• 제목/요약/키워드: Traffic Agent

Search Result 188, Processing Time 0.024 seconds

Exploring reward efficacy in traffic management using deep reinforcement learning in intelligent transportation system

  • Paul, Ananya;Mitra, Sulata
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.194-207
    • /
    • 2022
  • In the last decade, substantial progress has been achieved in intelligent traffic control technologies to overcome consistent difficulties of traffic congestion and its adverse effect on smart cities. Edge computing is one such advanced progress facilitating real-time data transmission among vehicles and roadside units to mitigate congestion. An edge computing-based deep reinforcement learning system is demonstrated in this study that appropriately designs a multiobjective reward function for optimizing different objectives. The system seeks to overcome the challenge of evaluating actions with a simple numerical reward. The selection of reward functions has a significant impact on agents' ability to acquire the ideal behavior for managing multiple traffic signals in a large-scale road network. To ascertain effective reward functions, the agent is trained withusing the proximal policy optimization method in several deep neural network models, including the state-of-the-art transformer network. The system is verified using both hypothetical scenarios and real-world traffic maps. The comprehensive simulation outcomes demonstrate the potency of the suggested reward functions.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Effects of child pick-up behavior on emergency evacuations

  • Jang, Sang Hoon;Hwang, Ha;Chung, Ji-Bum
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2519-2528
    • /
    • 2022
  • The child pick-up behavior of parents during an emergency can cause heavy traffic congestion and failing to evacuate an affected area successfully. In this study, we analyzed the effect of child pick-up behavior using, as an example, a nuclear power plant accident caused by an earthquake, which is a typical no-notice emergency. A quake was assumed to occur near the Shin-Kori nuclear power plant in Ulsan, Korea, resulting in a nuclear power plant accident. An agent-based dynamic simulation model using VISSIM was employed to conduct sensitivity analyses with different child pick-up rates. The results confirmed that parents are a major cause of congestion and a vulnerable class in an emergency evacuation. The child pick-up behavior caused significant traffic congestion, and parents who pick up their children showed a higher evacuation failure rate.

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

Controlling Dynamic Vehicles in Driving Simulation (드라이빙 시뮬레이션에서의 동적 차량 제어)

  • Cho, Eun-Sang;Choi, Kwang-Jin;Ko, Hyeongseok
    • Journal of the Korea Computer Graphics Society
    • /
    • v.3 no.1
    • /
    • pp.37-47
    • /
    • 1997
  • This paper presents the algorithms for generating ambient traffic in driving simulation. Each ambient car is modeled as an autonomous agent that obeys the traffic rules by sensing the traffic lights, road signs, lanes, and other cars around. The algorithm is localized to the area where the car driven by the participant is currently located. Therefore the complexity of the algorithm does not depend on the size of the road network, allowing a huge environment to be simulated with no extra overhead. To avoid monotony, we produce artificial fluctuations in the behavior by employing various forms of probability distribution functions. The resulting behavior of the ambient cars is quite realistic. Experiments indicate that it is hard to tell whether an ambient car is computer-controlled or human-controlled.

  • PDF

Information Sharing System Based on Ontology in Wireless Internet (무선 인터넷 환경에서의 온톨로지 기반 정보 공유 시스템)

  • 노경신;유영훈;조근식
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.133-136
    • /
    • 2003
  • Due to recent explosion of information available online, question- answering (Q&A) systems are becoming a compelling framework for finding relevant information in a variety of domains. Question-answering system is one of the best ways to introduce a novice customer to a new domain without making him/her to obtain prior knowledge of its overall structure improving search request with specific answer. However, the current web poses serious problem for finding specific answer for many overlapped meanings for the same questions or duplicate questions also retrieved answer for many overlapped meanings fer the same questions or duplicate questions also retrieved answer is slow due to enhanced network traffic, which leads to wastage of resource. In order to avoid wrong answer which occur due to above-mentioned problem we propose the system using ontology by RDF, RDFS and mobile agent based on JAVA. We also choose wireless internet based embedded device as our test bed for the system and apply the system in E-commerce information domain. The mobile agent provides agent routing with reduced network traffic, consequently helps us to minimize the elapsed time for answers and structured ontology based on our proposed algorithms sorts out the similarity between current and past question by comparing properties of classes.

  • PDF

Application of Multi-Agent Transport Simulation for Urban Road Network Operation in Incident Case (유고상황 시 MatSIM을 활용한 도시부 도로네트워크 운영 분석)

  • Kim, Joo-Young;Yu, Yeon-Seung;Lee, Seung-Jae;Hu, Hye-Jung;Sung, Jung-Gon
    • International Journal of Highway Engineering
    • /
    • v.14 no.4
    • /
    • pp.163-173
    • /
    • 2012
  • PURPOSES : The purpose of this study is to check the possibilities of traffic pattern analysis using MatSIM for urban road network operation in incident case. METHODS : One of the stochastic dynamic models is MatSIM. MatSIM is a transportation simulation tool based on stochastic dynamic model and activity based model. It is an open source software developed by IVT, ETH zurich, Switzerland. In MatSIM, various scenario comparison analyses are possible and analyses results are expressed using the visualizer which shows individual vehicle movements and traffic patterns. In this study, trip distribution in 24-hour, traffic volume, and travel speed using MatSIM are similar to those of measured values. Therefore, results of MatSIM are reasonable comparing with measured values. Traffic patterns are changed according to incident from change of individual behavior. RESULTS : The simulation results and the actual measured values are similar. The simulation results show reasonable ranges which can be used for traffic pattern analysis. CONCLUSIONS : The change of traffic pattern including trip distribution, traffic volumes and speeds according to various incident scenarios can be used for traffic control policy decision to provide effective operation of urban road network.

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Dongcheul;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1284-1297
    • /
    • 2019
  • The network environment is presently becoming very increased. Accordingly, the study of traffic classification for network management is becoming difficult. Automatic signature extraction system is a hot topic in the field of traffic classification research. However, existing automatic payload signature generation systems suffer problems such as semi-automatic system, generating of disposable signatures, generating of false-positive signatures and signatures are not kept up to date. Therefore, we provide a fully automatic signature update system that automatically performs all the processes, such as traffic collection, signature generation, signature management and signature verification. The step of traffic collection automatically collects ground-truth traffic through the traffic measurement agent (TMA) and traffic management server (TMS). The step of signature management removes unnecessary signatures. The step of signature generation generates new signatures. Finally, the step of signature verification removes the false-positive signatures. The proposed system can solve the problems of existing systems. The result of this system to a campus network showed that, in the case of four applications, high recall values and low false-positive rates can be maintained.

Improving Transmission Performance of Real Time Traffic in HMIPv6 (HMIPv6에서 실시간 트래픽의 전송 성능 향상 방안)

  • Park, Won-Gil;Kim, Byung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.960-968
    • /
    • 2006
  • HMIPv6 improved the handover management of basic MIPv6 by introducing the new protocol agent MAP. In this new protocol, MAP instead of the Mobile Node intercepts all packets and redirects the packets to CoA of the Mobile Node. However, this process may degrade the network performance due to the centralization phenomenon of registration occurring in the hierarchical MAP structure. ffe propose two schemes to improve real time traffic performance. First proposal is a MAP selection mettled in which MAP is selected based on traffic characteristics. And we also propose differentiated traffic processing scheme with multi-level queues when Home Agent or Correspondent Nodes process Binding Update messages. Performances of the proposed scheme are analyzed. Analysis result shows that our model has good performance in the respect of location update cost and total cost of Mobile Nodes.

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.