• Title/Summary/Keyword: Traffic identification

Search Result 297, Processing Time 0.029 seconds

A Forecast Method of Marine Traffic Volume through Time Series Analysis (시계열 분석을 통한 해상교통량 예측 방안)

  • Yoo, Sang-Rok;Park, Young-Soo;Jeong, Jung-Sik;Kim, Chul-Seong;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.6
    • /
    • pp.612-620
    • /
    • 2013
  • In this study, time series analysis was tried, which is widely applied to demand forecast of diverse fields such as finance, economy, trade, and so on, different from previous regression analysis. Future marine traffic volume was forecasted on the basis of data of the number of ships entering Incheon port from January 1996 to June 2013, through courses of stationarity verification, model identification, coefficient estimation, and diagnostic checking. As a result of prediction January 2014 to December 2015, February has less traffic volume than other months, but January has more traffic volume than other months. Also, it was found out that Incheon port was more proper to ARIMA model than exponential smoothing method and there was a difference of monthly traffic volume according to seasons. The study has a meaning in that future traffic volume was forecasted per month with time series model. Also, it is judged that forecast of future marine traffic volume through time series model will be the more suitable model than prediction of marine traffic volume with previous regression analysis.

YOLO-based Traffic Signal Detection for Identifying the Violation of Motorbike Riders (YOLO 기반의 교통 신호등 인식을 통한 오토바이 운전자의 신호 위반 여부 확인)

  • Wahyutama, Aria Bisma;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.141-143
    • /
    • 2022
  • This paper presented a new technology to identify traffic violations of motorbike riders by detecting the traffic signal using You Only Look Once (YOLO) object detection. The hardware module that is mounted on the front of the motorbike consists of Raspberry Pi with a camera to run the YOLO object detection, a GPS module to acquire the motorcycle's coordinate, and a LoRa communication module to send the data to a cloud DB. The main goal of the software is to determine whether a motorbike has violated a traffic signal. This paper proposes a function to recognize the red traffic signal colour with its movement inside the camera angle and determine that the traffic signal violation happens if the traffic signal is moving to the right direction (the rider turns left) or moving to the top direction (the riders goes straight). Furthermore, if a motorbike rider is violated the signal, the rider's personal information (name, mobile phone number, etc), the snapshot of the violation situation, rider's location, and date/time will be sent to a cloud DB. The violation information will be delivered to the driver's smartphone as a push notification and the local police station to be used for issuing violation tickets, which is expected to prevent motorbike riders from violating traffic signals.

  • PDF

TID providing method for IEEE 802.l1e MAC protocol in NCTUns simulator (NCTUns 시뮬레이터에서 IEEE 802.11e MAC 프로토콜을 위한 TID 제공방안)

  • 김영환;허필영;석정봉
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.212-215
    • /
    • 2003
  • 본 논문에서는 IEEE 802.11e MAC (Medium Access Control) 프로토콜을 NS-2 등과 같은 유명한 시뮬레이터들보다도 진보적인 NCTUns 시뮬레이터를 이용하여 개발하고자 하면서, 각 MSDU (MAC Service Data Unit)마다 제공되어야 하는 TID (Traffic Identification) 를 결정하는 방안을 모색하고 있다. 따라서 본론에서는 IEEE 802.l1e MAC 프로토콜과 NCTUns 시뮬레이터 에 대해서 기술하며 본 논문에서 제안하는 방법에 대해서 서술한다.

  • PDF

A Survey on Identification Technology of Low-altitude Small Drones and Suggestion of an Identification System (저고도 소형드론 식별기술 동향 조사 및 식별시스템 제안)

  • Shin, Jaeho;Shin, Seungchan;Ko, Sangho;Kang, Kyu-min;Hwang, Sunghyun
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.18-25
    • /
    • 2020
  • This paper provides the basic data of low-altitude small drone management technology to solve the problem of drone's dysfunction that generally increases with the demand of the drone. Accordingly, various low-altitude small drone identification technology employed in many countries were investigated and analyzed. Herein, the research cases which have been developed to obtain diverse information such as the flight's plan, pilot's identity and contact number, and the flight's information such as the location and speed of small drones were mainly investigated. Furthermore, the list of the features of each case was analyzed. Moreover, the present paper suggests a drone identification system configuration which complements the problems of existing technologies and verifies the proposed system through a flight test.

Performance Evaluation of Anti-collision Algorithms in the Low-cost RFID System (저비용 RFID 시스템에서의 충돌방지 알고리즘에 대한 성능평가)

  • Quan Cheng-hao;Hong Won-kee;Lee Yong-doo;Kim Hie-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.17-26
    • /
    • 2005
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects attached with electronic tags by using radio wave. For the implementation of an RFID system, an anti-collision algorithm is required to identify several tags within the RFID reader's range. Few researches report the performance trade-off among anti-collision algorithms in terms of the communications traffic between the reader and tags, the identification speed, and so on. In this paper, we analyze both tree based memoryless algorithms and slot aloha based algorithms that comprise of almost every class of existing anti-collision algorithms. To compare the performance, we evaluated each class of anti-collision algorithms with respect to low-cost RFID system with 96-bit EPC(Electronic Product Code). The results show that the collision tracking tree algorithm outperforms current tree based and aloha based algorithms by at least 2 times to 50 times.

Designing A V2V based Traffic Surveillance System and Its Functional Requirements (V2V기반 교통정보수집체계 설계 및 요구사항분석)

  • Hong, Seung-Pyo;Oh, Cheol;Kim, Won-Kyu;Kim, Hyun-Mi;Kim, Tae-Hyung
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.251-264
    • /
    • 2008
  • One of the crucial elements to fully facilitate the various benefits of intelligent transportation systems (ITS) is to obtain more reliable traffic monitoring in real time. To date, point and section-based traffic measurements have been available through existing surveillance technologies, such as loops and automatic vehicle identification (AVI) systems. However, seamless and more reliable traffic data are required for more effective traffic information provision and operations. Technology advancements including vehicle tracking and wireless communication enable the acceleration of the availability of individual vehicle travel information. This study presents a UBIquitous PRObe vehicle Surveillance System (UBIPROSS) using vehicle-to-vehicle (V2V) wireless communications. Seamless vehicle travel information, including origin-destination information, speed, travel times, and other data, can be obtained by the proposed UBIPROSS. A set of parameters associated with functional requirements of the UBIPROSS, which include the market penetration rate (MPR) of equipped vehicles, V2V communication range, and travel time update interval, are investigated by a Monte Carlo simulation- (MCS) based evaluation framework. In addition, this paper describes prototypical implementation. Field test results and identified technical issues are also discussed. It is expected that the proposed system would be an invaluable precursor to develop a next-generation traffic surveillance system.

Estimating Road Design Hourly Volume via Inflection Point Identification (변곡점 탐색을 통한 도로설계시간계수 산정)

  • Ahn, Seongchae;Choi, Keechoo;Kim, Boowon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2427-2435
    • /
    • 2013
  • Design hourly volume and the K-factor, first proposed by FHWA in the 1950s, is based on the 30th hourly traffic volume during a year (out of 8,760 hours). It was used when surveying the traffic volume was laborious in the past and is still being used now although it leaves some to be desired for practical applications. More reasonable K-factor for better design, based on theoretical evidence, is needed. This paper proposes the knee searching method based on simple linear regression to find out the inflection point of the volume ranking curve that describe the annual 8,760 hourly traffic volumes. The method was applied to the Chungcheong province's national highway, and the results were compared to the existing guidelines' values of K-factors. Identified design hourly traffic volumes ranked between 43rd to 694th, which is much lower than the 30th volume, meaning that some overdesign examples are inevitable if the conventional $30^{th}$ volume is used.

GENESIS: An Automatic Signature-generating Method for Detecting Internet Disk P2P Application Traffic (GENESIS: Internet Disk P2P 트래픽 탐지를 위한 시그너춰 자동 생성 방안)

  • Lee, Byung-Joon;Yoon, Seung-Hyun;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.246-255
    • /
    • 2007
  • Due to the bandwidth-consuming characteristics of the heavy-hitter P2P applications, it has become critical to have the capability of pinpointing and mitigating P2P traffic. Traditional port-based classification scheme is no more adequate for this purpose because of newer P2P applications, which incorporating port-hopping techniques or disguising themselves as HTTP-based Internet disk services. Alternatively, packet filtering scheme based on payload signatures suggests more practical and accurate solution for this problem. Moreover, it can be easily deployed on existing IDSes. However, it is significantly difficult to maintain up-to-date signatures of P2P applications. Hence, the automatic signature generation method is essential and will be useful for successful signature-based traffic identification. In this paper, we suggest an automatic signature generation method for Internet disk P2P applications and provide an experimental results on CNU campus network.

Real-time monitoring of berthing/deberthing operations process for entering/leaving vessels using VTS system in Busan northern harbor, Korea (부산 북항에서 VTS 시스템에 의한 출입항 선박의 접이안 작업과정의 실시간 모니터링)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.45 no.3
    • /
    • pp.165-176
    • /
    • 2009
  • The process of berthing/deberthing operations for entering/leaving vessels in Busan northern harbor was analyzed and evaluated by using an integrated VTS(vessel traffic service) system installed in the ship training center of Pukyong National University, Busan, Korea. The integrated VTS system used in this study was consisted of ARPA radar, ECDIS(electronic chart display and information system), backup(recording) system, CCTV(closed-circuit television) camera system, gyro-compass, differential GPS receiver, anemometer, AIS(automatic identification system), VHF(very high frequency) communication system, etc. The network of these systems was designed to communicate with each other automatically and to exchange the critical information about the course, speed, position and intended routes of other traffic vessels in the navigational channel and Busan northern harbor. To evaluate quantitatively the overall dynamic situation such as maneuvering motions for target vessel and its tugboats while in transit to and from the berth structure inside a harbor, all traffic information in Busan northern harbor was automatically acquired, displayed, evaluated and recorded. The results obtained in this study suggest that the real-time tracking information of traffic vessels acquired by using an integrated VTS system can be used as a useful reference data in evaluating and analyzing exactly the dynamic situation such as the collision between ship and berth structure, in the process of berthing/deberthing operations for entering/leaving vessels in the confined waters and harbor.

Analysis of Crash Potential by Vehicle Interactions Using Driving Simulations (주행 시뮬레이션을 이용한 차량간 상호작용에 따른 사고발생가능성 분석)

  • Kim, Yunjong;Oh, Cheol;Park, Subin;Choi, Saerona
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.98-112
    • /
    • 2018
  • Intentional aggressive driving (IAD) is a very dangerous driving behavior that threatens to attack the adjacent vehicles. Most existing studies have focused on the independent driving characteristics of attack drivers. However, the identification of interactions between the offender and the victim is necessary for the traffic safety analysis. This study established multi-agent driving simulation environments to systematically analyze vehicle interactions in terms of traffic safety. Time-to-collision (TTC) was adopted to quantify vehicle interactions in terms of traffic safety. In addition, a exponential decay function was further applied to compare the overall pattern of change in crash potentials when IAD events occurred. The outcome of this study would be useful in developing policy-making activities to enhance traffic safety by reducing dangerous driving events including intentional aggressive driving.