• Title/Summary/Keyword: Traffic monitoring and analysis

Search Result 232, Processing Time 0.032 seconds

Single Image Dehazing: An Analysis on Generative Adversarial Network

  • Amina Khatun;Mohammad Reduanul Haque;Rabeya Basri;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.136-142
    • /
    • 2024
  • Haze is a very common phenomenon that degrades or reduces the visibility. It causes various problems where high quality images are required such as traffic and security monitoring. So haze removal from images receives great attention for clear vision. Due to its huge impact, significant advances have been achieved but the task yet remains a challenging one. Recently, different types of deep generative adversarial networks (GAN) are applied to suppress the noise and improve the dehazing performance. But it is unclear how these algorithms would perform on hazy images acquired "in the wild" and how we could gauge the progress in the field. This paper aims to bridge this gap. We present a comprehensive study and experimental evaluation on diverse GAN models in single image dehazing through benchmark datasets.

An Acoustic Analysis of Noise Environments during Mobile Device Usage

  • Park, Hyung Woo
    • International journal of advanced smart convergence
    • /
    • v.6 no.2
    • /
    • pp.16-23
    • /
    • 2017
  • In contemporary modern society, people are constantly exposed to many kinds of noise, such as that from machinery, aircraft, construction sites, or road traffic. Noise is considered one of the most indispensable and influential parts of human life. This study investigates the acoustic characteristics of noise transfer from external sources to the human ear. For this study, we measured and analyzed various types of noise environments, installed monitoring speakers in a semi-anechoic room, and conducted intentional noise-filled experiments. In this environment, the size of the sounds generated by use of a portable device was also measured and the SNR (signal to noise ratio) calculated to study the influence of the noise. As sound is transmitted to the ear and the human body, it affects not only auditory damage but also other parts of the body. In this paper, we propose a proper SNR for noise emitted by portable IT equipment to prevent hearing loss when IT equipment is used.

Vehicle-logo recognition based on the PCA

  • Zheng, Qi;Lee, Hyo Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.429-431
    • /
    • 2012
  • Vehicle-logo recognition technology is very important in vehicle automatic recognition technique. The intended application is automatic recognition of vehicle type for secure access and traffic monitoring applications, a problem not hitherto considered at such a level of accuracy. Vehicle-logo recognition can improve Vehicle type recognition accuracy. So in this paper, introduces how to vehicle-logo recognition. First introduces the region of the license plate by algorithm and roughly located the region of car emblem based on the relationship of license plate and car emblem. Then located the car emblem with precision by the distance of Hausdorff. On the base, processing the region by morphologic, edge detection, analysis of connectivity and pick up the PCA character by lowing the dimension of the image and unifying the PCA character. At last the logo can be recognized using the algorithm of support vector machine. Experimental results show the effectiveness of the proposed method.

Generation of Internet Server Profile Using Packet Mining (패킷 마이닝 기법을 사용한 인터넷 서버 프로파일의 자동생성 연구)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.39-41
    • /
    • 2002
  • Management of internal Internet servers is increasingly becoming an important task. According to meet this requirement, they use service log analysis tools and network monitoring tools. But these are not enough to produce advanced management information considering contents of Internet services. Therefor we propose a system and let it detect Internet server systems existing in internal network and individuate those systems with providing profile. Internet server profile includes system's basic information, network traffic information, and Internet service usage information.

  • PDF

Structural health monitoring of a cable-stayed bridge using wireless smart sensor technology: data analyses

  • Cho, Soojin;Jo, Hongki;Jang, Shinae;Park, Jongwoong;Jung, Hyung-Jo;Yun, Chung-Bang;Spencer, Billie F. Jr.;Seo, Ju-Won
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.461-480
    • /
    • 2010
  • This paper analyses the data collected from the $2^{nd}$ Jindo Bridge, a cable-stayed bridge in Korea that is a structural health monitoring (SHM) international test bed for advanced wireless smart sensors network (WSSN) technology. The SHM system consists of a total of 70 wireless smart sensor nodes deployed underneath of the deck, on the pylons, and on the cables to capture the vibration of the bridge excited by traffic and environmental loadings. Analysis of the data is performed in both the time and frequency domains. Modal properties of the bridge are identified using the frequency domain decomposition and the stochastic subspace identification methods based on the output-only measurements, and the results are compared with those obtained from a detailed finite element model. Tension forces for the 10 instrumented stay cables are also estimated from the ambient acceleration data and compared both with those from the initial design and with those obtained during two previous regular inspections. The results of the data analyses demonstrate that the WSSN-based SHM system performs effectively for this cable-stayed bridge, giving direct access to the physical status of the bridge.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Risk Analysis of VTS operators for Small Vessels Using Collision Risk Assessment Model (충돌위험도 평가 모델을 활용한 소형선박에 대한 선박교통관제사의 위험도 분석)

  • Lee, Jin-Suk;Kim, Joo-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.4
    • /
    • pp.250-255
    • /
    • 2019
  • The objective of this study was to analyze the risk of collision accidents to the VTSOs (Vessel Traffic Service Operators) as small ferries and fishing boats are expanded for monitoring targets. The VTSOs was surveyed, the scale of the small vessels defined and the course of general cargo vessels and small vessels along the Busan VTS area investigated for three days. From calculating the risk with CoRI, patterns of increased or decreased risk due to course deviation were similar, and there was no significant difference between the maximum values and the minimum values. In addition, most VTSOs responded that the minimum time required was approximately three minutes to safely instruct in encounter situation, however, the collision risk with a small vessel is very rapidly changing within the three minutes, which is likely to increase the workload and decrease the concentration of the VTSOs. The objective of this study was to investigate the effect on VTSOs with respect to the expansion of small vessels as collision risk, it is expected that it will contribute to the establishment of a suitable scale for the target vessels for VTS through the analysis of each index of the CoRI model and various case studies.

A Cost-effectiveness Analysis of the Medication for Osteoporosis (골다공증 치료약제의 비용-효과 분석)

  • 임지영;권순만
    • Health Policy and Management
    • /
    • v.11 no.3
    • /
    • pp.71-88
    • /
    • 2001
  • The purpose of this study is to analyze the cost-effectiveness of four medications for treating and preventing osteoporosis -HRT therapy(conjugated equine estrogen 0.625mg for 25 days and medroxyprogesterone acetate 5mg for 01112 days), Alendronate(10mg and 5mg), Active Vitamin D(Calcitriol), and Calcium. Total costs include the direct medical cost -examination fee, consultation fee, prescription fee, fee for preparing medications, and the price of pharmaceuticals- and the indirect cost of patients such as traffic expenses and time cost. In addition, the costs of monitoring in adverse reactions are added. The effects of four medications are expressed as BMD(Bone Mineral Density) percent change measured by DEXA(Dual Energy X-ray Absorptiometry) in lumbar spine(L2-L4) and femoral neck site. A mixed model based on meta analysis provides the estimates of effectiveness, which are then appled to the hypothetical cohort consisting of postmenopausal women at the age of 50-59. HRT therapy is the most cost-effective medication at 172,433.64 won (lumbar spine site) and 546,328.28 won (femoral neck site) per BMD percent change for osteoporosis. Alendronate 10mg is more cost-effective than Alendronate 5mg as 345,971.23 won and 378,441.63 won per lumbar BMD percent change at 0.991g/$cm^2$, respectively. Alendronate 10mg is more cost-effective than Alendronate 5mg as 1,329,257.89 won and 1,467,291.23 won per femoral neck BMD percent change at 0.834g/$cm^2$, respectively.

  • PDF

Mode identifiability of a cable-stayed bridge under different excitation conditions assessed with an improved algorithm based on stochastic subspace identification

  • Wu, Wen-Hwa;Wang, Sheng-Wei;Chen, Chien-Chou;Lai, Gwolong
    • Smart Structures and Systems
    • /
    • v.17 no.3
    • /
    • pp.363-389
    • /
    • 2016
  • Deficient modes that cannot be always identified from different sets of measurement data may exist in the application of operational modal analysis such as the stochastic subspace identification techniques in large-scale civil structures. Based on a recent work using the long-term ambient vibration measurements from an instrumented cable-stayed bridge under different wind excitation conditions, a benchmark problem is launched by taking the same bridge as a test bed to further intensify the exploration of mode identifiability. For systematically assessing this benchmark problem, a recently developed SSI algorithm based on an alternative stabilization diagram and a hierarchical sifting process is extended and applied in this research to investigate several sets of known and blind monitoring data. The evaluation of delicately selected cases clearly distinguishes the effect of traffic excitation on the identifiability of the targeted deficient mode from the effect of wind excitation. An additional upper limit for the vertical acceleration amplitude at deck, mainly induced by the passing traffic, is subsequently suggested to supplement the previously determined lower limit for the wind speed. Careful inspection on the shape vector of the deficient mode under different excitation conditions leads to the postulation that this mode is actually induced by the motion of the central tower. The analysis incorporating the tower measurements solidly verifies this postulation by yielding the prevailing components at the tower locations in the extended mode shape vector. Moreover, it is also confirmed that this mode can be stably identified under all the circumstances with the addition of tower measurements. An important lesson learned from this discovery is that the problem of mode identifiability usually comes from the lack of proper measurements at the right locations.

Variability analysis on modal parameters of Runyang Bridge during Typhoon Masta

  • Mao, Jian-Xiao;Wang, Hao;Xun, Zhi-Xiang;Zou, Zhong-Qin
    • Smart Structures and Systems
    • /
    • v.19 no.6
    • /
    • pp.653-663
    • /
    • 2017
  • The modal parameters of the deck of Runyang Suspension Bridge (RSB) as well as their relationships with wind and temperature are studied based on the data recorded by its Structural Health Monitoring System (SHMS). Firstly, frequency analysis on the vertical responses at the two sides of the deck is carried out to distinguish the vertical and torsional vibration modes. Then, the vertical, torsional and lateral modal parameters of the deck of RSB are identified using Hilbert-Huang Transform (HHT) and validated by the identified results before RSB was opened to traffic. On the basis of this, the modal frequencies and damping ratios of RSB during the whole process of Typhoon Masta are obtained. And the correlation analysis on the modal parameters and wind environmental factors is then conducted. Results show that the HHT can achieve an accurate modal identification of RSB and the damping ratios show an obvious decay trend as the frequencies increase. Besides, compared to frequencies, the damping ratios are more sensitive to the environmental factors, in particular, the wind speed. Further study on configuring the variation law of modal parameters related with environmental factors should be continued.