• Title/Summary/Keyword: Traffic Controller

Search Result 316, Processing Time 0.021 seconds

The effect of operating telematics device in vehicle on driver behaviors (운전중 텔레매틱스 장치 사용이 운전행동에 미치는 영향)

  • Sihn, Yong-Kyun;Ryu, Jun-Beom
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.6
    • /
    • pp.39-47
    • /
    • 2008
  • With dramatic development of IT technology and start of DMB service, installing the DMB equipment in a vehicle for watching TV programs and literal or pictorial traffic information are increasing. Watching the DMB during driving the vehicle could cause visual and cognitive distraction to drivers as much as eating food, operating radio and using mobile phone. However, there is not much empirical research for this topic and no research examined the effect of watching the DMB on driving behaviors in Korea. So, the present study examined the effect of watching the DMB on the driving behaviors with car simulator experiment. Within subject design was used in the study. That is, all subjects drove the vehicle both in the watching DMB condition and the non-watching DMB condition. The results indicated that subjects in the watching DMB condition took longer time to arrive at the destination and operated accelerator and brake pedal rapidly than subjects in the non-watching DMB condition. That is, their overall driving stability was lower than non-watching subjects'. Additionally, we examined the difference among the DMB control conditions (i.e., keypad condition, touch-pad condition and remote controller condition) in the driving behaviors. Finally, we discussed the limitations and the implications of the present study.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

Mobile M/VC Application Framework Using Observer/Observable Design Pattern (관찰자/피관찰자 설계 패턴을 이용한 모바일 M/VC 응용 프레임워크)

  • Eum Doo-Hun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.81-92
    • /
    • 2006
  • Recently, the number of mobile phone and PDA users has been rapidly increased. Such monitoring and control applications as geographical and traffic information systems are being used widely with wireless devices. In this paper, we introduce the mobile M/VC application framework that supports the rapid constructions of mobile monitoring and control (M/VC) applications. The mobile M/VC application framework uses the mobile Observer/Observable pattern that extends the Java's Observer/Observable for automatic interactions of server and client objects in wireless environments. It also provides the Multiplexer and Demultiplexer classes that supports the assembly feature of Observer and Observable objects. To construct an application using the framework, developers just need to create necessary objects from the Observable and MobileObserver classes and inter-connect them structurally(like the plug-and-play style) through the Multiplexer and Demultiplexer objects. Then, the state change of Observable objects is notified to the connected Observer objects and user's input with Observer objects is propagated to Observable objects. These mechanism is the main process for monitoring and control applications. Therefore, the mobile M/VC application framework can improve the productivity of mobile applications and enhance the reusability of such components as Observer and Observable objects in wireless environments.

  • PDF

Performance Ability after CPR Education of the ground workers in an airport (공항 지상 근무자의 심폐소생술 수행능력)

  • Shin, Ji-Hoon
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.29-40
    • /
    • 2009
  • Objective : This study is an experimental study which is designed to examine the differences between knowledge and self-confidence before and after theory education(CPR PPT material) based on guidelines of CPR and emergency cardiac treatment of American Heart Association(AHA, 2005) and video self-instruction program for the general public by Korean Association of Cardiopulmonary Resuscitation(KACPR), trace CPR performance ability after CPR and AED education and investigate the accuracy of artificial respiration and chest compression, and know the difference in CPR performance abilities including AED. Methods : Subjects of this study include ground crews and staffs at M airport in G province equipped with emergency equipments for CPR according to Art. 47, Sec. 2 of Emergency Medical Law, airport police, rent-a-cops, security guard, quarantine officer, custom officer, and communication, electricity, civil engineering, facility management staff, airport fire fighting staff, air mechanic, traffic controller, and airport management team among airport facility management staffs. They were given explanation of necessity of research and 147 of 220 subjects who gave consent to this research but 73 who were absent from survey were excluded were used as subjects of this study. of 147 subjects, there were 102 men and 45 women. Results : 1) Knowledge score of CPR was $6.18{\pm}0.87$ before instruction and it was increased to $15.12{\pm}1.78$ after instruction, and there was statistically significant difference. 2) Self-confidence score in CPR was $3.16{\pm}0.96$ before instruction and it was increased to $7.05{\pm}0.75$ after instruction, and there was statistically significant difference. 3) Total average score in CPR performance ability after instruction was 7.46 out of 9, performance ability was highest in confirmation of response as 144(97.95%), follwed by request of help as 140(95.25%) and confirmation of respiration as 135(91.83%), and lowest in performing artificial respiration twice(gross elevation of chest) as 97(65.98%). Accuracy of artificial respiration(%) was $28.60{\pm}16.88$ and that of chest compression(%) was $73.10{\pm}22.16$. 4) Performance ability of AED after instruction showed proper performance in power on by 141(95.91%) and attaching pad by 135(91.83%), hand-off for analyzing rhythm showed 'accuracy' in 115(78.23%) and 'non-performance' in 32(21.77%), delivery of shock and hand-off confirmation showed 'accuracy' in 109(74.14%) and 'inaccuracy' in 38(25.86%), and beginning chest compression immediately after AED was done by 105(71.42%).

  • PDF

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.