• Title/Summary/Keyword: Traffic monitoring and analysis

Search Result 232, Processing Time 0.023 seconds

Intelligent Piezoelectric Sensor For Traffic Monitoring

  • IM J. I.;PARK K. M.;WANG J. H.
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.263-266
    • /
    • 2004
  • This paper describes an intelligent piezoelectric traffic sensor which can be detected the over-weighted vehicles In motion. Based on finite element analysis for the sensor, the sensitivity was analyzed and the design was optimized. Studied parameters are the material properties of constitutional parts, the geometry of the sensor, the weight of the vehicle, and the speed of the vehicle. To verify the simulated results, we manufactured the sensor having the optimized geometry and the sensitivity was measured in the range from 0.5 to 3 ton of tensile and compressive stress. The measured results shows that the sensitivity and linearity of the sensor are closely agree with the designed values.

  • PDF

Analysis of Vessel Traffic in Tokyo Bay Observed by New Remote Radar Network System

  • Okano, Tadashi;Ohtsu, Kohei;Hagiwara, Hideki;Shoji, Ruri;Tamaru, Hitoi;Liu, Shun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.208-216
    • /
    • 2004
  • Since 2000, the authors have been developing remote radar network system to observe the vessel traffic in Tokyo Bay. In December 2002, the first operational remote radar station was set at the National Defense Academy in Yokosuka, and vessel traffic observation was started. However, it was impossible to perform accurate observation in the northern part of Tokyo Bay by this Yokosuka radar station only. In September 2003, the second remote radar station and AIS receiving station were installed at Higashi Ogishima in Kawasaki. This second radar enabled us to carry out accurate observation in that area. Both radars can be remotely controlled from the monitoring station in Tokyo University of Marine Science and Technology. On September 30 and October 1,2003, the vessel traffic observation was carried out using both radars. Combining radar images observed by both radars, the ships' tracks were taken and the dangerous ships were extracted by using SJ value and Bumper Model. The time changes of dangerous ship density in some areas in Tokyo Bay and utilization ratio of the traffic routes were also investigated. In addition, analyzing the AIS date received at Kawasaki station, the positions and speed vectors of the ships equipped with AIS were shown.

  • PDF

Computation of geographic variables for air pollution prediction models in South Korea

  • Eum, Youngseob;Song, Insang;Kim, Hwan-Cheol;Leem, Jong-Han;Kim, Sun-Young
    • Environmental Analysis Health and Toxicology
    • /
    • v.30
    • /
    • pp.10.1-10.14
    • /
    • 2015
  • Recent cohort studies have relied on exposure prediction models to estimate individual-level air pollution concentrations because individual air pollution measurements are not available for cohort locations. For such prediction models, geographic variables related to pollution sources are important inputs. We demonstrated the computation process of geographic variables mostly recorded in 2010 at regulatory air pollution monitoring sites in South Korea. On the basis of previous studies, we finalized a list of 313 geographic variables related to air pollution sources in eight categories including traffic, demographic characteristics, land use, transportation facilities, physical geography, emissions, vegetation, and altitude. We then obtained data from different sources such as the Statistics Geographic Information Service and Korean Transport Database. After integrating all available data to a single database by matching coordinate systems and converting non-spatial data to spatial data, we computed geographic variables at 294 regulatory monitoring sites in South Korea. The data integration and variable computation were performed by using ArcGIS version 10.2 (ESRI Inc., Redlands, CA, USA). For traffic, we computed the distances to the nearest roads and the sums of road lengths within different sizes of circular buffers. In addition, we calculated the numbers of residents, households, housing buildings, companies, and employees within the buffers. The percentages of areas for different types of land use compared to total areas were calculated within the buffers. For transportation facilities and physical geography, we computed the distances to the closest public transportation depots and the boundary lines. The vegetation index and altitude were estimated at a given location by using satellite data. The summary statistics of geographic variables in Seoul across monitoring sites showed different patterns between urban background and urban roadside sites. This study provided practical knowledge on the computation process of geographic variables in South Korea, which will improve air pollution prediction models and contribute to subsequent health analyses.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

Air pollution monitoring system based on Bonferroni multi-analysis (본페로니 다중 분석 기반 대기오염 물질 모니터링 시스템)

  • Lim, Byeongyeon;Lim, Hyunkeun;Hong, Sungtaek;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.963-969
    • /
    • 2020
  • Cities in the region have a problem in that they cannot accurately monitor small areas because the number of air pollution is differently observed depending on variables such as population, season, traffic volume, and industrial complexes. In order to solve this problem, in this paper, comparative analysis was performed on small areas where representative air pollutants SO2, PM10, NO2, CO, and O3, which adversely affect the human body, are observed through coefficient of determination. In addition, based on Bonferroni's multiple comparative analysis, the air pollution level by period is shown. The map for the monitoring system was linked with the coordinates of each small city to visualize air pollutants for small cities based on the analysis data. Through this, it is possible to provide the user with a monitoring system of air pollutants for the region more precisely, and to prevent them from accidents that may occur due to air pollution in everyday life.

Damage identification in a wrought iron railway bridge using the inverse analysis of the static stress response under rail traffic loading

  • Sidali Iglouli;Nadir Boumechra;Karim Hamdaoui
    • Smart Structures and Systems
    • /
    • v.32 no.3
    • /
    • pp.153-166
    • /
    • 2023
  • Health monitoring of civil infrastructures, in particular, old bridges that are still in service, has become more than necessary, given the risk that a possible degradation or failure of these infrastructures can induce on the safety of users in addition to the resulting commercial and economic impact. Bridge integrity assessment has attracted significant research efforts over the past forty years with the aim of developing new damage identification methods applicable to real structures. The bridge of Ouled Mimoun (Tlemcen, Algeria) is one of the oldest railway structure in the country. It was built in 1889. This bridge, which is too low with respect to the level of the road, has suffered multiple shocks from various machines that caused considerable damage to its central part. The present work aims to analyze the stability of this bridge by identifying damages and evaluating the damage rate in different parts of the structure on the basis of a finite element model. The applied method is based on an inverse analysis of the normal stress responses that were calculated from the corresponding recorded strains, during the passage of a real train, by means of a set of strain gauges placed on certain elements of the bridge. The results obtained from the inverse analysis made it possible to successfully locate areas that were really damaged and to estimate the damage rate. These results were also used to detect an excessive rigidity in certain elements due to the presence of plates, which were neglected in the numerical reference model. In the case of the continuous bridge monitoring, this developed method will be a very powerful tool as a smart health monitoring system, allowing engineers to take in time decisions in the event of bridge damage.

The Intelligent Traffic Information Searching System Based on Disaster Occurrence of Multipoint (다지점의 재해발생을 고려한 지능형 교통정보 검색 시스템)

  • Kwon, Won-Seok;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.7
    • /
    • pp.933-939
    • /
    • 2011
  • Recent heavy rains have caused natural disasters such as flooding and landslides nationwide. Because of flooding occurrence in most of the roads, traffic congestion and isolation caused many loss especially at rush hour. Constant monitoring and analysis of past disaster history data are needed to prevent disasters on areas prone to floods and disaster risk areas. If we managed to obtain traffic volume, speed, phase around intersection using disaster history data when disasters occurred, we can analyse traffic congestion, change of disaster scale and rainfall. In this study, We select a target district to develop by using a route from Dae-nam intersection in Busan Namgu Daeyoeon-dong, over Gwangan large bridge up until Haeundae Olympic intersection, We developed a system which searches disaster history information, traffic volume using disaster history data based on user selection of the road.

Impact of the Exclusive Median Bus Lane System on Air Pollution Concentrations in Seoul, Korea (서울시 중앙버스전용차로 도입의 부가적인 대기오염 영향성 평가)

  • Baik, Yeon-Ju;Kim, Da-Wool;Kwon, Hye-Young;Kim, Youngkook;Kim, Sun-Young
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.34 no.4
    • /
    • pp.542-553
    • /
    • 2018
  • Since many previous studies reported the health effect of air pollution and indicated traffic as a major pollution source, significant policy efforts have been made to control traffic to reduce air pollution. However, there have been few studies that evaluated such policy implementation. In Seoul, Korea, the exclusive median bus lane system was implemented in 2004, and the metropolitan government applied air pollution reduction policies such as conversion of diesel buses to compressed natural gas buses and installation of emission control devices. This paper aimed to investigate the impact of the exclusive median bus lane system on air pollution reduction. Using hourly concentrations of particulate matter ($PM_{10}$) and nitrogen dioxide ($NO_2$) measured at 131 regulatory monitoring sites in Seoul and Gyeonggi-do for 2001-2014, we calculated annual and daily average concentrations at each site. We assessed the impact of the policy using differences-in-differences analysis by annual and daily average models after adjusting for geographic and/or meteorological variables. This method divides population into treatment and control groups with and without policy application, and compares the difference between the two time periods before and after the policy implementation in the treatment group with the difference in the control group. We classified all monitoring sites into treatment and control groups using two definitions: 1) Seoul vs. Gyeonggi-do; 2) within vs. outside 300 meters from the median bus lane. Pre- and post-policy periods were defined as 2001-2005 and 2006-2014, and 2004 and 2014 in the annual and daily models, respectively. The decrease in $PM_{10}$ concentrations between the two periods across monitoring sites in the treatment group was larger by $1.73-5.88{\mu}g/m^3$ than in the control group. $NO_2$ also showed the decrease without statistical significance. Our findings suggest that an efficient public transport policy combined with pollution abatement policies can contribute to reduction in air pollution.

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

A Study on the Application of Variable Speed Limits(VSL) for Preventing Accidents on Freeways (고속도로 교통사고 예방을 위한 가변제한속도 적용방안 연구)

  • Park, Joon-Hyung;Hwang, Hyo-Won;Oh, Cheol;Chang, Myung-Soon
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.111-121
    • /
    • 2008
  • Using variable speed limits (VSL) is a key strategy for preventing traffic accidents and alleviating traffic congestion. This study proposes an algorithm to operate VSLs on freeways for traffic safety. The proposed algorithm consists of two components based on accident likelihood estimation and analysis of safe stopping distance under various environmental conditions. A binary logistic regression technique is used for estimating accident likelihood. It is expected that the proposed algorithm would be successfully applied in practice in support of an integrated traffic and environmental condition monitoring system. Technical issues associated with the field implementation are also discussed.