• Title/Summary/Keyword: Traffic monitoring and analysis

Search Result 232, Processing Time 0.026 seconds

Wavelet based multi-step filtering method for bridge health monitoring using GPS and accelerometer

  • Yi, Ting-Hua;Li, Hong-Nan;Gu, Ming
    • Smart Structures and Systems
    • /
    • v.11 no.4
    • /
    • pp.331-348
    • /
    • 2013
  • Effective monitoring, reliable data analysis, and rational data interpretations are challenges for engineers who are specialized in bridge health monitoring. This paper demonstrates how to use the Global Positioning System (GPS) and accelerometer data to accurately extract static and quasi-static displacements of the bridge induced by ambient effects. To eliminate the disadvantages of the two separate units, based on the characteristics of the bias terms derived from the GPS and accelerometer respectively, a wavelet based multi-step filtering method by combining the merits of the continuous wavelet transform (CWT) with the discrete stationary wavelet transform (SWT) is proposed so as to address the GPS deformation monitoring application more efficiently. The field measurements are carried out on an existing suspension bridge under the normal operation without any traffic interference. Experimental results showed that the frequencies and absolute displacements of the bridge can be accurate extracted by the proposed method. The integration of GPS and accelerometer can be used as a reliable tool to characterize the dynamic behavior of large structures such as suspension bridges undergoing environmental loads.

Identification of bridge bending frequencies through drive-by monitoring compensating vehicle pitch detrimental effect

  • Lorenzo Benedetti;Lorenzo Bernardini;Antonio Argentino;Gabriele Cazzulani;Claudio Somaschini ;Marco Belloli
    • Structural Monitoring and Maintenance
    • /
    • v.9 no.4
    • /
    • pp.305-321
    • /
    • 2022
  • Bridge structural health monitoring with the aim of continuously assessing structural safety and reliability represents a topic of major importance for worldwide infrastructure managers. In the last two decades, due to their potential economic and operational advantages, drive-by approaches experienced growing consideration from researcher and engineers. This work addresses two technical topics regarding indirect frequency estimation methods: bridge and vehicle dynamics overlapping, and bridge expansion joints impact. The experimental campaign was conducted on a mixed multi-span bridge located in Lombardy using a Ford Galaxy instrumented with a mesh of wireless accelerometers. The onboard time series were acquired for a number of 10 passages over the bridge,performed at a travelling speed of 30 km/h, with no limitations imposed to traffic. Exploiting an ad-hoc sensors positioning, pitch vehicle motion was compensated, allowing to estimate the first two bridge bending frequencies from PSD functions; moreover, the herein adopted approach proved to be insensitive to joints disturbance. Conclusively, a sensitivity study has been conducted to trace the relationship between estimation accuracy and number of trips considered in the analysis. Promising results were found, pointing out a clear positive correlation especially for the first bending frequency.

Traffic Analysis Monitoring System for Web Server Load Balancing (웹서버의 부하균형을 위한 트래픽상황분석 모니터링 시스템)

  • Choi E-Jung;Lee Eun-Seok;Kim Seok-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.79-85
    • /
    • 2005
  • In order to handle client's requests while multiple servers seamlessly work in the web server cluster environment, it is vital to implement a router that execute a routing using TCP information and requested target content. The implemented package software measured packet volume that was generated from data generator, virtual server, and server 1, 2, 3, and could find out traffic distribution toward Server 1, 2, 3. As the result of the study shows, Round Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some partial cases, they were eventually alleviated by repeated tests for a longer time.

  • PDF

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.

design and Implementation of Performance manager System for Web Application Service management (웹 응용 서비스 관리를 위한 성능 관리자 시스템의 설계 및 구현)

  • Han, Jeong-Soo;Ahn, Seong-Jin;Chung, Jin-Wook;Park, Hyoung-Woo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.161-171
    • /
    • 1998
  • In this paper, we shows the implementation of Web based performance manager which analyze the traffic of a Web server to support the diagnostics of it. The manager monitors the HTIP traffic by polling and measures and presents is performance on demand. To enhance the adaptability of management interface Web based interfaces with JAVA is used. Recently, the need of traffic management on s Web has grown, because of increasing Web traffic. Therefore, the traffic management of Web service and the effective management of a Web server's performance are needed. We have designed interfaces with which is comprised of Collection-Request, Analysis-Request, Realtime-Monitoring, Comparison-Analysis on a client with Web Browser on a network, and implemented the server system that can analyze these requests. Also we have introduced some perfonnance indicator by referring a Web related MIB. Also, we have designed and developed a message format for communication between the Web client and the server system.

  • PDF

Applications of Ship Domain Theory to Identify Risky Sector in VTS Area

  • Gang, Sang-Guen;Jeong, Jae-Yong;Yim, Jeong-Bin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.3
    • /
    • pp.277-284
    • /
    • 2014
  • This paper describes the application method of bumper area defined in the ship domain theory and it is to identify risky sectors in VTS(Vessel Traffic Services) area. The final goal of this work is to develop early warning system providing the location information with high traffic risks in Mokpo VTS area and to prevent the human errors of VTS Officer(VTSO). The current goal of this paper is to find evaluation and detection method of risky sectors. The ratio between overlapped bumper area of each vessels and the summing area of a designated sector, Ratio to Evaluate Risk(RER) ${\gamma}$ is used as one of evaluation and detection parameter. The usability of overlapped bumper area is testified through three kinds of scenarios for various traffic situations. The marine traffic data used in the experiments is collected by AIS(Automatic Identification System) receiver and then compiled in the SQL(Structured Query Language) Server. Through the analysis of passing vessel's tracks within the boundary of Mokpo VTS area, the total of 11 sectors are identified as evaluation unit sector. As experiment results from risk evaluation for the 11 sectors, it is clearly known that the proposed method with RER ${\gamma}$ can provide the location information of high risky sectors which are need to keep traffic tracks of vessel movements and to maintain traffic monitoring by VTSO.

A Review of Vessel Traffic and Fishing Activity Standards for Offshore Wind Farm in Domestic Areas Based on the Analysis of Foreign Cases (국외 사례 분석을 통한 국내 해상풍력 발전단지의 선박통항 및 어로활동기준 설정에 관한 고찰)

  • Kwon, Yu-Min;Lee, Chang-Hyun;Rim, Geung-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.1
    • /
    • pp.29-35
    • /
    • 2018
  • According to the Global Wind Report of the Global Wind Energy Council (GWEC) in 2017, global wind power electricity generation capacity has been dramatically developing from 23,900 MW in 2001 to 486,790 MW in 2016. However, wind power generation in South Korea accounts for only 0.2 % of total power generation. Nonetheless, electricity production by wind power generation is soon expected to reach the grid parity where the cost of generating electricity by wind power is equal to the cost of fossil fuels such as oil. In this study, we analyzed the criteria of vessel traffic and fishing activities of major offshore wind farms in Europe where 88 % of the offshore wind power facilities are located. Finally, we suggest critical considerations based on the analysis.

The Study for Establishing the Criteria of Measurement Items in the Monitoring System for the Steel-Box Girder Bridge by FEM Analysis (구조해석에 의한 강상자형교 상시계측시스템 계측항목별 관리기준치 설정 연구)

  • Joo, Bong-Chul;Park, Ki-Tae;You, Young-Jun;Lee, Chin-Hyung;Hwang, Yoon-Koog
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • If any bridge has the monitoring system, the bridge manager can check the history of bridge behavior and the progress of the damage more exactly. When the unexpected event (ex: earthquake and flood) happens, the manager can check the safety condition of the bridge and make the pertinent action for bridge management which is reduction of vehicle speed or traffic control through the system. Additionary the manager can make the well-timed repair or reinforcement through the system, so he can save the management cost or the life cycle cost. This study presents the method of setting the criteria by FEM analysis in bridge monitoring system, and the standard progress for setting the criteria about measurement items of monitoring system for the steel box type bridge.

  • PDF

Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network (누리온 슈퍼컴퓨팅서비스 네트워크에서 트래픽 및 공격 빈도 분석)

  • Lee, Jae-Kook;Kim, Sung-Jun;Hong, Taeyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.113-120
    • /
    • 2020
  • KISTI(Korea Institute of Science and Technology Information) provides HPC(High Performance Computing) service to users of university, institute, government, affiliated organization, company and so on. The NURION, supercomputer that launched its official service on Jan. 1, 2019, is the fifth supercomputer established by the KISTI. The NURION has 25.7 petaflops computation performance. Understanding how supercomputing services are used and how researchers are using is critical to system operators and managers. It is central to monitor and analysis network traffic. In this paper, we briefly introduce the NURION system and supercomputing service network with security configuration. And we describe the monitoring system that checks the status of supercomputing services in real time. We analyze inbound/outbound traffics and abnormal (attack) IP addresses data that are collected in the NURION supercomputing service network for 11 months (from January to November 1919) using time series and correlation analysis method.

Analysis Method of CTC Status Monitoring (CTC 상태감시 데이터 해석기법)

  • 최규형;정의진;강규현
    • Proceedings of the KSR Conference
    • /
    • 1999.11a
    • /
    • pp.273-279
    • /
    • 1999
  • The main purpose of this study is to develope a Simulator for Central Traffic Controller(CTC) which can check the operating status of CTC and support tile maintenance procedure. The simulator supervise the CTC processor units and the data transmission between the CTC modules and the railway station equipments to define the validity of system functions and notify whether the eqipments are good or not. With the help of the simulator we could detect the error of CTC equipments easily. repair the faults efficiently. and improve tile reliability of CTC system.

  • PDF