• Title/Summary/Keyword: Traffic Flow Management

Search Result 282, Processing Time 0.028 seconds

An Analysis on the Preference Tendency of Customer of Italian Restaurants, Buffet Restaurants and Traditional Restaurants for Locational Factors (이태리 식당, 뷔페 식당과 전통음식점 이용 고객의 입지 요인 선호 경향 분석)

  • Kim, Young-Chan
    • Culinary science and hospitality research
    • /
    • v.14 no.3
    • /
    • pp.178-195
    • /
    • 2008
  • This examination was conducted as follows; 189 copies were coated in total, and demonstratively analyzed by SPSS WIN 15.0 program. The methods used in data for this analysis are as follows; Sensitivity, Reliability, Frequency, Internal consistency, One way ANOVA(Scheffe's examination) Analysis, T-test, etc. The findings of this study are as follows; firstly, it was revealed that respondents who were regular customers of Italian restaurants regarded convenient transportation, property of space, property of pastoral, visibility, and accessibility as importance. This means that Italian restaurant marketers should consider some of factors of location for business with a good view, good parking lot, location at main street, smooth flow of traffic, luxury, atmosphere of freedom, clean area around restaurants, elegant interior of the building, comfortable, luxurious, and deluxe atmosphere, and so on. Secondly, it was revealed that respondents who were regular customers of buffet restaurant either considered the same factors as the Italian restaurants above or regarded those factors less important. This suggests that restaurants should be located on main streets, on trunk roads, and in large-scale residential districts of apartment complex. Thirdly, it was revealed that respondents who were regular customers of traditional restaurants did not consider the locational factors above. This shows that traditional restaurants should be located in nearby customers' houses or their working places, and that marketers should consider focusing on their restaurants' homelike atmosphere, cleanliness, food flavors, and so on.

  • PDF

Design of Cloud-based on Machine Socialization System (클라우드 기반 Machine Socialization 시스템 설계)

  • Hwang, Jong-sun;Kang, In-shik;Lim, Hyeok;Yang, Xi-tong;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.573-574
    • /
    • 2016
  • Before the Machine Socialization System used to connected between server and router. However, the data flow increases due to the poor performance of the router increased traffic, as a result, the loss of data when the problem occurred Collaboration between devices increases that have been interrupted. This action moves the server connected to the router is required to solve these problems. In this paper, by utilizing the cloud server to reduce bottlenecks proposed a system that can reduce the loss of data during cooperation between devices. In addition, by dividing the management unit and the sensor using the virtualization technology, we designed a system that can efficiently make use of the resource.

  • PDF

A Traffic Management Scheme for Service Differentiation over MANETs (MANETs에서 차등서비스 제공을 위한 트래픽 관리 기법)

  • Kim Kwan-Woong;Bae Sung-Hwan;Kim Dae-Ik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.455-460
    • /
    • 2006
  • Currently, the IETF group is working on service differentiation in the Internet. However, in wireless environments such as Ad-hoc networks, where channel conditions are variable and bandwidth is scarce, the Internet differentiated services are suboptimal without lower layers' support. The IEEE 802.11 standard for Wireless LANs is the most widely used WLAN standard today. 1t has a mode of operation that can be used to provide service differentiation, but it has been shown to perform badly. In this paper, we present a new service differentiation scheme for support QoS in the wireless IEEE 802.11, which is based on a multiple queuing system to provide priority of user's flow. We simulate and analyze the performance of our algorithm and compare its performance with the original IEEE 802.11b protocol. Simulation results show that our approach increases overall throughput in the MAC layer.

Efficient platoon merger control scheme in automated connected vehicle systems (효율적인 자율주행 군집주행집단 관리를 위한 병합 제어 방안)

  • Chung, Young-uk
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.425-429
    • /
    • 2021
  • Vehicle platooning in automated connected vehicle systems is an efficient transportation operation model that not only significantly reduces computational load and networking overhead of the central system but also improves traffic flow. For efficient platoon group management, it is important to maintain the platoon group size appropriately and to control the merge request of a new vehicle and other group member vehicle. In this paper, we present a merger control scheme that accepts or rejects merge requests based on the current group size and the priority of vehicles. The proposed method was analyzed and validated through mathematical models based on Markov chains. Performance evaluation shows that the proposed scheme properly manages the load of the central system.

A Traffic Management Scheme for the Scalability of IP QoS (IP QoS의 확장성을 위한 트래픽 관리 방안)

  • Min, An-Gi;Suk, Jung-Bong
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.375-385
    • /
    • 2002
  • The IETF has defined the Intserv model and the RSVP signaling protocol to improve QoS capability for a set of newly emerging services including voice and video streams that require high transmission bandwidth and low delay. However, since the current Intserv model requires each router to maintain the states of each service flow, the complexity and the overhead for processing packets in each rioter drastically increase as the size of the network increases, giving rise to the scalability problem. This motivates our work; namely, we investigate and devise new control schemes to enhance the scalability of the Intesev model. To do this, we basically resort to the SCORE network model, extend it to fairly well adapt to the three services presented in the Intserv model, and devise schemes of the QoS scheduling, the admission control, and the edge and core node architectures. We also carry out the computer simulation by using ns-2 simulator to examine the performance of the proposed scheme in respects of the bandwidth allocation capability, the packet delay, and the packet delay variation. The results show that the proposed scheme meets the QoS requirements of the respective three services of Intserv model, thus we conclude that the proposed scheme enhances the scalability, while keeping the efficiency of the current Intserv model.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A Basic Study on the Development of Automatic Line Stripe Removal Using Dry Ice Blaster (드라이아이스 블래스터를 이용한 자동화 차선제거 장비 개발을 위한 기초연구)

  • Koo, Ja-Kyung;Moon, Deuk-Soo;Bernold, Leonhard E.;Lee, Tai-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.800-803
    • /
    • 2008
  • Road is one of the infrastructure facilities, on which lines include various information for guiding a smooth traffic flow. This line marking work is continually removed and re-marked during maintenance. However, some problems exist when the line marking work is conducted. Traditional methods of using grinders and torches have risk of repetitive skill, and workers are exposed directly to the hazardous situations. Moreover, even though the equipment has developed, the line removing work induces environmental contamination and pollution line on the road. Therefore, this study can become one of the eco-friendly cleaning technologies using dry ice blaster equipment, and the new development of equipment will improve method of pavement marking removal. Also, it can introduce innovative automation in construction.

  • PDF

A Study on Context Aware Vertical Handover Scheme for Supporting Optimized Flow Multi-Wireless Channel Service based Heterogeneous Networks (이기종 망간의 최적화된 플로우 기반 다중 무선 채널 지원을 위한 상황인지 수직핸드오버 네트워크 연구)

  • Shin, Seungyong;Park, Byungjoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.1-7
    • /
    • 2019
  • Recently, multimedia streaming service has been activated, and the demand for high-quality multimedia convergence contents services is predicted to increase significantly in the future. The issues of the increasing network load due to the rise of multimedia streaming traffic must be addressed in order to provide QoS guaranteed services. To do this, an efficient network resource management and mobility support technologies are needed through seamless mobility support for heterogeneous networks. Therefore, in this paper, an MIH technology was used to recognize the network situation information in advance and reduce packet loss due to handover delays, and an ACLMIH-FHPMIPv6 is designed that can provide an intelligent interface through introducing a hierarchical mobility management technique in FPMIPv6 integrated network.

Vulnerability Evaluation by Road Link Based on Clustering Analysis for Disaster Situation (재난·재해 상황을 대비한 클러스터링 분석 기반의 도로링크별 취약성 평가 연구)

  • Jihoon Tak;Jungyeol Hong;Dongjoo Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.2
    • /
    • pp.29-43
    • /
    • 2023
  • It is necessary to grasp the characteristics of traffic flow passing through a specific road section and the topological structure of the road in advance in order to quickly prepare a movement management strategy in the event of a disaster or disaster. It is because it can be an essential basis for road managers to assess vulnerabilities by microscopic road units and then establish appropriate monitoring and management measures for disasters or disaster situations. Therefore, this study presented spatial density, time occupancy, and betweenness centrality index to evaluate vulnerabilities by road link in the city department and defined spatial-temporal and topological vulnerabilities by clustering analysis based on distance and density. From the results of this study, road administrators can manage vulnerabilities by characterizing each road link group. It is expected to be used as primary data for selecting priority control points and presenting optimal routes in the event of a disaster or disaster.

Development of an AIDA(Automatic Incident Detection Algorithm) for Uninterrupted Flow Based on the Concept of Short-term Displaced Flow (연속류도로 단기 적체 교통량 개념 기반 돌발상황 자동감지 알고리즘 개발)

  • Lee, Kyu-Soon;Shin, Chi-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.13-23
    • /
    • 2016
  • Many traffic centers are highly hesitant in employing existing Automatic Incident Detection Algorithms due to high false alarm rate, low detection rate, and enormous effort taken in maintaining algorithm parameters, together with complex algorithm structure and filtering/smoothing process. Concerns grow over the situation particularly in Freeway Incident Management Area This study proposes a new algorithm and introduces a novel concept, the Displaced Flow Index (DiFI) which is similar to a product of relative speed and relative occupancy for every execution period. The algorithm structure is very simple, also easy to understand with minimum parameters, and could use raw data without any additional pre-processing. To evaluate the performance of the DiFI algorithm, validation test on the algorithm has been conducted using detector data taken from Naebu Expressway in Seoul and following transferability tests with Gyeongbu Expressway detector data. Performance test has utilized many indices such as DR, FAR, MTTD (Mean Time To Detect), CR (Classification Rate), CI (Composite Index) and PI (Performance Index). It was found that the DR is up to 100%, the MTTD is a little over 1.0 minutes, and the FAR is as low as 2.99%. This newly designed algorithm seems promising and outperformed SAO and most popular AIDAs such as APID and DELOS, and showed the best performance in every category.