• Title/Summary/Keyword: Traffic data

Search Result 4,769, Processing Time 0.03 seconds

Exploring a Balanced Share of Slow Charging Options by Places Based on Heterogeneous Travel and Charging Behavior of Electric Vehicle Users (장소별 완속충전기 적정 보급 비율에 관한 연구 : 전기차 이용자의 통행 및 충전행태에 따른 이질성을 중심으로)

  • Jae Hyun Lee;Seo Youn Yoon;Hyeonmi Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.21-35
    • /
    • 2022
  • With the support of local and central governments, various incentive policies for "green" cars have been established, and the number of electric vehicle users has been rapidly increasing in recent years. As a result, much attention is being given to establishing a user-centered charging infrastructure. A standard for the number of electric vehicle chargers to be supplied is being prepared based on building characteristics, but there is quite limited research on the appropriate ratio of slow and fast chargers based on the characteristics of each place. Therefore, this study derived an appropriate penetration ratio based on data about the distribution ratio of common slow chargers. These data were collected using a survey of actual electric vehicle users. Next, an analysis was done on how to categorize the needs of charging environments and to determine what criteria or characteristics to use for categorization. Based on the results of the survey analysis, three types of places were derived. Type-1 places require 10% of chargers to be slow chargers, Type-2 places require 40-60% of chargers to be slow chargers (i.e., around equal distribution of slow and fast chargers), and Type-3 places require more than 80% of chargers to be slow chargers. The required levels of slow chargers were classified by place type and by individual using latent class cluster analysis, which made it possible to categorize them into five clusters related to socioeconomic variables, vehicle characteristics, traffic, and charging behaviors. It was found that there was a high correlation between charging behavior, weekend travel behavior, gender, and income. The results and insights from this study could be used to establish charging infrastructure policies in the future and to prepare standards for supplying charging infrastructure according to changes in the electric vehicle market.

Behavior of Truss Railway Bridge Using Periodic Static and Dynamic Load Tests (주행 열차의 정적 및 동적 재하시험 계측 데이터를 이용한 트러스 철도 교량의 주기적 거동 분석)

  • Jin-Mo Kim;Geonwoo Kim;Si-Hyeong Kim;Dohyeong Kim;Dookie Kim
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.6
    • /
    • pp.120-129
    • /
    • 2023
  • To evaluate the vertical loads on railway bridges, conventional load tests are typically conducted. However, these tests often entail significant costs and procedural challenges. Railway conditions involve nearly identical load profiles due to standardized rail systems, which may appear straightforward in terms of load conditions. Nevertheless, this study aims to validate load tests conducted under operational train conditions by comparing the results with those obtained from conventional load tests. Additionally, static and dynamic structural behaviors are extracted from the measurement data for evaluation. To ensure the reliability of load testing, this research demonstrates feasibility through comparisons of existing measurement data with sensor attachment locations, train speeds, responses between different rail lines, tendency analysis, selection of impact coefficients, and analysis of natural frequencies. This study applies to the Dongho Railway Bridge and verifies the applicability of the proposed method. Ten operational trains and 44 sensors were deployed on the bridge to measure deformations and deflections during load test intervals, which were then compared with theoretical values. The analysis results indicate good symmetry and overlap of loads, as well as a favorable comparison between static and dynamic load test results. The maximum measured impact coefficient (0.092) was found to be lower than the theoretical impact coefficient (0.327), and the impact influence from live loads was deemed acceptable. The measured natural frequencies approximated the theoretical values, with an average of 2.393Hz compared to the calculated value of 2.415Hz. Based on these results, this paper demonstrates that for evaluating vertical loads, it is possible to measure deformations and deflections of truss railway bridges through load tests under operational train conditions without traffic control, enabling the calculation of response factors for stress adjustments.

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast (오버레이 멀티캐스팅에서 트리의 스위칭을 고려한 빠른 멤버 가입 방안에 관한 연구)

  • Cho, Sung-Yean;Rho, Kyung-Taeg;Park, Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.625-634
    • /
    • 2003
  • More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Evaluation of Etiological Factors for Injuries at Oral and Maxillofacial Area (구강악안면부 외상발생의 역학적 평가)

  • Bae, Sung-Suk;Hwang, Soon-Jung
    • Journal of dental hygiene science
    • /
    • v.12 no.4
    • /
    • pp.310-319
    • /
    • 2012
  • In this study, 1,495 cases of computerized data collected as disease entities of oral and maxillofacial injuries among patient visiting S university hospital located in Seoul in 2009 were analyzed and following results were obtained. It was found that the injury incidence in male was greater than in female (1.49:1), it occurred most frequently in the age of 7~14 years old (19.6%), and its most frequent cause was falling down (25.9%). Injuries occurred in other place including beach and open-air (24.7%) most frequently, often developed in anterior teeth (43.2%) and posterior teeth (43.1%), their incidence was relatively higher between 15:00~17:00 (10.4%) and 19:00~23:00 (7.1%) O'clock. In the relationship between causes of the injury and the diagnosis based on the international classification of disease), falling, fall, impingement, violence, traffic accident, sports and own making accident caused most frequently lip and oral open injuries (S01.5), open fracture of tooth (S02.51), close fracture of tooth (S02.50), close fracture of mandible (S02.60), close fracture of tooth (S02.50), respectively. From the above results, it is necessary to understand general characteristics of oral and maxillofacial injuries and to consider their trends for the establishment of systematic complement policies and for the performing safety training and public relations activities.

The Simulation for the Organization of Fishing Vessel Control System in Fishing Ground (어장에 있어서의 어선관제시스템 구축을 위한 모의실험)

  • 배문기;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.3
    • /
    • pp.175-185
    • /
    • 2000
  • This paper described on a basic study to organize fishing vessel control system in order to control efficiently fishing vessel in Korean offshore. It was digitalized ARPA image on the fishing processing of a fleet of purse seiner in conducting fishing operation at Cheju offshore in Korea as a digital camera and then simulated by used VTMS. Futhermore, it was investigated on the application of FVTMS which can control efficiently fishing vessels in fishing ground. The results obtained were as follows ; (1) It was taken 16 minutes and 35 minutes to casting and hauling net in fishing processing respectively. The length of rope pulled by scout boat was 200m, tactical diameter in casting net was 340.8m, turning speed was 6kts as well. (2) The processing of casting and hauling net was moved to SW, NE as results of simulation when the current direction and speed set into NE, 2kts and SW, 2kts respectively. Such as these results suggest that can predict to control the fishing vessel previously with information of fishing ground, fishery and ship's maneuvering, etc. (3) The control range of VTMS radar used in simulation was about 16 miles. Although converting from a radar of the control vessel to another one, it was continuously acquired for the vector and the target data. The optimum control position could be determined by measuring and analyzing to distance and direction between the control vessel and the fleet of fishing vessel. (4) The FVTMS(fishing vessel traffic management services) model was suggested that fishing vessels received fishing conditions and safety navigation information can operate safely and efficiently.

  • PDF

A Study on the Indoor-Outdoor $NO_2$ Levels and Personal Exposures to $NO_2$ with Analysis of factors Affecting the $NO_2$ Concentrations - Centering on Urban Homes and Housewives - (실내외 $NO_2$농도 및 $NO_2$개인폭로량과 이들에 영향을 미치는 요인에 관한 연구 -도시지역 주택 및 주부를 대상으로-)

  • Chun, Jin-Ho;Lee, Chae-Un;Kim, Joon-Youn;Chung, Yo-Han
    • Journal of Preventive Medicine and Public Health
    • /
    • v.21 no.1 s.23
    • /
    • pp.132-151
    • /
    • 1988
  • This study was conducted to establish the control program for preventing unfavorable health effects of nitrogen dioxide($NO_2$) exposure in homes by preparing the fundamental data for evaluation of relation-ships between $NO_2$ levels and influencing factors through measurements of indoor-outdoor $NO_2$ levels and personal $NO_2$ exposures for housewives with questionnaire survey on 172 homes in Pusan area from April to June, 1987 $NO_2$ measurements were made by using diffusion tube samplers(Palmes tube $NO_2$ sampler) for one week at 4 sites in homes ; kitchen(KIT), bedroom(BED), living room(LIV), outdoor(OUT) and near the collar of housewives(personal exposure livel, PNO). The details of questionnaire were number of household members(FAM), number of regular smokers (SMOKER), daily number of meals eaten(MEAL), type of housing units(HOUSE), location of house with distance from the heavy traffic roads as walking time(DIST), and of kitchen(KAREA), kind of cooking fuels(FUEL), cooking time of each meal(CTIME), usage of kitchen fan for cooking(FAN), type of heating facilities(HEAT) and so on of subject homes. The Obtained results were as fellows : 1) The mean $NO_2$ level was significantly higher at indoors than outdoors(p<0.01) and the kitchen $NO_2$ level was the highest with $33.7{\pm}13.6ppb$(9.5-81.5ppb). The mean personal exposure level of $NO_2$ for housewives was $20.6{\pm}8.8ppb$(3.1-46.9ppb). 2) The mean indoor $NO_2$ level was significantly higher in the group of household members above 5 than below 4(p<0.05), in detached dwellings than apartments(p<0.001), within 5 minutes of distance than over 5 minutes(p<0.001), in the group of unusing fan(p<0.001), in the group of longer cooking time(p<0.001), and it was in order of coal briquette, gas, electricity and oil by kind of cooking fuels(p<0.05). 3) Variables showing significant correlation(p<0.001) with indoor $NO_2$ level were kitchen $NO_2$ level(r=0.8677), cooking time(r=0.5921), outdoor $NO_2$ level(r=0.5192), personal $NO_2$ exposure level(r=0.4615), usage of kitchen fan(r=0.3573) and location of house(r=-0.2988) 4) As a result of multiple regression analysis, the most significant influencing variable to the kitchen $NO_2$ level was cooking time[KIT=$-0.378{\pm}11.772$(CTIME)+0.298(OUT)+3.102(FAN)], it was kitchen $NO_2$ level to the indoor $NO_2$ level[IND=6.996+0.458(KIT)+0.230(OUT)-1.127(KAREA)], and it was indoor $NO_2$ level to the personal $NO_2$ exposure level[PNO=15.562+0.729(IND)-4.542(DIST)-0.200(KIT)] 5) It was recognized that aritificial ventilation in the kitchen, suppression of unnecessary combustion and replacement of cooking fuel, as much as possible, were effective means for decreasing indoor $NO_2$ levels in homes.

  • PDF

Geographical Structure of View Point in the Landscape Experience on Mountain in Yangsan City (경관체함이 발생하는 조망점의 지리구조에 관한 연구;양산시 소재 산지를 대상으로)

  • Kang, Young-Jo;Cha, Young-Chae;Cha, Myeong-Sook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.75-84
    • /
    • 2008
  • The purpose of this research is to find the visual characteristics and geographic structure in a landscape of mountains in Yangsan City. In order to carry out this study, 40 view points of 6 mountains in Yangsan City were selected to experience the mountainscape. The results are as follows. The mountainscape of Yangsan City was confirmed from the view point to the object of view as ranging in middle distance reverse, the angle of elevation 11${\sim}13^{\circ}$ which give the impression of confronted to the mountain, and the horizontal angle 50${\sim}90^{\circ}$ which gives the impression of vastness. This shows that mountainscapes are perceived impressively when seeing the mountain with the meaning to feel the texture of the mountain as a confrontational relationship rather than a pictorial relationship. The geographic structure of the view point which occurs in scenes of impressive experience is classified into eight types and its characteristics are investigated. The first type is corridor, and it emerges in a long narrow linear structure made from the surrounding environment with buildings or street trees. The second is tunnel in which a vision and light hidden while passing underneath a bridge, high-level road, or inside a tunnel can be seen. Third, the maze is formed by the mountain shape. The hill spur emerges when the direction of traffic changes after turning the coner of a building or mountain edge. The hill ground emerges at the top of a hill slope. Next, parallel emerges when the observer and the mountain are in the same direction of process. Confrontation occurs when confronting an isolated mountain. Finally, the view point emerges when passing through major points such as a bridge or square and the boundary of a village or city. This research arranged visual conditions that create impressive mountainscapes. Geographic characteristics in terms of Types that make possible to experience mountainscapes were described. The results of this research will be basic data collected for the management and preservation of mountainscapes and for landscape effect evaluation. Furthermore, this research suggests theoretical evidence to preserve and manage geographic structures that create view experiences as well as to preserve the landscape in terms of view points.

Dynamic Decision Making using Social Context based on Ontology (상황 온톨로지를 이용한 동적 의사결정시스템)

  • Kim, Hyun-Woo;Sohn, M.-Ye;Lee, Hyun-Jung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.43-61
    • /
    • 2011
  • In this research, we propose a dynamic decision making using social context based on ontology. Dynamic adaptation is adopted for the high qualified decision making, which is defined as creation of proper information using contexts depending on decision maker's state of affairs in ubiquitous computing environment. Thereby, the context for the dynamic adaptation is classified as a static, dynamic and social context. Static context contains personal explicit information like demographic data. Dynamic context like weather or traffic information is provided by external information service provider. Finally, social context implies much more implicit knowledge such as social relationship than the other two-type context, but it is not easy to extract any implied tacit knowledge as well as generalized rules from the information. So, it was not easy for the social context to apply into dynamic adaptation. In this light, we tried the social context into the dynamic adaptation to generate context-appropriate personalized information. It is necessary to build modeling methodology to adopt dynamic adaptation using the context. The proposed context modeling used ontology and cases which are best to represent tacit and unstructured knowledge such as social context. Case-based reasoning and constraint satisfaction problem is applied into the dynamic decision making system for the dynamic adaption. Case-based reasoning is used case to represent the context including social, dynamic and static and to extract personalized knowledge from the personalized case-base. Constraint satisfaction problem is used when the selected case through the case-based reasoning needs dynamic adaptation, since it is usual to adapt the selected case because context can be changed timely according to environment status. The case-base reasoning adopts problem context for effective representation of static, dynamic and social context, which use a case structure with index and solution and problem ontology of decision maker. The case is stored in case-base as a repository of a decision maker's personal experience and knowledge. The constraint satisfaction problem use solution ontology which is extracted from collective intelligence which is generalized from solutions of decision makers. The solution ontology is retrieved to find proper solution depending on the decision maker's context when it is necessary. At the same time, dynamic adaptation is applied to adapt the selected case using solution ontology. The decision making process is comprised of following steps. First, whenever the system aware new context, the system converses the context into problem context ontology with case structure. Any context is defined by a case with a formal knowledge representation structure. Thereby, social context as implicit knowledge is also represented a formal form like a case. In addition, for the context modeling, ontology is also adopted. Second, we select a proper case as a decision making solution from decision maker's personal case-base. We convince that the selected case should be the best case depending on context related to decision maker's current status as well as decision maker's requirements. However, it is possible to change the environment and context around the decision maker and it is necessary to adapt the selected case. Third, if the selected case is not available or the decision maker doesn't satisfy according to the newly arrived context, then constraint satisfaction problem and solution ontology is applied to derive new solution for the decision maker. The constraint satisfaction problem uses to the previously selected case to adopt and solution ontology. The verification of the proposed methodology is processed by searching a meeting place according to the decision maker's requirements and context, the extracted solution shows the satisfaction depending on meeting purpose.

A Comparison of Single and Multi-matrix Models for Bird Strike Risk Assessment (단일 및 다중 매트릭스 모델의 비교를 통한 항공기-조류 충돌 위험성 평가 모델 분석)

  • Hong, Mi-Jin;Kim, Myun-Sik;Moon, Young-Min;Choi, Jin-Hwan;Lee, Who-Seung;Yoo, Jeong-Chil
    • Korean Journal of Environment and Ecology
    • /
    • v.33 no.6
    • /
    • pp.624-635
    • /
    • 2019
  • Bird strike accidents, a collision between aircraft and birds, have been increasing annually due to an increasing number of aircraft operating each year to meet heavier demand for air traffic. As such, many airports have conducted studies to assess and manage bird strike risks effectively by identifying and ranking bird species that can damage aircraft based on the bird strike records. This study was intended to investigate the bird species that were likely to threaten aircraft and compare and discuss the risk of each species estimated by the single-matrix and multi-matrix risk assessment models based on the Integrated Flight Information Service (IFIS) data collected in Gimpo, Gimhae and Jeju Airports in South Korea from 2005 to 2013. We found that there was a difference in the assessment results between the two models. The single-matrix model estimated 2 species and 6 taxa in Gimpo and Gimhae Airports and 2 species and 5 taxa in Jeju Airport to have the risk score above "high," whereas the multi-matrix model estimated 3 species and 5 taxa in Gimpo Airport, 4 species and 5 taxa in Gimhae Airport, and 2 species and 3 taxa in Jeju Airport to have the risk score above "very high." Although both models estimated the similar high-risk species in Gimpo and Gimhae Airports, there was a significant difference in Jeju Airport. Gimpo and Gimhae Airports are near the estuary of a river, which is an excellent habitat for large and heavy waterbirds. On the other hand, Jeju Airport is near the coast and the city center, and small and light bird species are mostly observed. Since collisions with such species have little effect on aircraft fuselage, the impact of common variables between the two models was small, and the additional variables caused a significant difference between the estimation by the two models.