• Title/Summary/Keyword: Flow Detection

Search Result 1,241, Processing Time 0.031 seconds

A Study on the Spacing Distrubution based on Relative Speeds between Vehicles -Focused on Uninterrupted Traffic Flow- (차량간 상대속도에 따른 차두거리 분포에 관한 연구 -연속류 교통흐름을 중심으로-)

  • Ma, Chang-Young;Yoon, Tae-Kwan;Kim, Byung-Kwan
    • International Journal of Highway Engineering
    • /
    • v.14 no.2
    • /
    • pp.93-99
    • /
    • 2012
  • This study analyzes traffic data which are collected by VDS(Vehicle Detection System) to research the relationship between spacing distribution and vehicles' relative speed. The collected data are relative speed between preceding and following vehicles, passing time and speed. They are also classified by lane and direction. For the result of the analysis, in the same platoon, we figure out that mean of spacing is 40m, which can be a value to determine section A to D. To compare spacing according to time interval, this study splits time intervals to peak hour and non-peak hour by peak hour traffic volume. In conclusion, vehicles in peak hour are in car following because most drive similar speed as preceding vehicle and they have relatively small spacing. On the other hand, non-peak hour's spacing between vehicles is bigger than that of peak hour. This implies driver's behaviors that the less spacing, the more aggressive and want to reduce their travel time in peak hour, whereas most drive easily in non-peak hour and recreational trip purpose because of less time pressure.

Development of Rapid Detection Method for Volatilized Formaldehyde from Wood (목재 폼알데하이드 신속검출 공정개발)

  • Kim, Jung-Im;Choi, Geun-Hyoung;Kwon, Oh-Kyung;Hong, Su-Myeong;Park, Yun-Gi;Ok, Yong-Sik;Kim, Jin-Hyo
    • Journal of Applied Biological Chemistry
    • /
    • v.55 no.1
    • /
    • pp.55-59
    • /
    • 2012
  • We designed a new rapid detection method for volatilized formaldehyde from wood. The process was installed with volatilizing and collecting parts in an incubator. For rapid sampling of formaldehyde from wood, we pulverized the wood to sawdust, and used 0.15-2.0 mm particles for the tests. The highest sampling rate (94.8%) was obtained at 40 mL/min flow rate and $100^{\circ}C$. Under the optimized condition, we could collect the volatilized formaldehyde with good recovery rate. The developed method was applied to the monitoring of the formaldehyde from wood, and the measured concentrations were 0.7-4.6 ${\mu}g/g$ from natural wood, 5.9-12.3 ${\mu}g/g$ from preserved wood, and 5.9-211.5 ${\mu}g/g$ from chemical adhesive processed wood. From the results, we identified natural wood sawdust and chemically processed wood (medium density fiberboard, high density fiberboard, particle board) by the formaldehyde contents except preserved wood.

Dilated convolution and gated linear unit based sound event detection and tagging algorithm using weak label (약한 레이블을 이용한 확장 합성곱 신경망과 게이트 선형 유닛 기반 음향 이벤트 검출 및 태깅 알고리즘)

  • Park, Chungho;Kim, Donghyun;Ko, Hanseok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.5
    • /
    • pp.414-423
    • /
    • 2020
  • In this paper, we propose a Dilated Convolution Gate Linear Unit (DCGLU) to mitigate the lack of sparsity and small receptive field problems caused by the segmentation map extraction process in sound event detection with weak labels. In the advent of deep learning framework, segmentation map extraction approaches have shown improved performance in noisy environments. However, these methods are forced to maintain the size of the feature map to extract the segmentation map as the model would be constructed without a pooling operation. As a result, the performance of these methods is deteriorated with a lack of sparsity and a small receptive field. To mitigate these problems, we utilize GLU to control the flow of information and Dilated Convolutional Neural Networks (DCNNs) to increase the receptive field without additional learning parameters. For the performance evaluation, we employ a URBAN-SED and self-organized bird sound dataset. The relevant experiments show that our proposed DCGLU model outperforms over other baselines. In particular, our method is shown to exhibit robustness against nature sound noises with three Signal to Noise Ratio (SNR) levels (20 dB, 10 dB and 0 dB).

Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities (PHP 파일 삽입 취약성 검사를 위한 정적 분석기의 구현)

  • Ahn, Joon-Seon;Lim, Seong-Chae
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.193-204
    • /
    • 2011
  • Since web applications are accessed by anonymous users via web, more security risks are imposed on those applications. In particular, because security vulnerabilities caused by insecure source codes cannot be properly handled by the system-level security system such as the intrusion detection system, it is necessary to eliminate such problems in advance. In this paper, to enhance the security of web applications, we develop a static analyzer for detecting the well-known security vulnerability of PHP file inclusion vulnerability. Using a semantic based static analysis, our vulnerability analyzer guarantees the soundness of the vulnerability detection and imposes no runtime overhead, differently from the other approaches such as the penetration test method and the application firewall method. For this end, our analyzer adopts abstract interpretation framework and uses an abstract analysis domain designed for the detection of the target vulnerability in PHP programs. Thus, our analyzer can efficiently analyze complicated data-flow relations in PHP programs caused by extensive usage of string data. The analysis results can be browsed using a JAVA GUI tool and the memory states and variable values at vulnerable program points can also be checked. To show the correctness and practicability of our analyzer, we analyzed the source codes of open PHP applications using the analyzer. Our experimental results show that our analyzer has practical performance in analysis capability and execution time.

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

Detection of The Real-time Weather Information from a Vehicle Black Box (차량용 블랙박스 영상에서의 실시간 기상정보 검지)

  • Kang, Ju-mi;Lee, Jaesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.320-323
    • /
    • 2014
  • Today is going with the advancement of intelligent transportation systems and traffic environment and helping to provide safe and convenient service through a mobile device work with the popularization of the vehicle black box. The traffic flow by a variety of causes is constantly changing, it is often unable to prepare the driver, depending on external factors can not be controlled by the power of the public, leading to a major accident. The system needs to pass the real-time weather data in the inter-operator to prevent this. The proposed detection algorithm weather information delivered real-time weather information for this paper. The weather condition is detected by using the contrast between the histogram of the motion of the wiper and the clear day algorithm. In general, the wiper is worked in extreme weather conditions that will have a value different contrast due to rain or snow. Situation was considered clear, snowy conditions, such as using it on a rainy situation. First, designated as ROI (Region Of Interest) of the minimum area that can be detected in order to reduce the amount of calculation for the wiper, the wiper, which was detected through the operation of the threshold Thresholding the brightness of the vehicle wiper. In addition, we distinguish the value of each meteorological situation by using contrast. Results was obtained to 80% for the snow conditions, a rainy situation.

  • PDF

Application of Remote Sensing Technology for Developing REDD+ Monitoring Systems (REDD+ 모니터링 시스템 구축을 위한 원격탐사기술의 활용방안)

  • Park, Taejin;Lee, Woo-Kyun;Jung, Raesun;Kim, Moon-Il;Kwon, Tae-Hyub
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.3
    • /
    • pp.315-326
    • /
    • 2011
  • In recent years, domestic and international interests focus on climate change, and importance of forest as carbon sink have been also increased. Particularly REDD+ mechanism expanded from REDD (Reduced Emissions from Deforestation and Degradation) is expected to perform a new mechanism for reducing greenhouse gas in post 2012. To conduct this mechanism, countries which try to get a carbon credit have to certify effectiveness of their activities by MRV (Measuring, Reporting and Verification) system. This study analyzed the approaches for detecting land cover change and estimating carbon stock by remote sensing technology which is considered as the effective method to develop MRV system. The most appropriate remote sensing for detection of land cover change is optical medium resolution sensors and satellite SAR (Synthetic Aperture Radar) according to cost efficiency and uncertainty assessment. In case of estimating carbon stock, integration of low uncertainty techniques, airborne LiDAR (Light Detection and Ranging), SAR, and cost efficient techniques, optical medium resolution sensors and satellite SAR, could be more appropriate. However, due to absence of certificate authority, guideline, and standard of uncertainty, we should pay continuously our attention on international information flow and establish appropriate methods. Moreover, to apply monitoring system to developing countries, close collaboration and monitoring method reflected characteristics of each countries should be considered.

Numerical study on the foam spraying for AFDSS applicable to initial fire suppression in large underground spaces (지하대공간 초동 화재진압에 적용가능한 자율형 소화체계의 폼 분사 해석 기법 연구)

  • Park, Jinouk;Yoo, Yongho;Kim, Whiseong
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.6
    • /
    • pp.503-516
    • /
    • 2021
  • Autonomous fire detection and suppression system requires advanced technology for complex detection technology and injection/control technology for accurate hitting by fire location. Also, foam spraying should be included to respond to oil fires. However, when a single spray monitor is used in common, water and foam spray properties appear different, so for accurate fire suppression, research on the spray trajectory and distance will be required. In this study, experimental studies and numerical analysis studies were combined to analyze the foam spray characteristics through the spray monitor developed for the establishment of an autonomous fire extinguishing system. For flow analysis of foam injection, modeling was performed using OpenFOAM analysis software, and the commonly used foaming agent (Aqueous Film-Forming Foam) was applied for foam properties. The injection distance analysis was performed according to the injection pressure and the injection angle according to the form of the foam, and at the same time, the results were verified and presented through the injection experiment.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

Development of Left Turn Response System Based on LiDAR for Traffic Signal Control

  • Park, Jeong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.181-190
    • /
    • 2022
  • In this paper, we use a LiDAR sensor and an image camera to detect a left-turning waiting vehicle in two ways, unlike the existing image-type or loop-type left-turn detection system, and a left-turn traffic signal corresponding to the waiting length of the left-turning lane. A system that can efficiently assign a system is introduced. For the LiDAR signal transmitted and received by the LiDAR sensor, the left-turn waiting vehicle is detected in real time, and the image by the video camera is analyzed in real time or at regular intervals, thereby reducing unnecessary computational processing and enabling real-time sensitive processing. As a result of performing a performance test for 5 hours every day for one week with an intersection simulation using an actual signal processor, a detection rate of 99.9%, which was improved by 3% to 5% compared to the existing method, was recorded. The advantage is that 99.9% of vehicles waiting to turn left are detected by the LiDAR sensor, and even if an intentional omission of detection occurs, an immediate response is possible through self-correction using the video, so the excessive waiting time of vehicles waiting to turn left is controlled by all lanes in the intersection. was able to guide the flow of traffic smoothly. In addition, when applied to an intersection in the outskirts of which left-turning vehicles are rare, service reliability and efficiency can be improved by reducing unnecessary signal costs.