• Title/Summary/Keyword: Traffic problem

Search Result 1,609, Processing Time 0.037 seconds

Traffic Signal Control with Fuzzy Membership Functions Generated by Genetic Algorithms (유전 알고리즘에 의해 생성된 퍼지 소속함수를 갖는 교통 신호 제어)

  • Kim, Jong-Wan;Kim, Byeong-Man;Kim, Ju-Youn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.6
    • /
    • pp.78-84
    • /
    • 1998
  • In this paper, a fuzzy traffic controller using genetic algorithms is presented. Conventional fuzzy traffic controllers use membership functions generated by humans. However, this approach does not guarantee the optimal solution to design the fuzzy controller. Genetic algorithm is a good problem solving method requiring domain-specific knowledge that is often heuristic. To find fuzzy membership functions showing good performance, a fitness function must be defined. However it's not easy in traffic control to define such a function as a numeric expression. Thus, we use simulation approach, namely, the fitness value of a solution is determined by use of a performance measure that is obtained by traffic simulator. The proposed method outperforms the conventional fuzzy controllers.

  • PDF

A Study on Item select of ATC Specialist aptitude test (항공교통관제사의 적성검사 항목 선정에 관한 연구)

  • Kim, Won-Ho;Moon, Woo-Choon;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.1
    • /
    • pp.100-105
    • /
    • 2010
  • Air Traffic Control is a job that aptitude is strongly needed. According to this, air traffic controllers have to be chosen and arranged by their duty characteristic. With the development of aviation industry, we need more capable air traffic controllers than before. However, it is true that there is no aptitude test for them in Korea. The world wide trend for air traffic control is changing that decision making and high ability with awareness for solving problem. Therefore the aptitude test is certainly required in order to select suitable people having basic abilities for the duty. This research inquires into the aptitude test which is globally taken because of the reason. And with result of that, inspection list is made for development of a tool for aptitude test which is suitable in Korea and additionally there are some special opinions of experts about the list. It is judged that this research will be based for the development of aptitude test in order to select air traffic controller.

A Scheme to Improve QoS in a Multi-Virtual-Hosting Server (다중 Virtual Hosting Server의 QoS 향상 기법에 관한 연구)

  • Ryou, Sang-Woo;Ko, Soung-Jun;Lee, Sang-Moon;Kim, Hag-Bae;Park, Jin-Bae;Jang, Whie
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.4
    • /
    • pp.303-307
    • /
    • 2002
  • Virtual hosting is a typical service to connect each directory of site and domain name. If traffic amounts may increase at one site present in the server, then it affects traffic amounts of other sites as well (including the sites which have flew requests). To overcome this problem, we suggest a simple feedback-control concept for the system by periodically monitoring the traffic and properly actuating traffic dispersions by investigating the log file. Specifically, large files are to be served in a backup server (to reduce the workload of the main server) by changing their own URL's in html format. In other words, it automatically redistributes the workload by using the URL. Furthermore, we also use the redirecting method by just adding html tags to html header. This method efficiently handles the workload and maintains the capability of the server effectively to the varying workload.

Opportunistic Routing for Bandwidth-Sensitive Traffic in Wireless Networks with Lossy Links

  • Zhao, Peng;Yang, Xinyu
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.806-817
    • /
    • 2016
  • Opportunistic routing (OR) has been proposed as a viable approach to improve the performance of wireless multihop networks with lossy links. However, the exponential growth of the bandwidth-sensitive mobile traffic (e.g., mobile video streaming and online gaming) poses a great challenge to the performance of OR in term of bandwidth guarantee. To solve this problem, a novel mechanism is proposed to opportunistically forwarding data packets and provide bandwidth guarantee for the bandwidth-sensitive traffic. The proposal exploits the broadcast characteristic of wireless transmission and reduces the negative effect of wireless lossy links. First, the expected available bandwidth (EAB) and the expected transmission cost (ETC) under OR are estimated based on the local available bandwidth, link delivery probability, forwarding candidates, and prioritization policy. Then, the policies for determining and prioritizing the forwarding candidates is devised by considering the bandwidth and transmission cost. Finally, bandwidth-aware routing algorithm is proposed to opportunistically delivery data packets; meanwhile, admission control is applied to admit or reject traffic flows for bandwidth guarantee. Extensive simulation results show that our proposal consistently outperforms other existing opportunistic routing schemes in providing performance guarantee.

Multicast Routing Strategy Based on Game Traffic Overload (게임 트래픽 부하에 따른 멀티캐스트 라우팅 전략)

  • Lee Chang-Jo;Lee Kwang-Jae
    • Journal of Game and Entertainment
    • /
    • v.2 no.1
    • /
    • pp.8-16
    • /
    • 2006
  • The development of multicast communication services in the Internet is expected to lead a stable packet transfer even though On-Line Games generate heavy traffic. The Core Based Tree scheme among many multicast protocols is the most popular and suggested recently. However, CBT exhibits two major deficiencies traffic concentration or poor core placement problem. Thus, measuring the bottleneck link bandwidth along a path is important to understand the performance of multicast. We propose a method in which the core router's state is classified into SS(Steady State), NS(Normal State) and BS(Bottleneck State) according to the estimated link speed rate, and also the changeover of multicast routing scheme for traffic overload. In addition, we introduce Anycast routing tree, an efficient architecture for constructing shard multicast trees.

  • PDF

Efficient Logical Topology Design Considering Multiperiod Traffic in IP-over-WDM Networks

  • Li, Bingbing;Kim, Young-Chon
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.13-21
    • /
    • 2015
  • In recent years energy consumption has become a main concern for network development, due to the exponential increase of network traffic. Potential energy savings can be obtained from a load-adaptive scheme, in which a day can be divided into multiple time periods according to the variation of daily traffic patterns. The energy consumption of the network can be reduced by selectively turning off network components during the time periods with light traffic. However, the time segmentation of daily traffic patterns affects the energy savings when designing multiperiod logical topology in optical wavelength routed networks. In addition, turning network components on or off may increase the overhead of logical topology reconfiguration (LTR). In this paper, we propose two mixed integer linear programming (MILP) models to design the optimal logical topology for multiple periods in IP-over-WDM networks. First, we formulate the time-segmentation problem as an MILP model to optimally determine the boundaries for each period, with the objective to minimize total network energy consumption. Second, another MILP formulation is proposed to minimize both the overall power consumption (PC) and the reconfiguration overhead (RO). The proposed models are evaluated and compared to conventional schemes, in view of PC and RO, through case studies.

Traffic Offloading in Two-Tier Multi-Mode Small Cell Networks over Unlicensed Bands: A Hierarchical Learning Framework

  • Sun, Youming;Shao, Hongxiang;Liu, Xin;Zhang, Jian;Qiu, Junfei;Xu, Yuhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4291-4310
    • /
    • 2015
  • This paper investigates the traffic offloading over unlicensed bands for two-tier multi-mode small cell networks. We formulate this problem as a Stackelberg game and apply a hierarchical learning framework to jointly maximize the utilities of both macro base station (MBS) and small base stations (SBSs). During the learning process, the MBS behaves as a leader and the SBSs are followers. A pricing mechanism is adopt by MBS and the price information is broadcasted to all SBSs by MBS firstly, then each SBS competes with other SBSs and takes its best response strategies to appropriately allocate the traffic load in licensed and unlicensed band in the sequel, taking the traffic flow payment charged by MBS into consideration. Then, we present a hierarchical Q-learning algorithm (HQL) to discover the Stackelberg equilibrium. Additionally, if some extra information can be obtained via feedback, we propose an improved hierarchical Q-learning algorithm (IHQL) to speed up the SBSs' learning process. Last but not the least, the convergence performance of the proposed two algorithms is analyzed. Numerical experiments are presented to validate the proposed schemes and show the effectiveness.

Study on Improvement of UBR Traffic Performance using ABT Block Scheduling in Multicast ATM Networks (멀티캐스트 ATM망에서 ABT 블록스케쥴링을 이용한 UBR 트래픽 성능 개선에 관한 연구)

  • 임동규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1665-1674
    • /
    • 2000
  • This paper treats the interworking of LAN-based networks like TCP over the ATM protocol stack in an ATM multicast session. Multicast connection will cause CIP since multicast group members form a connection tree by some tree methods and share the connected tree. The paper solve the CIP problem through a block-by-block transmission using ABT/IT method. ABT/IT RM cell is modified and block scheduling algorithm considering the traffic types is applied to each ATM switch using the enhanced RM cell. Block scheduling algorithm will avoid the indiscriminate discard of UBR traffic when congestion occurs and it can provide an efficient and fair service. The paper builds a block scheduler system and suggests the block scheduling algorithm for a multicast session in an ATM switch. UBR traffics arriving at the switch trough each VC is classified by the traffic type and stored at class buffer and thereafter indisciminately transmitted. When block scheduling algorithm is applied it will improve the UBR traffic performance such as end-to-end delay cell block loss ration etc. This paper evaluated the performance of block scheduling algorithm through the simulation using the C language and data structure.

  • PDF

A Study on the Anomalous Traffic Handling

  • Lee KeunSoo;Kim Sehun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.619-622
    • /
    • 2004
  • For recent years, hacking is in the trends of making excessive traffic unnecessarily to obstruct the service by getting a system's performance down. And we can also see systems paralyzed in service ability due to the flash crowds of normal traffic to a popular website. This is an important problem certainly solved in the point of QoS guarantee for the clients. It is known that the former is DDoS(Distributed Denial of Service) attack and the latter is FE(Flash Event). These two are samely anomalous traffic because these make excessive congestion on the network or system and downgrade the system's service ability. In this paper, we propose a scheme for protecting the system against anomalous traffic and for guaranteeing the QoS. For this, a server records and maintains the information of clients accessed more than one time before when it is in normal condition. When it falls into the congestion, the records are used for filtering the spoofed IP. We send and receive the ICMP request/reply packet to know whether the IP is spoofed. And we also propose for applying the object spliting of CDN to guarantee the QoS in the initial FE situation.

  • PDF

Intrusion Prevention Using Harmful Traffic Analysis (유해 트래픽 분석을 이용한 침입 방지)

  • Chang, Moon-Soo;Koo, Hyang-Ohk;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.173-179
    • /
    • 2005
  • The continuous development of computing technique and network technology bring the explosive growth of the Internet, it accomplished the role which is import changes the base facility in the social whole and public infra, industrial infrastructure, culture on society-wide to Internet based environment. Recently the rapid development of information and technology environment is quick repeated the growth and a development which is really unexampled in the history but it has a be latent vulnerability, Therefore the damage from this vulnerability like worm, hacking increases continually. In this paper, in order to resolve this problem, implement the analysis system for harmful traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF