• Title/Summary/Keyword: Generated traffic

Search Result 442, Processing Time 0.03 seconds

Impact Effects of Multi-Girder Steel Bridges Under Various Traffic Conditions (차량하중에 의한 다주형 강판형교의 충격계수 변화에 관한 연구)

  • 김상효;허진영
    • Computational Structural Engineering
    • /
    • v.10 no.3
    • /
    • pp.233-240
    • /
    • 1997
  • The study presents the linear dynamic analysis of multi-girder steel bridges under vehicular movement to examine the performance characteristics due to the various structural and loading conditions. The road surface roughness and bridge-vehicle interactions are considered. The road surface profiles for the approaching roadway and bridge decks are generated from power spectral density functions for different road roughness conditions. A new filtering method using the wheel trace is proposed to obtain the more rational bridge-vehicle interactions from the randomly generated road surface. The possible settlement condition between the bridge deck and approaching roadway is also included. The dynamic responses of various bridges designed according to current design practice are examined, in which important structural parameters(such as span length, girder spacing, etc.) are considered systematically. In addition to the basic loading conditions due to a single truck passing on the bridge, the traffic conditions of multi-truck traveling either consecutively on the same lane or side-by-side on the adjacent lanes are also evaluated.

  • PDF

Performance Comparison of Machine Learning Algorithms for Network Traffic Security in Medical Equipment (의료기기 네트워크 트래픽 보안 관련 머신러닝 알고리즘 성능 비교)

  • Seung Hyoung Ko;Joon Ho Park;Da Woon Wang;Eun Seok Kang;Hyun Wook Han
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.99-108
    • /
    • 2023
  • As the computerization of hospitals becomes more advanced, security issues regarding data generated from various medical devices within hospitals are gradually increasing. For example, because hospital data contains a variety of personal information, attempts to attack it have been continuously made. In order to safely protect data from external attacks, each hospital has formed an internal team to continuously monitor whether the computer network is safely protected. However, there are limits to how humans can monitor attacks that occur on networks within hospitals in real time. Recently, artificial intelligence models have shown excellent performance in detecting outliers. In this paper, an experiment was conducted to verify how well an artificial intelligence model classifies normal and abnormal data in network traffic data generated from medical devices. There are several models used for outlier detection, but among them, Random Forest and Tabnet were used. Tabnet is a deep learning algorithm related to receive and classify structured data. Two algorithms were trained using open traffic network data, and the classification accuracy of the model was measured using test data. As a result, the random forest algorithm showed a classification accuracy of 93%, and Tapnet showed a classification accuracy of 99%. Therefore, it is expected that most outliers that may occur in a hospital network can be detected using an excellent algorithm such as Tabnet.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

Auto-Analysis of Traffic Flow through Semantic Modeling of Moving Objects (움직임 객체의 의미적 모델링을 통한 차량 흐름 자동 분석)

  • Choi, Chang;Cho, Mi-Young;Choi, Jun-Ho;Choi, Dong-Jin;Kim, Pan-Koo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.36-45
    • /
    • 2009
  • Recently, there are interested in the automatic traffic flowing and accident detection using various low level information from video in the road. In this paper, the automatic traffic flowing and algorithm, and application of traffic accident detection using traffic management systems are studied. To achieve these purposes, the spatio-temporal relation models using topological and directional relations have been made, then a matching of the proposed models with the directional motion verbs proposed by Levin's verbs of inherently directed motion is applied. Finally, the synonym and antonym are inserted by using WordNet. For the similarity measuring between proposed modeling and trajectory of moving object in the video, the objects are extracted, and then compared with the trajectories of moving objects by the proposed modeling. Because of the different features with each proposed modeling, the rules that have been generated will be applied to the similarity measurement by TSR (Tangent Space Representation). Through this research, we can extend our results to the automatic accident detection of vehicle using CCTV.

  • PDF

Detection of Ship Movement Anomaly using AIS Data: A Study (AIS 데이터 분석을 통한 이상 거동 선박의 식별에 관한 연구)

  • Oh, Jae-Yong;Kim, Hye-Jin;Park, Se-Kil
    • Journal of Navigation and Port Research
    • /
    • v.42 no.4
    • /
    • pp.277-282
    • /
    • 2018
  • Recently, the Vessel Traffic Service (VTS) coverage has expanded to include coastal areas following the increased attention on vessel traffic safety. However, it has increased the workload on the VTS operators. In some cases, when the traffic volume increases sharply during the rush hour, the VTS operator may not be aware of the risks. Therefore, in this paper, we proposed a new method to recognize ship movement anomalies automatically to support the VTS operator's decision-making. The proposed method generated traffic pattern model without any category information using the unsupervised learning algorithm.. The anomaly score can be calculated by classification and comparison of the trained model. Finally, we reviewed the experimental results using a ship-handling simulator and the actual trajectory data to verify the feasibility of the proposed method.

Dynamic Channel Allocation and Channel Access Mechanism of Multimedia Traffic in the UTRA TDD Systems (UTRA TDD 시스템에서 멀티미디어 트래픽의 동적 채널 할당 및 채널 액세스 매커니즘)

  • 주용원;윤찬영;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.819-827
    • /
    • 2002
  • Personal mobile communication has been developed up to IMT-2000 which is called the third generation mobile communication. The first generation of personal mobile communication was analog cellular, the second was digital cellular, and the 2.5 generation was PCS. Before the third generation had been developed, the personal mobile communication service was focused mainly on the voice-oriented service. But, we can expect that multimedia service after the third generation system will be the core of the subject. T In this thesis, we propose a dynamic resource allocation algorithm in the UTRA TDD systems which can support the asymmetric traffic propensity and multimedia traffic. The proposed algorithm consists two sub-algorithms. One is the dynamic channel allocation method that determines the amount of bandwidth assigned between uplink and downlink according to resource allocation status list through asymmetric traffic propensity. The other is the channel access mechanism that assigns RU to bearer service generated in a cell. By simulation, the proposed dynamic resource allocation algorithm is proved to support asymmetric propensity of traffic and shows a better throughput for multimedia traffic.

A Study on Characteristics of On-Street Parking on Local Streets (국지도로의 노상주차 특성에 관한 연구)

  • Kim, Ki-Hyuk;Lee, Sang-Inn
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.33-40
    • /
    • 2004
  • This study aims to provide guidelines for the selection of on-street parking spot on local streets considering conditions of surrounding area and characteristics of traffic generation. This guideline provides the method which determine required roadway width for planning and design of local streets. It is necessary to identify factors for the location selection analysis. This research team selects 12 case study areas to investigate traffic environment on the sites for this analysis. Most of factors which influence on-street parking are found to have a qualitative data format except traffic volume and pedestrian movement data. Quantification theory II which is known to be suitable for qualitative analysis has been applied to identify the meaningful variables for dependent variable. In addition, discriminant analysis has performed to verify the correlation for each variable with hit ratio. Road width, traffic volume, street traders and their heavy packages, and illegally parked vehicle are found to be most significant factors for selection of on-street parking location. Therefore, it is necessary to consider traffic volume generated from massive residential complex and traffic volume for outside and above-mentioned factors for installation of on-street parking facility in the case of new road construction or road width widen.

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

A Fast Resource Reallocation Protocol (FRRP) for rt-VBR MPEG-2 video services over ATM Networks (ATM 상에서 실시간 가변비트율 MPEG-2 동영상 서비스를 위한 고속 자원 재할당 프로토콜)

  • 홍승은;장경훈;김덕진;고성제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1426-1437
    • /
    • 1999
  • The introduction of fast packet switching networks such as the ATM leads to the possibility of video services with constant quality. However, the fixed traffic descriptor(TD), which is defined by ATM Forum and ITU-T, can not simultaneously satisfy network efficiency and video quality. This paper presents fast resource reallocation protocol (FRRP) which can provide an effective compromise between network efficiency and video quality. This protocol reallocates the network resources and then adapts the traffic to the reallocated resources. In the proposed method, a video session is divided into several time-intervals according to its generated traffic and TD is calculated which well characterizes the traffic during the specific subdivided interval. In addition, a system model, where MPEG coding algorithm and network control are unified, is proposal and the performance of the FRRP in terms of cell loss rate(CLR) is evaluated though the simulation using real video traffic(Star Wars). Simulation results show that the FRRP has only 5 ~35% CLR of the fixed TD.

  • PDF

Optimization Algorithm for Minimizing Network Energy Consumption with Traffic Redundancy Elimination (트래픽 중복 제거로 네트워크 에너지 소비를 최소화하기 위한 최적화 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.930-939
    • /
    • 2021
  • In recent years, the use of broadband bandwidth and redundant links for stable transmission in networks has resulted in excessive energy consumption and reduced transmission efficiency. In this paper, we propose an optimization algorithm that reduces the number of transmission links and minimizes transmission energy by removing redundant traffic in networks where traffic redundancy is allowed. The optimization algorithm proposed in this paper uses the meta-heuristic method using Tabu search algorithm. The proposed optimization algorithm minimizes transmission energy by designing a neighborhood generation method that efficiently routes overlapping traffic. The performance evaluation of the proposed optimization algorithm was performed in terms of the number of links used to transmit all traffic generated in the network and the transmission energy consumed. From the performance evaluation results, it was confirmed that the proposed algorithm is superior to other algorithms previously proposed.