• Title/Summary/Keyword: Vehicle Communication

Search Result 1,855, Processing Time 0.033 seconds

Design and Implementation of Response type of Flickering Green Signal System using Beacon Message (비콘메세지를 이용한 반응형 녹색점멸 신호시스템 설계 및 구현)

  • An, Hyo-In;Mun, Hyung-Jin;Kim, Chang-Geun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.241-247
    • /
    • 2016
  • As a domestic traffic control signal system, either the system with which a traffic signal turns into green at regular intervals or the system with which an amber or a red signal flickers on local roads without heavy traffic at midnight has been utilized. However, when the former system is used for roads with light traffic at midnight, delays and congestion can be incurred. Besides, in case of the latter signal system, the risk of vehicle crash is high. This study proposes a response type of flickering green signal system that rearranges signal system after analyzing beacon messages including sensor data. The proposed system, on a trunk road or a branch road at midnight, makes the signal keep flickering in green; When a vehicle enters the range of RSE, the transfer coverage, it transmits beacon messages regularly and Agent System analyzes the messages and alters the signal. It is a system by which vehicles move following the altered signal system, which will not only ensure smooth flow but also prevent vehicles from crashing on a road with light traffic. As a result of a simulation, traffic throughput and the average waiting time displayed 10 to 30 percent better improvement than existing signal systems, in terms of performance.

Traffic Information Extraction and Application When Utilizing Vehicle GPS Information (차량의 GPS 정보를 활용한 도로정보 추출 및 적용 방법)

  • Lee, Jong-Sung;Jeon, Min-Ho;Cho, Kyoung-Woo;Oh, Chang-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2960-2965
    • /
    • 2013
  • Customized services for individuals in analysis of recently collected GPS information have been investigated in various aspects. As the size of collected GPS data gets larger, a variety of services is being released accordingly. Existing studies, however, are limited to presenting service models for users while there is little study on developing intelligent computing technologies in the introduction of GPS information into the system. This study suggests an algorithm to analyze traffic information by introducing GPS information into the system in order to take the lead among intelligent computing technologies. The suggested algorithm analyzes a map by means of the collected vehicle GPS information and sectional traffic information interpretation method; thus, the computer judges the traffic information collected by humans. The experiment result shows that the traffic information was properly analyzed upon the utilization of the given data. Although a small quantity of analyzed data was less reliable, the system maintained high reliability as the data was sufficient.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

A Study for Fire Examples Involved in Engine Coolant leakage, Brake and Exhaust System Over-Heating of Heavy-Duty Truck Vehicle (대형 트럭 자동차의 엔진냉각수 누출, 제동 및 배기시스템 과열에 관련된 화재사례 고찰)

  • Lee, IL Kwon;Kook, Chang Ho;Ham, Sung Hoon;Lee, Young Suk;Hwang, Han Sub;You, Chang Bae;Moon, Hak Hoon;Jung, Dong Hwa;Ahn, Ho Cheol;Lee, Jeong Ho
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.4
    • /
    • pp.40-45
    • /
    • 2019
  • This paper is a purpose to study the failure example for heavy-duty vehicle fire. The first example, the researcher found the engine over-heating phenomenon causing a coolant leakage by the sealing poor of head-gasket because of D-ring part deformation contacting with cylinder liner top-part and cylinder head. He certified a fire breakout by short transferred to surrounding wiring of air-cleaner. The second example, a brake lining by return fault of break operating S cam causing with much wear of a rear 4 wheel brake lining repeatably was worn by friction. In the long run, it became the cause of fire. The third example, the researcher knew the fire cause was came about the short of wire by overload of tilting motor when the driver tilted up the cap to inspect a engine. Therefore, a heavy-duty fire must minimize the fire occurrence by thorough controlling.

A Study on Improvement of Collected Data Performance in Real-time Railway Safety Supervisory Platform (실시간 철도안전관제 플랫폼에서의 수집 데이터 성능 개선 방안 연구)

  • Shin, Kwang-Ho;Park, Jee-Won;Ahn, Jin
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.233-241
    • /
    • 2018
  • Recently, integrated railway safety monitoring and control system, which is a convergence system based on data distribution service for railway safety monitoring and control, is under development. It collects safety data of vehicle, signal, power and safety monitoring facilities in real time and adopts communication middleware based on distributed service for mass data processing. However, in the case of a server device used as an existing control server, the performance of the distributed service middleware can not be exhibited due to low hardware performance due to safety reasons. In the safety control system, 200,000 packets per second were set as the transmission target, but the performance test of the LAB was not satisfied. In this paper, we analyze the characteristics of railway data to improve the data collection performance of existing equipment and apply DDS-based streaming transmission method to the data model of signal facilities and vehicle facilities with large packet amount according to the analysis result. As a result, it was confirmed that the throughput was improved about 30.4 times when the hardware performance was the same. We plan to improve the data processing performance by applying it to real-time railway safety integrated monitoring and control system in the future.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

Location Prediction of Mobile Objects using the Cubic Spline Interpolation (3차 스플라인 보간법을 이용한 이동 객체의 위치 추정)

  • 안윤애;박정석;류근호
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.479-491
    • /
    • 2004
  • Location information of mobile objects is applied to vehicle tracking, digital battlefields, location based services, and telematics. Their location coordinates are periodically measured and stored in the application systems. The linear function is mainly used to estimate the location information that is not in the system at the query time point. However, a new method is needed to improve uncertainties of the location representation, because the location estimation by linear function induces the estimation error. This paper proposes an application method of the cubic spline interpolation in order to reduce deviation of the location estimation by linear function. First, we define location information of the mobile object moving on the two-dimensional space. Next, we apply the cubic spline interpolation to location estimation of the proposed data model and describe algorithm of the estimation operation. Finally, the precision of this estimation operation model is experimented. The experimentation comes out more accurate results than the method by linear function, although the proposed location estimation function uses the small amount of information. The proposed method has an advantage that drops the cost of data storage space and communication for the management of location information of the mobile objects.

Implementation of LabVIEW based Testbed for MHA FTSR (LabVIEW 기반의 MHA 명령방식 비행종단수신기 점검장비 구현)

  • Kim, Myung-Hwan;Hwang, Soo-Sul;Lim, You-Cheol;Ma, Keun-Su
    • Aerospace Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.55-62
    • /
    • 2014
  • FTSR(Flight Termination System Receiver) is a device that receives a ground command signal to abort a flight mission when abnormal conditions occur in the space launch vehicle. The secure tone command message shall consist of a series of 11 character tone pattern. Each character consists of the sum of two tones which taken from a set of 7 tones defined by IRIG(Inter-Range Instrumentation Group) in the audio frequency range. The MHA(Modified High alphabet) command adds a security feature to the secure tone command by using the predefined difference code. In order to check the function and performance of MHA FTSR, which is under development, for KSLV-II, the testbed should have functions of RF signal generation, receiver's output port monitoring, RS-422 communication and test data management. In this paper, we first briefly introduce MHA command and FTSR interface, and then show the LavVIEW based testbed include its H/W configuration, S/W implementation and test results.

The Study on the Correlation between Value Recognition and Urban Design Policy on the Urban Street - Focused on the Spatial Changes in Seoul during the Modern Periods - (현대성으로의 가치인식전환과 도시공공공간의 변화상에 관한 연구 - 1960년대 이후 서울의 도시가로환경과 그 담론을 중심으로 -)

  • Lee, Ji-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.6
    • /
    • pp.162-172
    • /
    • 2013
  • This study focuses on the genealogical analysis of the urban public spaces by the local history of Seoul which is significantly different from western cities. The analysis targets the discourse of the urban street which defines urban space-structure among the urban public spaces. Based on the analysis, we define the progress levels of urban public design policy in Seoul. Firstly, in 1960's and 1970's, 'urban reconstruction' was intensively carried out for the country modernization, and 'vehicle preferred street expansion' resulted in damages to historical inheritance, in-humanized street, and cultural uniformity. 1980's and 1990's would be defined as 'politic acceptance of plural values to the urban street.' There were the Olympic Games held in Seoul in 1988, which were the celebrations of the 600th capital establishment and the autonomous local government system. In the meanwhile, diverse values on the urban street were discussed in terms of globalization. There also were the self-reflection for the urban skyscrapers and high-population rate, the cultural uniformity of urban street, and the commercialization in downtown with urban reconstruction plans. Then, the sense of landscape and amenity was focused. Various urban projects and regulations were held according to the changes of value recognition. 2000's can be defined as 'introduction to the organic integration and the urban public design governance.' In the 21st century, types of recognition have changed significantly, which include publicness, humanism, sustainability, symbolism, artistry, placeness, and communication. They cause the establishment of ordinances and the installation of integrated organization via urban design administration. The legislation has been revised in order to support the various methods for the maintenance and operation of urban landscape in terms of local characteristics. New regulations were established for residents to participate in the processes of the urban planning with street design policy.