• Title/Summary/Keyword: Public and Private Traffic Information

Search Result 39, Processing Time 0.028 seconds

A Study on Enhancing VMS Services by FM Car Radio (차량 내 FM라디오를 이용한 VMS서비스 개선 연구)

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.22-32
    • /
    • 2010
  • Increasingly advanced Information Technology (IT) has changed the operator so as to create more diversified and advanced traffic information demand. To deal with the changing demand in private sector, a concept of on-demand traffic information has been rapidly introduced. However VMS, a product of the first generation of ITS, which was designed to provide the unspecified individuals during driving the car with the basic level of traffic information by the public failed to actively change itself in such a changing pattern. This study was intended to describe the VMS system (tentatively, FM-VMS) which was further developed to accommodate the needs favoring the sophisticated PDA with the public role of providing the unspecified individuals with the equal information. FM-VMS introduced in this study is the device designed to transmit the voice and message to the drivers through the radio information device mounted on a car. A core technology is, unlike FM-DARC and RDS, the Water Making technology which directly inserts the digital signal into FM frequency in use. It's been currently used for broadcasting and security purpose. A detection rate as a result of testing FM-VMS system using Water Making technology was 90% or more in voice and message within 20m from test VMS. When a public-developed VMS information could be transmitted using FM frequency to the relatively vulnerable users (vulnerable to traffic information) in voice on a real-time basis to provide the regional traffic information, and furthermore, VMS message could be received through radio liquid using FM frequency only, it would obviously bring about the innovation in ITS as well as pave the way for creating the new added value down the road.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

A Study on the Public Traffic Policy in Information Age: Focused on the Bus Quasi-Public Operating System in Gwang-ju Metropolitan City (정보화시대의 대중교통정책 : 광주광역시의 버스준공영제를 중심으로)

  • Joun, Joung-Hwan
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.19-33
    • /
    • 2010
  • As one of the most traffic devices, bus has played a great role in Korea for the last years. However, a great many peoples in big cities have continually decreased with the increase of private car ownership. It causes lower quality of bus service and unstability of operation in many bus companies. In the several local government, the operation system of bus was changed to Bus Quasi-Public Operating System. The aim of this study is to assess the effects and to suggest improvement strategies of Bus QPOS. According to the results of the analysis, Bus QPOS has brought various positive effects, but it has occurred negative effects, especially a much increase of government subsidies to bus company. To resolve a negative effects, government should examine the whole condition of bus operations. This study suggests strategies to improve Bus QPOS, which is including transparency of management, fair assessment system, standard cost system for bus operations.

  • PDF

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

The Korean Traditional Color as Emotional Design Approach in Dental Clinic Interior Design (전통 색상을 적용한 치과 실내디자인의 감성적 접근)

  • Kim, Sun-Young;Lee, Kyung-Jae
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2006.05a
    • /
    • pp.63-64
    • /
    • 2006
  • The design concept of this dental clinic Interior design is emotional color expression for the medical facility. This dental clinic is showing off the new adoption of the Korean primary traditional color pallette for the medical interior design. The graphic wall of the corridor is strongly attracting the eyes of customers while wrapping the corridor wall and partition with rather unconventional primary colored graphic shaping a tooth. Also the vivid and the dynamic atmosphere are emphasized by using the red color in the treatment area and the powder room. For the space programing, I focused on the functionality of each space and the efficiency of the traffic line. Centering around the information desk, the principal traffic line Is divided Into the staffs' private movement and the public movement.

  • PDF

Implementation Plan of MaaS according to Various Public Transport Links (MaaS의 다양한 공공교통수단 연계에 따른 구현 방안)

  • Seo, Ji-Yeong;Lee, Seon-Ha;Cheon, Choon-Keun;Lee, Eun-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.73-86
    • /
    • 2018
  • The increase in the number of private automobiles has incurred various traffic problems. Globally, studies on MaaS(Mobility as a Service) has already been initiated to mobilize the use of public transportation in reducing private passenger cars in roads. This study aims to analyze the passenger's optimal route considering the transfer between different transportation modes through simulation, and analyze the effect of available route through the connected transportation modes. Sejong Special Self-Governing City was chosen as the study area due to its extensive transportation network. As a result of the analysis, the predominant obtainable route is derived either from using public transportation (i.e. bus and subway) only or by bicycle. However, it is also possible to use the car sharing and public bicycle to reach their final destination efficiently when paths that can be traversed were more scrutinized. When various transportation information and location-based services are introduced in smart phone applications, they can provide very useful information to passengers, and also promote social problems such as traffic congestion and environmental issues in the future.

Preference Analysis of Traffic Information Service Depending on Smart Phone Possession (스마트폰 보유여부에 따른 교통정보 제공 시스템의 선호도 분석)

  • HEO, Min;KIM, Hoe Kyoung
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.5
    • /
    • pp.470-477
    • /
    • 2015
  • VMS informs the public of traffic and weather information in real time and functions to facilitate traffic flow. However, as smart phone navigation becomes more popular with the rapid propagation of the smart phone, the efficiency and applicability of VMS are challenged. Accordingly, this study aims to investigate the drivers' preference for the traffic information service between VMS and smart phone navigation by conducting a survey using a stated preference in Busan Metropolitan City in August 2013. This study found that 60% of survey respondents prefer VMS to the smart phone navigation. Further analysis to investigate the preference focused on the smart phone users revealed that female, younger, more educated, and less experienced drivers more rely on the smart phone navigation. Consequently, this study implicates that private and governmental institutes have to take a measure to develop the integrated traffic information system.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

A Study on the Providing the Visibility in a Cloud Environment (클라우드 환경에서의 가시성 제공 방안 연구)

  • Kim Taekyung;Baik Namkyun;Kim Junghyup
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.23-30
    • /
    • 2023
  • According to the government's plan for cloud conversion and integration of information resources for administrative and public institutions, work is underway to convert administrative and public institutions to the cloud by 2025. In addition, in the private sector, companies in many fields, including finance, are already using cloud services, and the usage is expected to expand more and more. As a result, changes have occurred in security control activities using security systems, it is required to secure visibility for encrypted traffic when building a cloud control environment. In this paper, an analysis was conducted on the way to provide visibility in the cloud service environment. Ways to provide visibility in the cloud service environment include methods of using load balancer, methods of using security systems, and methods of using equipment dedicated to SSL/TLS decryption. For these methods, Performance comparison was performed in terms of confidentiality, functionality (performance), cost. Through this, the pros and cons of each visibility provision method were presented.

Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting (FM방식을 이용한 인증서 유효성 검증의 성능 향상)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.3-13
    • /
    • 2002
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity on PKI. So, a user has to confirm the public key whether valid or invalid in the certification. There are many methods such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these methods have many problems, which cause overload traffic on network and the CRL server because of realtime processing for cert-validation of certification. In this paper we proposed cert-validation of certification improvement method based on FM Subcarrier Broadcasting, which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server the realtime management.