• Title/Summary/Keyword: Traffic architecture

Search Result 691, Processing Time 0.022 seconds

Analysis of Environmental Correlates with Walking among Older Urban Adults (도시 노인들의 걷기활동 참여에 영향을 주는 물리적 환경요인 분석)

  • Lee, Hyung-Sook;Ahn, Joon-Suk;Chun, Seung-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.39 no.2
    • /
    • pp.65-72
    • /
    • 2011
  • Since walking and physical activity are critical for older adults to maintain their health, it is important to provide neighborhood environments which encourage their walking in daily life. The purposes of the present study were to investigate walking activity patterns of older people in an urban setting and to identify environmental correlates with walking of older adults. This study examined spatial and temporal patterns of physical activities, environmental barriers and motivations, satisfaction levels and demands on the physical environment. In-depth interviews with older adults over age sixty residing in Seoul metropolitan areas revealed that most respondents have a positive perception on walking in daily life, and many of them walk regularly for their health. A primary purpose of walking for older adults was exercise for health rather than transportation. The study result demonstrated that parks and trails were the most preferred places for walking by older adults, and there is an association between frequency of walking participation and access or convenience to parks, traffic safety, and street lights. Most respondents were concerned about traffic safety when they walk in their neighborhoods due to traffic speeds and unsafe streets. Lack of separate sidewalks or benches, stairs and slopes were barriers to older adults' walking habits. This data suggests that the promotion of walking behavior among older adults, some level of public health action, and community support are needed to ensure safe physical environments within communities.

Design of Intersection Simulation System for Monitoring and Controlling Real-Time Traffic Flow (실시간 교통흐름의 모니터링 및 제어를 위한 교차로 시뮬레이션 시스템 설계)

  • Jeong Chang-Won;Shin Chang-Sun;Joo Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.85-97
    • /
    • 2005
  • In this paper, we construct the traffic information database by using the acquired data from the traffic information devices installed in road network, and, by referring to this database, propose the intersection simulation system which can dynamically manage the real-time traffic flow for each section of road from the intersections, This system consists of hierarchical 3 parts, The lower layer is the physical layer where the traffic information is acquired on an actual road. The traffic flow control framework exists in the middle layer. The framework supports the grouping of intersection, the collection of real-time traffic flow information, and the remote monitoring and control by using the traffic information of the lower layer, This layer is designed by extending the distributed object group framework we developed. In upper layer, the intersection simulator applications controlling the traffic flow by grouping the intersections exist. The components of the intersection application in our system are composed of the implementing objects based on the Time-triggered Message-triggered Object(TMO) scheme, The intersection simulation system considers the each intersection on road as an application group, and can apply the control models of dynamic traffic flow by the road's status. At this time, we use the real-time traffic information collected through inter-communication among intersections. For constructing this system, we defined the system architecture and the interaction of components on the traffic flow control framework which supports the TMO scheme and the TMO Support Middleware(TMOSM), and designed the application simulator and the user interface to the monitoring and the controlling of traffic flow.

  • PDF

Providing Fairness in Diffserv Architecture using Buffer Management Method (차등서비스 구조에서 버퍼관리기법을 이용한 공평성 제공)

  • 김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.05a
    • /
    • pp.8-13
    • /
    • 2003
  • Historically, IP-based internets have been able to provide a simple best-effort delivery service to all applications they carry. Best effort treats all packets equally, with no service level, packet loss, and delay. But the needs of users have changed. The want to use the new real-time, multimedia, and multicasting applications. Thus, there is a strong need to be able to support a variety of traffic with a variety of quality-of-service requirements. The DiffServ architecture, proposed by the Internet Engineering Task Force(IETF), has become the most viable solution for provising QoS over IP networks. The DiffServ architecture does not specify any handling method between AF out-profile packets and BE packets. This paper propose a mechanism for supporting inter class fairness in the DiffServ architecture. Ⅰ proposed a modified Weighted Round Robin method to protect the BE traffic from AF out-profile packets in the core routers. The proposed technique is evaluated through simulation. Simulation results indicate that the proposed method provides better protection not only for BE packets from AF out-profile packets, but also for the AF in-profile packets in congested networks.

  • PDF

Interconnecting Methods of Web based IPTV Contents Provider to IMS and Its Characteristics (IMS 네트워크에 웹기반 IPTV 콘텐츠 사업자 접속 방식 및 특성)

  • Kim, Hyun-Ji;Han, Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.6
    • /
    • pp.49-57
    • /
    • 2010
  • In the near future IPTV services will be emerged the various types through Internet, but IMS based IPTV service is one of the very attractive IPTV services. This paper describes the interconnecting architectures of Web based IPTV contents provider to IMS(IP Multimedia System) network and describes the three difference architectures as method to find its IP address. One is the architecture using DNS or HSS to find IP address of Web based IPTV contents provider and connecting gateway function to I-CSCF in IMS. The other is the architecture connecting gateway AS to ISC interface of S-CSCF in IMS. This paper describes the characteristics of traffic generating due to interconnect the Web contents provider, and the traffic model of each architectures. The proposed each architecture is emulated the session establishment delay characteristics in CoD service of IPTV by the simulation. This paper shows that the architecture connecting gateway AS to ISC interface of S-CSCF is the excellent method compare to other two methods in view of the session establishment delay.

An Efficient Network Management Architecture Usign Mobile Agents on DPE (분산처리환경에서 이동에이전트를 이용한 효율적인 망 관리 구조)

  • 이정환;홍충선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.535-543
    • /
    • 2002
  • In order to overcome disadvantages of existing centralized network management systems that use simple objects, dynamic object platforms are proposed as alternative systems. So the distributed network management systems are implemented using various distributed platform such as CORBA and Java-RMI. Subsequently mobile agent-based platforms are proposed. The mobile agent-based platform can additionally provide flexibility and scalability to network management system that CORBA or Java-RMI based platforms do not support. In this paper, we address an architecture to solve the problem of the occurrence of additional traffic by using mobile agent and to save resources of network element. Our proposal in this paper is an efficient network management architecture using motile agents. And we make use of mobile agents for minimizing of traffic that can happen when mobile agents moves. Also we design agents using information architecture of TMN for efficient resource management of network element and improvement of operation performance.

Research on prefabricated concrete beam-column joint with high strength bolt-end plate

  • Shufeng, Li;Di, Zhao;Qingning, Li;Huajing, Zhao;Jiaolei, Zhang;Dawei, Yuan
    • Structural Engineering and Mechanics
    • /
    • v.74 no.3
    • /
    • pp.395-406
    • /
    • 2020
  • Many prefabricated concrete frame joints have been proposed, and most of them showed good seismic performance. However, there are still some limitations in the proposed fabricated joints. For example, for prefabricated prestressed concrete joints, prefabricated beams and prefabricated columns are assembled as a whole by the pre-stressed steel bar and steel strand in the beams, which brings some troubles to the construction, and the reinforcement in the core area of the joints is complex, and the mechanical mechanism is not clear. Based on the current research results, a new type of fabricated joint of prestressed concrete beams and confined concrete columns is proposed. To study the seismic performance of the joint, the quasi-static test is carried out. The test results show that the nodes exhibit good ductility and energy dissipation. According to the experimental fitting method and the "fixed point pointing" law, the resilience model of this kind of nodes is established, and compared with the experimental results, the two agree well, which can provides a certain reference for elasto-plastic seismic response analysis of this type of structure. Besides, based on the analysis of the factors affecting the shear capacity of the node core area, the formula of shear capacity of the core area of the node is proposed, and the theoretical values of the formula are consistent with the experimental value.

A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic

  • Kang, Koohong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.123-132
    • /
    • 2021
  • Malicious activities of Botnets are responsible for huge financial losses to Internet Service Providers, companies, governments and even home users. In this paper, we try to confirm the possibility of detecting botnet traffic by applying the deep learning model Convolutional Neural Network (CNN) using the CTU-13 botnet traffic dataset. In particular, we classify three classes, such as the C&C traffic between bots and C&C servers to detect C&C servers, traffic generated by bots other than C&C communication to detect bots, and normal traffic. Performance metrics were presented by accuracy, precision, recall, and F1 score on classifying both known and unknown botnet traffic. Moreover, we propose a stackable botnet detection system that can load modules for each botnet type considering scalability and operability on the real field.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

Economic Analysis of SONET/WDM UPSR and BLSR Ring Networks Using Traffic Grooming (트래픽 그루밍을 이용한 SONET/WDM 단방향, 양방향 링 네트워크의 경제성 분석)

  • Kang, Donghan;Park, Sungsoo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.3
    • /
    • pp.213-223
    • /
    • 2004
  • We consider the traffic grooming problem for the design of SONET/WDM(Synchronous Optical NETwork/Wavelength Division Multiplexing) ring networks. Given a physical network with ring topology and a set of traffic demands between pairs of nodes, we are to obtain a stack of rings with the objective of minimizing the number of ADMs installed at the nodes. This problem arises when a single ring capacity is not large enough to accommodate all the demands. As a solution method, an efficient algorithm based on the branch-and-price approach has been reported in the literature for the problem in which only unidirecional path switched ring (UPSR) was considered. In this study, we suggest integer programming models and the algorithms based on the same approach as the above one, considering two-fiber bidirectional line switched ring(BLSR/2), and BLSR/4 additionally. Using the results, we compare the number of required ADMs for all types of the ring architecture.

A Design of Optimal Path Search Algorithm using Information of Orientation (방향성 정보를 이용한 최적 경로 탐색 알고리즘의 설계)

  • Kim Jin-Deog;Lee Hyun-Seop;Lee Sang-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.454-461
    • /
    • 2005
  • Car navigation system which is killer application fuses map management techniques into CPS techniques. Even if the existing navigation systems are designed for the shortest path, they are not able to cope efficiently with the change of the traffic flow and the bottleneck point of road. Therefore, it is necessary to find out shortest path algorithm based on time instead of distance which takes traffic information into consideration. In this paper, we propose a optimal path search algorithm based on the traffic information. More precisely. we introduce the system architecture for finding out optimal paths, and the limitations of the existing shortest path search algorithm are also analyzed. And then, we propose a new algorithm for finding out optimal path to make good use of the orientation of the collected traffic information.