• Title/Summary/Keyword: Traffic Agent

Search Result 188, Processing Time 0.028 seconds

Development of a radiological emergency evacuation model using agent-based modeling

  • Hwang, Yujeong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2195-2206
    • /
    • 2021
  • In order to mitigate the damage caused by accidents in nuclear power plants (NPPs), evacuation strategies are usually managed on the basis of off-site effects such as the diffusion of radioactive materials and evacuee traffic simulations. However, the interactive behavior between evacuees and the accident environment has a significant effect on the consequential gap. Agent-based modeling (ABM) is a method that can control and observe such interactions by establishing agents (i.e., the evacuees) and patches (i.e., the accident environments). In this paper, a radiological emergency evacuation model is constructed to realistically check the effectiveness of an evacuation strategy using NetLogo, an ABM toolbox. Geographic layers such as radiation sources, roads, buildings, and shelters were downloaded from an official geographic information system (GIS) of Korea, and were modified into respective patches. The dispersion model adopted from the puff equation was also modified to fit the patches on the geographic layer. The evacuees were defined as vehicle agents and a traffic model was implemented by combining the shortest path search (determined by an A * algorithm) and a traffic flow model incorporated in the Nagel-Schreckenberg cellular automata model. To evaluate the radiological harm to the evacuees due to the spread of radioactive materials, a simple exposure model was established to calculate the overlap fraction between the agents and the dispersion patches. This paper aims to demonstrate that the potential of ABM can handle disaster evacuation strategies more realistically than previous approaches.

Traffic Analysis of Statistics based on Internet Application Services (인터넷 응용 서비스의 통계에 근거한 트래픽 분석)

  • 정태수;최진섭;정중수;김정태;김대영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.995-1003
    • /
    • 2004
  • A number of Internet application services are used with the development of Internet backbone nowadays. Well-known services such as WWW, ]n, email are provided at first time. Tremendous unwell-known services are presented according to the demands of various contents. After analyzing PDU information of the packet using unwell-known port travelling on the internet, searching internet service type and its statistical data is provided with internet traffic analyst as very useful information. This paper presents the mechanism to extract the internet application services operated on (un)well-known port of UDP or TCP used occasionally through netflow and tcpdump method introduced by ethereal and the operation scheme of the service. Afterwards to get the detailed statistics of the analyzed application service, the agent and the server environment, the agent gathering raw data traffics and the server adapting the traffic received from the agent BNF(Backus-Naur Form) method, is also introduced. Adapting the presented mechanism eve. LAN of Andong national university, the internet traffic service type and the detailed statistics of the analyzed application services which provides with internet traffic analyst are presented as very useful information.

Effective Mobile Agent Generator Selection Scheme for Wireless network management system (무선네트워크 관리시스템에서 효율적인 MAG 선택 기법)

  • Kim, Dong-Ok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.69-72
    • /
    • 2007
  • In this paper, we analyze the performance of the network management system with intelligent mobile agent system. The proposed system dynamically selects appropriate its destinations. Thus, the system has an advantage of flexible network management in mobile network environments as well as dynamic change of traffic. Comparing its delay and throughput performance with the conventional SNMP based network management system, we find that the proposed mobile agent system performs better efficiency than the conventional one.

  • PDF

Detection of Abnormal Traffic by Pre-Inflow Agent (사전유입 에이전트가 발생하는 이상트래픽 탐지 방안)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1169-1177
    • /
    • 2018
  • Modern society is a period of rapid digital transformation. This digital-centric business proliferation offers convenience and efficiency to businesses and individuals, but cyber threats are increasing. In particular, cyber attacks are becoming more and more intelligent and precise, and various attempts have been made to prevent these attacks from being discovered. Therefore, it is increasingly difficult to respond to such attacks. According to the cyber kill chain concept, the attacker penetrates to achieve the goal in several stages. We aim to detect one of these stages and neutralize the attack. In this paper, we propose a method to detect anomalous traffic caused by an agent attacking an external attacker, assuming that an agent executing a malicious action has been introduced in advance due to various reasons such as a system error or a user's mistake.

The Application of Industrial Inspection of LED

  • Xi, Wang;Chong, Kil-To
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.91-93
    • /
    • 2009
  • In this paper, we present the Q-learning method for adaptive traffic signal control on the basis of In this paper, we present the Q-learning method for adaptive traffic signal control on the basis of multi-agent technology. The structure is composed of sixphase agents and one intersection agent. Wireless communication network provides the possibility of the cooperation of agents. As one kind of reinforcement learning, Q-learning is adopted as the algorithm of the control mechanism, which can acquire optical control strategies from delayed reward; furthermore, we adopt dynamic learning method instead of static method, which is more practical. Simulation result indicates that it is more effective than traditional signal system.

  • PDF

A Study about Web Traffic Performance on wired and wireless network (유무선 혼합망에서 웹 트래픽 성능에 관한 연구)

  • Kim, Chang Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.47-58
    • /
    • 2011
  • Snoop was suitably designed for wired and wireless network as having snoop agent module in BS(Base Station) which is connecting to both wired and wireless network in order to supplement the problems of TCP. This study examined performance difference by using the web traffic taken wide possession in current internet traffic. The web traffic has greater amount of traffic, shorter life time, and smaller size than other traffics. This study found that snoop producing performance improvement of wireless network in the network mixed with the wired and wireless lead performance loss when transmitting web traffic. This study found that in case of web traffic is transmitted it bring a performance improvement of web traffic as computing BWE((Bandwidth Expansion), and also found that this study prove of performance improvement by decreasing local retranmission.

Research on OS fingerprinting Method for Real-time Traffic Analysis System (실시간 트래픽 분석을 위한 운영체제 판별 방법에 관한 연구)

  • Lee, Hyun-Shin;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.443-450
    • /
    • 2011
  • The Internet has become an essential part in our modern life by providing useful information. So, the volume of Internet traffic has been increasing rapidly, which emphasizes the importance of network traffic analysis for effective network operation and management. Signature based analysis have been commonly used, but it is shown that the increase of signatures due to the increase of applications causes the performance degradation of real-time traffic analysis on high-speed network links. In this paper, we propose OS fingerprinting method for real-time traffic analysis. The previous problems can be solved by utilizing the OS information. The OS fingerprinting method for real-time traffic analysis, proposed in this paper, conducts under passive mode, and improves the limitation of a previous method such as low completeness and accuracy. In this paper, we enlarged an input data to improve completeness, and used the User-Agent field in HTTP packet to extract various OS signatures. Also, we changed an input data from packet to flow to improve accuracy.

Design and Implementation of a Web-based Traffic Monitoring and Analysis System (웹 기반의 트래픽 모니터링 및 분석 시스템의 설계와 구현)

  • 이명섭;박창현
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.613-624
    • /
    • 2002
  • Within the past decade, TCP/IP network environment has been explosively widespread all over the world. As the internet and the WWW expand their boundaries, the network traffic caused by data transfers over the internet has also increased. In this paper, we present the design and implementation of a WebTraMAS (Web-based Traffic Monitoring and Analysis System) which can resolve the shortcomings of current management approaches, particularly on the network traffic monitoring and analysis. The WebTraMAS presented in this paper performs the network management activities based on the parameters related to the MIB-II of SNMP and the parameters related to the QoS such as network performance and fault. The proposed WebTraMAS, implemented using the WWW technology, is able for the network manager to manage the network easily and platform independently with the performance analysis of internet traffic.

The Implementation of Extension SIP system for efficient call-control (효율적인 call-control을 위한 Extension SIP 시스템 구현)

  • 이정훈;양형규;이병호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.331-333
    • /
    • 2004
  • 본 논문에서는 SIP(Session initiation Protocol) 기반의 VoIP(Voice over Internet Protocol) 시스템에 효율적인 call-control을 위해 필요한 헤더와 파라미터를 추가한 Extension SIP를 제안하였다. 또한 이 제시된 Extension SIP에 따르는 SIP Proxy Server와 User Agent(User Agent Client, User Agent Server)를 리눅스 시스템에서 C언어를 통해 구현하였고, 이 구현된 Extension SIP 시스템을 통해 기존의 SIP 시스템과 cail-control을 위한 packet traffic을 비교.분석 함으로써 제안한 Extension SIP의 효율성 을 증명하였다.

  • PDF

Agent Application for E-Beam Manufacturing System (전자빔 가공기에 대한 에이전트 응용)

  • Lim, Sun-Jong;Lee, Chan-Hong;Song, Jun-Yeob
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.2
    • /
    • pp.44-49
    • /
    • 2007
  • An agent is an abstract unit for problem solving in the field of distributed artificial intelligence, and an agent-based system is designed and implemented based on the definition of agent as its central concept. Agent modeling is advantageous to abstraction, disintegration and structuring for describing complex system, so its application is increased in various areas including air traffic control, power transmission, e-commerce and medicine. There is no agreed definition of agent but agents have common points as follows: autonomy, reactivity, pro-activeness and cooperation. An agent-oriented modeling is an approach of a concept different form existing object-oriented modeling. This study proposed the agent application for E-Beam manufacturing system. To evaluate the performance of the proposed process design, we used the JADE library. The JADE toolkit provides a FIPA-compliant agent platform and a package to develp Java agents. It provides a basic set of functionalities that are regarded as essential for an autonomous agent architecture.