• Title/Summary/Keyword: Infrastructure scenarios

Search Result 184, Processing Time 0.024 seconds

Evaluation of Accident Prevention Performance of Vision and Radar Sensor for Major Accident Scenarios in Intersection (교차로 주요 사고 시나리오에 대한 비전 센서와 레이더 센서의 사고 예방성능 평가)

  • Kim, Yeeun;Tak, Sehyun;Kim, Jeongyun;Yeo, Hwasoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.96-108
    • /
    • 2017
  • The current collision warning and avoidance system(CWAS) is one of the representative Advanced Driver Assistance Systems (ADAS) that significantly contributes to improve the safety performance of a vehicle and mitigate the severity of an accident. However, current CWAS mainly have focused on preventing a forward collision in an uninterrupted flow, and the prevention performance near intersections and other various types of accident scenarios are not extensively studied. In this paper, the safety performance of Vision-Sensor (VS) and Radar-Sensor(RS) - based collision warning systems are evaluated near an intersection area with the data from Naturalistic Driving Study(NDS) of Second Strategic Highway Research Program(SHRP2). Based on the VS and RS data, we newly derived sixteen vehicle-to-vehicle accident scenarios near an intersection. Then, we evaluated the detection performance of VS and RS within the derived scenarios. The results showed that VS and RS can prevent an accident in limited situations due to their restrained field-of-view. With an accident prevention rate of 0.7, VS and RS can prevent an accident in five and four scenarios, respectively. For an efficient accident prevention, a different system that can detect vehicles'movement with longer range than VS and RS is required as well as an algorithm that can predict the future movement of other vehicles. In order to further improve the safety performance of CWAS near intersection areas, a communication-based collision warning system such as integration algorithm of data from infrastructure and in-vehicle sensor shall be developed.

Determination of a priority for leakage restoration considering the scale of damage in for water distribution systems (피해규모를 고려한 용수공급시스템 누수복구 우선순위 선정)

  • Kim, Ryul;Kwon, Hui Geun;Choi, Young Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.10
    • /
    • pp.679-690
    • /
    • 2023
  • Leakage is one of the representative abnormal conditions in Water distribution systems (WDSs). Leakage can potentially occur and cause immediate economic and hydraulic damage upon occurrence. Therefore, leakage detection is essential, but WDSs are located underground, it is difficult. Moreover, when multiple leakage occurs, it is required to prioritize restoration according to the scale and location of the leakage, applying for an optimal restoration framework can be advantageous in terms of system resilience. In this study, various leakage scenarios were generated based on the WDSs hydraulic model, and leakage detection was carried out containing location and scale using a Deep learning-based model. Finally, the leakage location and scale obtained from the detection results were used as a factor for the priority of leakage restoration, and the results of the priority of leakage restoration were derived. The priority of leakage restoration considered not only hydraulic factors but also socio-economic factors (e.g., leakage scale, important facilities).

Evaluation Environment based on V2X Communication for Commercial Vehicle Cooperative Autonomous Driving (상용차 자율협력주행 플랫폼 평가를 위한 V2X 기반 평가환경 개발)

  • Han-gyun Jung;Seong-keun Jin;Jae-min Kwak
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.450-455
    • /
    • 2021
  • In this paper, we introduce the contents of research on the establishment of an evaluation environment for autonomous cooperative driving platform for commercial vehicles based on V2X communication. For the evaluation of the autonomous cooperative driving platform based on V2X communication, various standards, standards, and guidelines for test evaluation should be developed and provided to the test subject, along with the establishment of test beds such as roads and V2X infrastructure that can apply various driving scenarios. do. In addition, based on this, various reference equipment and test equipment for actual test and evaluation should be developed. In this paper, various technologies, standards, equipment, and construction infrastructure developed to construct the evaluation environment for autonomous cooperative driving platform for commercial vehicles based on V2X communication are introduced.

Hybrid Modeling and Control for Platoon Maneuvers in Automated Highway Systems (군집주행 기동을 위한 하이브리드 모델링 및 제어기 설계)

  • 전성민;최재원
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.12
    • /
    • pp.1014-1022
    • /
    • 2002
  • An objective of Automated Highway Systems (AHS) is to increase the safety and throughput of the existing highway infrastructure by introducing traffic automation. AHS is an example of a large scale, multiagent complex dynamical system and is ideally suited for a hierarchical hybrid controller. We discuss a design issue of efficient hybrid controllers for the platoon maneuvers on AHS. For the modeling of a hybrid system including the merge and split operations, a safety distance policy is introduced for the merge and split operations. After that, the platoon system will be modeled by a hybrid system In addition, a hybrid controller for the proposed merge and split operation models is presented. Finally, the performance of the proposed hybrid control scheme is demonstrated via scenarios for platoon maneuvers.

A Study on Mobile-IP-based Interworking Model for IMT-2000 Network (IMT-2000망을 위한 Mobile-IP기반 연동모델에 대한 연구)

  • 박병섭;이동철
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.85-90
    • /
    • 2002
  • This paper presents tuo implementation models for wireless service operators to offer Mobile-IP over IMT-2000 Data service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 services. For this purpose, a new Mobile-IP over IMT-2000-based protocol architectures are introduced and service operation schemes and handoff schemes according to various scenarios of packet data services in the IMT-2000 core network are presented. Also, this paper describes the handoff scheme in terms of channel states.

  • PDF

A study of the scenario for improvement of NPKI system (공인인증제도 개선방안 시나리오 연구)

  • Park, Kyung-Hye
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.59-71
    • /
    • 2010
  • The purpose of this paper is the improvement of NPKI management policy in Korea. In order to reach the issue of EC certification problems, we examined first the institutions and system accredited NPKI for checking on the status and problems. We studied the alternatives for the improvement of NPKI system through brainstorming with experts, they had drawn possible scenarios and chosen optimal policy measures of the public key infrastructure.

  • PDF

The Aging of Signalling Equipment and the Impact on Maintenance Strategies

  • Antoni, Marc
    • International Journal of Railway
    • /
    • v.2 no.3
    • /
    • pp.107-112
    • /
    • 2009
  • Research projects of SNCF aim at reducing the costs of infrastructure possessions and improving the operational equipment availability and safety. This permanent search for a better regularity led the SNCF to analyse the maintenance approach of signalling equipment in detail. Until now, it was commonly acknowledged that signalling equipment, which consists of many electronic devices, is not subject to aging. In this study, a Weibull lifetime model, able to describe an aging phenomenon, is used and it can be shown that the deterioration is statistically significant. The validity of the model is tested. We also analyse the influence of environmental covariates. We simulate different scenarios in order to investigate the impact of several maintenance strategies as well as on future maintenance costs, on the amount of components to replace based on the mean age of the network. It can be shown that in most cases a systematic replacement strategy offers the best solution.

  • PDF

The architecture of future ingegrated network of mobile into B-ISDN (차세대 광대역 유무선 통합망의 구조 설계)

  • 강경훈;유제훈;이윤주;김수중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1643-1651
    • /
    • 1997
  • Next generation mobile networks will be demanded to support high speed data and multimedia services in addition to extisting serviced including voice communications. In this paper, we discuss the requirements of the wireless service with broad range of appkications, and present several types of architecture for future bobile network. After a brief comparative analysis, we propose a most practical and feasible one. And also, we discuss possible interworking scenarios between radio access system and intelligent network. In consideration of the selected infrastructure and scenario, we present protocol architectures and basic functions of radio access system. Based on the architecture, we believe that the itegrated system can be realized with such advantages of easy interworking, high feasibility on common services, easy introduction to new services, and unified operation.

  • PDF

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

The Design of Integrated Flying Vehicle Model for Engagement Analyses of Missiles

  • Ha, Sue Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.930-939
    • /
    • 2019
  • High-Level Architecture(HLA)/Run-Time Infrastructure(RTI) are standards for distributed simulation systems and offer a technology to interconnect them and form one single simulation system. In defense domain, M&S is the only way to prove effectiveness of weapon systems except for Live Fire Testing (LFT). This paper focuses on guided missile simulations in weapon systems for engagement analyses and proposes the integrated flying vehicle model that is based on HLA/RTI. There are a lot of missiles in real world; therefore, we should develop each missile models in M&S in order to apply battlefield scenarios. To deal with the difficulties, in this paper, firstly, I classify these missiles into three models: ballastic, cruise, and surface-to-air missile models, and then I design each missile model and integrates them into a single model. This paper also offers a case study with my integrated flying vehicle model. At the conclusion, this paper presents contributions of this paper.