• Title/Summary/Keyword: Traffic information collection system

Search Result 121, Processing Time 0.022 seconds

Test-bed Operation for Nation-wide Interoperable Transportation Card (전국호환 교통카드를 위한 테스트베드 운영)

  • Han, Ho-Hyeorn;Jee, Dong-Mok;Park, Ha-Na;Kim, Hye-Hyeon;Kim, Tae-Hee;Maeng, Jae-Hwan;Lee, Ki-Han
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.5
    • /
    • pp.1-13
    • /
    • 2010
  • In this paper, we describe the result of the test-bed on Nation-wide Interoperable Transportation System connected with Interoperable Traffic Information Collection System, which was developed by Korea Financial Telecommunications & Clearings, KOREAIL NETWORKS, HiPlusCard and Samsung SDS. we constructed Nation-wide Interoperable Transportation System on 4 downtown bus routes, 20 stations on line 1 subway, 2 stations of a train and 2 sections of the Honam highway in Gwangju and Interoperable Traffic Information Collection System in Seoul University IC Card Center. So we operated that by 480 Several staff were given a test card and asked to try it for about 6 months. This test-bed is for demonstrates the accuracy, safety and credibility of the Nation-wide Interoperability standard technology and it can be applied to all of transportation practically. When the staffs contact the card to Purchase terminal, the card performs transaction with Purchase SAM in the terminal, then transactions ara used to calculate in Settlement system and Interoperable Traffic Information Collection System. Through the test-bed, we examined this process and found unexpected problems happening during the test operation and have successfully solved them. In addition, the results of the test-bed let us know what additional improvement might be required for System. The successful run of the test-bed was verified by an evaluation of the test-bed staff and a public survey.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

Rate of Probe Vehicles for the Collection of Traffic Information on Expressways (고속도로 교통정보 취득을 위한 프루브 차량 비율 산정 연구)

  • Kim, Jiwon;Jeong, Harim;Kang, Sungkwan;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.6
    • /
    • pp.262-274
    • /
    • 2019
  • The purpose of this study is to estimate the minimum proportion of probe vehicles for obtaining expressway traffic information using VISSIM, a micro traffic simulation model, between Yongin IC and Yangji IC on Yeongdong Expressway. 7,200 scenarios were created for the experiment, and 40 scenarios were adopted using the Latin hypercube sampling method because it was difficult to perform all the scenarios through experiments. The reliability of the experiment was improved by adding a situation when the general situation and the accident situation exist. In the experiments, the average travel time of probe vehicles at different market penetration rates were compared with the average travel time of the entire vehicles. As a result, the minimum market penetration rate of probe vehicles for obtaining expressway traffic information was found to be 45%. In addition, it is estimated that 25% market penetration rate of probe vehicle can meet 70% of traffic situations in accident scenario.

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

A Study on Optimal Traffic Detection Systems by Introduction of Section Detection System (구간검지체계 도입을 통한 교통검지체계 설치기준 연구)

  • Kim, Nak-Joo;Lee, Seung-Jun;Oh, Sei-Chang;Son, Young-Tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.47-63
    • /
    • 2011
  • A traffic detection system can be deemed as a traffic data and information collection system to serve traffic policies, traffic management, and user services. The system plays a crucial role in verifying whether or not the current traffic system has issues or problems by checking out traffic data. In addition, the system does so in finding out a point or a section where an issue or a problem has occurred, if any, and in examining the causes of the issue or problem, the extent of its impact that has occurred and spread, and a method for resolving it. However, the existing point detection system of Korea has too many flaws. In order to fix the flaws, in this paper, the theoretical characteristics of the section detection system were researched in relation to the calculation of travel time. In addition, the travel time of probe cars was obtained by field survey, and it was compared to that of spot and section detection data. Then, simulation was performed to determine the optimal section detection interval. In conclusion, introduction of optimal section detection system was examined in order to achieve the advanced road management including traffic policy, traffic management, and user services.

Implementation of exclusive viewer system for marine transportation facilities using electronic chart (전자해도를 이용한 해양교통시설 전용 뷰어시스템 구현)

  • Park, Se-il;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.47-48
    • /
    • 2018
  • In this paper, by utilizing the function of the electronic chart display information system, which is a device that displays the waterway information such as the position, sink, speed, chart information, and depth of the ship, Implementation of electronic chart viewer system focusing on information collection, installation, operation and maintenance of traffic facilities.

  • PDF

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

design and Implementation of Performance manager System for Web Application Service management (웹 응용 서비스 관리를 위한 성능 관리자 시스템의 설계 및 구현)

  • Han, Jeong-Soo;Ahn, Seong-Jin;Chung, Jin-Wook;Park, Hyoung-Woo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.161-171
    • /
    • 1998
  • In this paper, we shows the implementation of Web based performance manager which analyze the traffic of a Web server to support the diagnostics of it. The manager monitors the HTIP traffic by polling and measures and presents is performance on demand. To enhance the adaptability of management interface Web based interfaces with JAVA is used. Recently, the need of traffic management on s Web has grown, because of increasing Web traffic. Therefore, the traffic management of Web service and the effective management of a Web server's performance are needed. We have designed interfaces with which is comprised of Collection-Request, Analysis-Request, Realtime-Monitoring, Comparison-Analysis on a client with Web Browser on a network, and implemented the server system that can analyze these requests. Also we have introduced some perfonnance indicator by referring a Web related MIB. Also, we have designed and developed a message format for communication between the Web client and the server system.

  • PDF

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF