• Title/Summary/Keyword: Smart Card Data

Search Result 146, Processing Time 0.027 seconds

Analysis of Traffic Characteristics and Crowded Degree in Light Rail Transit using Smart Card Data (in case of Ui-Line) (교통카드데이터를 이용한 경량전철 통행특성 및 열차 혼잡도 분석 (우이-신설선 사례를 중심으로))

  • Cho, Hyerim;Park, Soon Yong;Kwon, Min-ji
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.11a
    • /
    • pp.9-10
    • /
    • 2019
  • 서울시 첫 번째 경전철인 우이신설선은 2017년 9월 개통 이후 대중교통 불모지인 서울 동북부지역의 중요한 교통축을 담당하고 있다. 일평균 약 8만 명이 이용하는 우이신설선은 통행시간의 획기적인 개선과 지역 활성화에 기여하는 등 긍정적 효과가 있으나 개통 2주년이 지난 현재 출퇴근시 혼잡도 문제가 심화되는 등 대시민 서비스 측면에서의 쟁점도 제기되고 있다. 본 논문은 우이신설선 사례를 기반으로 서울시 경량전철 통행특성을 분석하고 첨두시 혼잡원인을 파악하여 계획단계부터 혼잡도를 고려한 시설설계 개선방안 등을 제시하였다. 통행특성 및 혼잡원인 분석은 우이신설선을 통과하는 개별 카드데이터를 활용하였으며, 더 나아가 카드데이터의 특성을 고려한 열차 내 혼잡도 산정 알고리즘을 연구·개발하였다.

  • PDF

Personalization of Body Metric Data For Recommending Personal Goods (개인화된 신체치수 정보를 활용한 개인용품 추천 시스템)

  • Kyung, Jin-Hui;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.506-508
    • /
    • 2006
  • 대량의 물품이 생산되고 유통되는 현대 사회에서 개인에게 다양하고 편리한 서비스를 제공하기위해서 다방면에서 연구가 진행되고 있다. 상품을 구입 시에 사용자가 사용하는 스마트카드에 개인의 신체 치수 정보가 담겨있다면 그 사용자는 카드를 reader하는 기기에 접속하기만 하면 사용자가 필요로 하는 물품을 추천 받을 수 있을 것이다. 사람의 신체는 모든 부분을 식별할 수 있는 다양한 물리적 측정 기준을 가지고 있다. 이에 맞물려 스마트카드는 신체 식별정보 저장하기위한 적절한 저장장치이고, 관련된 컨텐츠와 자바 애플릿의 검색 및 업데이트가 용이하다는 장점이 있다. 이 논문의 연구 과제는 브라우저와 자바 임베디드 스마트카드사이의 접근 인터페이스를 설계하는 것이다.

  • PDF

An ID-Based Remote User Authentication Scheme in IoT (사물인터넷에서 ID기반 원격 사용자 인증 방식)

  • Park, KiSung;Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1483-1491
    • /
    • 2015
  • Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.

A study on Estimating the Transfer Time of Transit Users Using Deep Neural Network Models (심층신경망 모형을 활용한 대중교통 이용자의 환승시간 추정에 관한 연구)

  • Lee, Gyeongjae;Kim, Sujae;Moon, Hyungtaek;Han, Jaeyoon;Choo, Sangho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.32-43
    • /
    • 2020
  • The transfer time is an important factor in establishing public transportation planning and policy. Therefore, in this study, the influencing factors of the transfer time for transit users were identified using smart card data, and the estimation results for the transfer time using the deep learning method such as deep neural network models were compared with traditional regression models. First, the intervals and the distance to the bus stop had positive effects on the subway-to-bus transfer time, and the number of bus routes had a negative effect. This also showed that the transfer time is affected by the area in which the subway station exists. Based on the influencing factors of the transfer time, the deep learning models were developed and their estimation results were compared with the regression model. For model performance, the deep learning models were better than those of the regression models. These results can be used as basic data for transfer policies such as the differential application of transit allowance times according to region.

An Investigation of Rider Behavior to Transfer Seoul Metropolitan Transit Using Public Transport Card Data (교통카드 데이터를 이용한 수도권 광역급행철도 환승행태에 관한 연구)

  • Gun ki Jung;Dong min Lee;Sun hoon Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.146-164
    • /
    • 2022
  • Recently, the Korean government promoted the construction of metropolitan express subway to connect major transportation hub in the metropolitan area within 30 minutes. Most stations of the metropolitan express subway are connected to existing subway stations, so the importance of transfer increased. Although many studies have been conducted on the effect of transfer penalty on route choice, there are few studies on the transfer behavior of the metropolitan express subway. Therefore, in this study, a transfer behavior analysis was conducted on the Shinbundang Line, a representative metropolitan express subway. To analyze the transfer behavior according to the degree of traffic congestion and the presence of fare payment, route choice models were made using transport card data divided according to week, time, and user characteristics. As a result of the analysis, users of the metropolitan express subway had greater disutility to the transfer waiting time compared to the transfer moving time. Furthermore, especially during the peak time, EIVM(Equivalent in-vehicle minutes) of the transfer waiting time was 3.51. In this study, EIVM for metropolitan express subway users were analyzed to be 2.6 minutes, which is significantly lower than the results of previous studies on subways. This suggests that there is a difference in the transfer penalty between subways and metropolitan express subway, and that it is necessary to apply the transfer penalty between subways and express subway differently when forecasting subway traffic demand.

Analysis of Vocational Training Needs Using Big Data Technique (빅데이터 기법을 활용한 직업훈련 요구분석)

  • Sung, Bo-Kyoung;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.21-26
    • /
    • 2018
  • In this study, HRD-NET (http://hrd.go.kr), a vocational and training integrated computer network operated by the Ministry of Employment and Labor, is used to confirm whether job training information required by job seekers is being provided smoothly The question bulletin board was extracted using 'R' program which is optimized for big data technique. Therefore, the effectiveness, appropriateness, visualization, frequency analysis and association analysis of the vocational training system were conducted through this, The results of the study are as follows. First, the issue of vocational training card, video viewing, certificate issue, registration error, Second, management and processing procedures of learning cards for tomorrow 's learning cards are complicated and difficult. In addition, it was analyzed that the training cost system and the refund structure differentiated according to the training occupation, the process, and the training institution in the course of the training. Based on this paper, we will study not only the training system of the Ministry of Employment and Labor but also the improvement of the various training computer system of the government department through the analysis of big data.

Urban Vitality Assessment Using Spatial Big Data and Nighttime Light Satellite Image: A Case Study of Daegu (공간 빅데이터와 야간 위성영상을 활용한 도시 활력 평가: 대구시를 사례로)

  • JEONG, Si-Yun;JUN, Byong-Woon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.217-233
    • /
    • 2020
  • This study evaluated the urban vitality of Daegu metropolitan city in 2018 using emerging geographic data such as spatial big data, Wi-Fi AP(access points) and nighttime light satellite image. The emerging geographic data were used in this research to quantify human activities in the city more directly at various spatial and temporal scales. Three spatial big data such as mobile phone data, credit card data and public transport smart card data were employed to reflect social, economic and mobility aspects of urban vitality while public Wi-Fi AP and nighttime light satellite image were included to consider virtual and physical aspects of the urban vitality. With PCA (Principal Component Analysis), five indicators were integrated and transformed to the urban vitality index at census output area by temporal slots. Results show that five clusters with high urban vitality were identified around downtown Daegu, Daegu bank intersection and Beomeo intersection, Seongseo, Dongdaegu station and Chilgok 3 district. Further, the results unveil that the urban vitality index was varied over the same urban space by temporal slots. This study provides the possibility for the integrated use of spatial big data, Wi-Fi AP and nighttime light satellite image as proxy for measuring urban vitality.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

Modular Multiplication Algorithm Design for Application of Cryptosystem based on Public Key Structure (공개키 기반의 암호 시스템에 적합한 모듈러 연산기 알고리즘의 효율적인 설계)

  • Kim, Jungl-Tae;Hur, Chang-Woo;Ryu, Kwang-Ryul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.469-472
    • /
    • 2003
  • The computational cost of encryption is a barrier to wider application of a variety of data security protocols. Virtually all research on Elliptic Curve Cryptography(ECC) provides evidence to suggest that ECC can provide a family of encryption algorithms that implementation than do current widely used methods. This efficiency is obtained since ECC allows much shorter key lengths for equivalent levels of security. This paper suggests how improvements in execution of ECC algorithms can be obtained by changing the representation of the elements of the finite field of the ECC algorithm. Specifically, this research compares the time complexity of ECC computation eve. a variety of finite fields with elements expressed in the polynomial basis(PB) and normal basis(NB).

  • PDF

A Refundable Elliptic Curve Electronic Cash in Mobile Environments (이동환경에서 환불 가능한 타원형 곡선 전자화폐)

  • Kwon, Eun-Kyeong;Cho, Yong-Gu;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.287-292
    • /
    • 2004
  • BOCC(Brand's Offline Cash with a Counter) is useful in mobile environments, but it has the possibility of attacking amount data in a smart card. To insert the upper & lower limitation of amount into a token data decreases the level of risk. If upper and lower values are same, it means a fixed amount token. Since refund can more often happen in on-line commerce, refundability is added. BOCC is based on Discrete Logarithm Problem, needs exponential computations. But mobile terminals like cell phones have low computational power. As a result, ECC is used to Improve the performance supporting same security level.