc circumstance but also the method that user can be serviced the type of network which is connected Ad-Hoc network and wireless lam. In case of the routing form of Ad-Hoc Network, although in preexist study, when the device of organization withdraws, routing is needed, in we research, we suggest the detour route that is used hop frequency. We can offer the service of ubiquitous that the certification of secure user and the creation of routing route in Ad-Hoc network.

  • PDF