• Title/Summary/Keyword: Traffic control agent

Search Result 51, Processing Time 0.02 seconds

Evaluation of the Properties of an Environment-Friendly De-icing Agent Based on Industrial By-Products (산업부산물을 활용한 친환경제설제의 특성평가)

  • Heo, Hyung-Seok;Lee, Byung-Jae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.6
    • /
    • pp.132-139
    • /
    • 2017
  • A huge amount of de-icing agent is sprayed during winter to promote traffic safety in cold regions, and the quantity of de-icing agent sprayed has increased each year. The main ingredients in commonly used de-icing agents are chlorides, such as calcium chloride($CaCl_2$) and sodium chloride(NaCl). While calcium chloride is mostly used in Korea and sodium chloride is usually used in the U.S. and Japan, all de-icing agents include chloride ions. The chlorides included in sprayed calcium chloride-based de-icing agents have severe adverse effects, including the corrosion of reinforcing steels through salt damage by infiltrating into road structures, reduced structural performance of pavement or damage to bridge structures, and surface scaling, in combination with freezing damage in winter, as well as water pollution. In addition, the deterioration of paved concrete road surface that occurs after the use of calcium chloride-based de-icing agent accelerates the development of visual problems with traffic structures. Therefore, the present study was performed to prepare an environment-friendly liquid de-icing agent through a reaction between waste organic acids and calcium-based by-products, which are industrial by-products, and to analyze the properties of the de-icing agent in order to evaluate its applicability to road facilities.

Development of an Editor and Howling Engine for Realtime Software Programmable Logic Controller based on Intelligent Agents (지능적 에이전트에 의한 실시간 소프트웨어 PLC 편집기 및 실행엔진 개발)

  • Cho, Young-In
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1271-1282
    • /
    • 2005
  • Recently, PC-based control is incredibly developed in the industrial control field, but it is difficult for PLC programming in PC. Therefore, I need to develop the softeware PLC, which support the international PLC programming standard(IECl131-3) and can be applied to diverse control system by using C language. In this paper, I have developed the ISPLC(Intelligent Agent System based Software Programmable Logic Controller). In ISPLC system, LD programmed by a user which is used over $90\%$ among the 5 PLC languages, is converted to IL, which is one of intermediate codes, and IL is converted to the standard C rode which can be used in a commercial editor such as Visual C++. In ISPLC, the detection of logical error in high level programming(C) is more eaier than PLC programming itself The study of code conversion of LD->IL->C is firstly tried in the world as well as KOREA. I developed an execution engine with a good practical application. To show the effectiveness of the developed system, 1 applied it to a practical case, a real time traffic control(RT-TC) system. ISPLC is minimized the error debugging and programming time owing to be supported by windows application program.

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

Comparative Study of GPS-Integrated Concrete Supply Management using Discrete Event Simulation

  • Zekavat, Payam Rahnamayie;Mortaheb, Mohammad Mehdi;Han, Sangwon;Bernold, Leonhard
    • Journal of Construction Engineering and Project Management
    • /
    • v.4 no.2
    • /
    • pp.31-40
    • /
    • 2014
  • The management of vehicular supply of "perishable" construction material, such as concrete mixes, faces a series of uncertainties such as weather, daily traffic patterns and accidents. Presented in this paper is a logistics control model for managing a hauling fleet with interrelated processes at both ends and queue capacities. Discrete event simulation is used to model the complex interactions of production units and the randomness of the real world. Two alternative strategies for ready mix concrete delivery, with and without an off-site waiting queue, are studied to compare supply performance. Secondly, the paper discusses the effect of an agent-based GPS tracking system providing real-time travel data that lessens the uncertainty of trucking time. The results show that the combination of GPS information with off-site queuing reduces productivity loss and process wastes of concrete placement as well as the idleness of supply trucks when crew or pump experience an unexpected stoppage.

Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals (이동단말의 로밍에 따른 VoIP 서비스 품질 분석)

  • Choi, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.747-752
    • /
    • 2012
  • In this paper we evaluated by simulation the effect of VoIP roaming and data traffic roaming on other VoIP calls. Regardless of MIPv4 or MIPv6, the quality of voice of all VoIP calls falls down quickly to the bottom level after the start of roaming by one voice terminal. That was caused by the excessive retransmission on downlink. Thus it seems that we need a kind of call admission control when we adopt the roaming service on VoIP calls. Data traffic degrades also the voice quality especially at the foreign agent side.

Recipient S-CSCF Assured (RSA) Session Transfer for IMS based NGN

  • Yun, Chang-Ho;Cho, A-Ra;Kim, Seung-Geun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.355-364
    • /
    • 2010
  • A session transfer method, referred to as a Recipient Serving-call session control function (S-CSCF) Assured (RSA), is proposed in order to support both session mobility and consistency in IP multimedia subsystem (IMS) based next generation network (NGN). RSA session transfer simplifies a basic session transfer operation specified in [1] by using the user agent client (UAC) like characteristics of an S-CSCF. To show its efficiency, the session transfer delay and the traffic cost of RSA session transfer are investigated and compared with those of existing session transfer applications, including Assured and Consultative session transfers, by practically considering multiple session transfer failures. It is shown that RSA session transfer can further improve user experience by reducing session transfer delay as well as traffic cost than Assured and Consultative session transfers.

가변교통상황 제어를 위한 분산교통신호 제어 에이전트의 설계

  • 박길철;구하성;임한규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1998.10a
    • /
    • pp.777-784
    • /
    • 1998
  • 본 논문은 시간 혹은 주변의 상황에 따라 가변적으로 변화하는 교통량을 스스로 파악하여 효과적으로 제어할 수 있는 에이젼트를 설게하고 가상 실험을 하여 기존의 고정식 신호등과 비교 평가하였다. 대부분의 교통 신호등은 교통량의 변화에 능동적으로 대응하지 못하고 미리 설정해 놓은 시간에 따라 각 방향의 신호를 주고 있기 때문에 교통량의 변화에 적절히 대응하지 못하고 있다. 또한 급작스런 교통상황의 변화에 대응 할 수 없다. 이러한 문제점을 해결하기 위해 DTCA(Distributed Traffic Control Agent)가 설계되었다. DTCA는 교차로의 교통정보를 수집하여 신호등을 제어한는 정보로 활용하고, 인접 교통제어 에이젼트와 교신한면서 최적의 신호시간과 신호주기를 결정한다. DCTA는 시간대별, 요일별 교통과 통계를 수집, 분석한 데이터를 기초로 하고 현재 교통량을 동적으로 수집 그리고 주변의 상호제어 에이젼트와 정보를 교환하여 비정상적인 교통흐름을 대처할 수있다.

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Polling Method based on Weight Table for Efficient Monitoring (효율적인 모니터링을 위한 가중치 테이블 기반의 폴링기법)

  • Mun, Hyung-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.5-10
    • /
    • 2015
  • With the advance of ICT, understanding the condition of network and analysing network monitoring have become an important issue. On the TCP/IP network, SNMP is the typical protocol that catches the condition of network by using polling method. If polling method is implemented for a long period, to catch the change of the condition of the network is not easy. On the other hand, in case of short-term polling, even if it could catch the condition of the network in real time, responsive messages to results of the polling cause the increase of traffic and therefore burden the network. There have been studies to control the overhead of responsive messages by controlling the polling period. However, not considering the characteristics of an agent, and running randomly, they cannot decrease the overhead although they would have an instant effect. This paper suggests an efficient polling method that decreases the traffic overhead of polling and catches the condition of the network in real time. Proposed method an polling for a short period and gave weight based on the characteristics of agents to catch the network condition, and a manager decided polling differentially based on the weight so that it decreased the overhead of polling traffic.

  • PDF

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF