• Title/Summary/Keyword: private traffic information

Search Result 97, Processing Time 0.024 seconds

A Railway Construction Efficiency Plan by Using Project Management Information System (프로젝트정보관리시스템을 활용한 철도공사 효율화 방안)

  • Lee, Tai-Sik;Park, Jang-Hee;Kim, Young-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1532-1537
    • /
    • 2004
  • Downtown traffic culture of the car focus of our country have developed. But, it was been interested in railroad to saturation of situation, environmental problem. Also, it is getting interest which is international by departure point of network connecting from Europe to Northeast Asia. Private capital project of railroad is activated but Construction companies payability is real that is worsen day by day. Therefore, Construction companies is destroying element enterprise's inefficiency and the waste, be interested in Project Management Information System as part of information. I wish to approach in efficiency of railway construction by presenting professional construction company's Project Management Information System.

  • PDF

Performance Improvement of Cert-Validation of Certification based on FM Subcarrier Broadcasting (FM방식을 이용한 인증서 유효성 검증의 성능 향상)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.3-13
    • /
    • 2002
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity on PKI. So, a user has to confirm the public key whether valid or invalid in the certification. There are many methods such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these methods have many problems, which cause overload traffic on network and the CRL server because of realtime processing for cert-validation of certification. In this paper we proposed cert-validation of certification improvement method based on FM Subcarrier Broadcasting, which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server the realtime management.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

A Resource Reservation Protocol and Packet Scheduling for Qos Provisioning in Hose-based VPNs (Hose 기반 VPN에서의 서비스품질 제공을 위한 자원예약 프로토콜과 패킷 스케줄링 기법)

  • Byun Hae-Sun;Woo Hyun-Je;Kim Kyoung-Min;Lee Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.247-256
    • /
    • 2006
  • Among the resource provisioning mechanisms for the hose based Virtual Private Network (VPN) Quality of Service (QoS ), VPN-specific state provisioning allows the service provider to obtain highest resource multiplexing gains. However, dynamic and automatic resource reservation for the VPN-specific state provisioning is difficult due to the lack of appropriate resource reservation protocol. Furthermore, users of a VPN may experience unfair usage of resources among themselves since the reserved resources of a VPN are shared by the VPN users in a similar way that the traditional LAN bandwidth is shared by the attached hosts. In this paper, we propose a resource reservation protocol and a traffic service mechanism, which not only enable dynamic and automatic resource reservation according to the VPN-specific state provisioning algorithm, but also enforce the fair usage of reserved resources among the users of a VPN in case of congestion.

Development of Business Models using Maritime Data

  • Lim, Sangseop;Jo, So-Hyun;Lee, Changhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.175-180
    • /
    • 2022
  • Data is an important resource to expect new value as 21st-century crude oil. In the shipping industry, despite the existence of numerous maritime data accumulated through ship operations, it was negligent in developing a business model with the data. This paper identified major demand sources and demand types based on the type and availability of maritime data surveyed through interviews with experts in the shipping industry and academia. Considering the characteristics and demands of these maritime data, this paper presented a private-type and public-interest business model. In the case of the private-type model, it creates additional added value by using maritime data and uses mainly ship internal data. The public-type model is to seek public safety and social benefits and mainly uses external data. A great synergy effect can be expected when combined with public services such as maritime survey, vessel traffic service, maritime environment management, and meteorological service. This study is expected to contribute greatly to the spread of the proposed business models throughout the shipping industry.

Performance analysis of private multimedia caching network based on wireless local area network (WLAN 기반 개인형 멀티미디어 캐싱 네트워크 성능 분석)

  • Ban, Tae-Won;Kim, Seong Hwan;Ryu, Jongyeol;Lee, Woongsup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1486-1491
    • /
    • 2017
  • In this paper, we propose a private multimedia caching scheme based on wireless local area network (WLAN) to improve the quality of service for high capacity and high quality multimedia streaming services which are recently increasing and to reduce the traffic load of core networks. The proposed caching scheme stores multimedia in the storage device mounted on WLAN APs and provides streaming services on its own without Internet connection in accordance with the request from clients. We have implemented a test network based on real commercial networks and measured the performance of the proposed caching scheme in terms of frames per second (FPS) and buffering time. According to the performance measurement results, the proposed caching scheme can reduce the average buffering time by 73.3% compared to the conventional streaming scheme. In addition, the proposed caching scheme can also improve the average FPS by 71.3% compared to the conventional streaming scheme.

Study on Location Decisions for Cloud Transportation System Rental Station (이동수요 대응형 클라우드 교통시스템 공유차량 대여소 입지선정)

  • Shin, Min-Seong;Bae, Sang-Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.2
    • /
    • pp.29-42
    • /
    • 2012
  • Recently, traffic congestion has become serious due to increase of private car usages. Carsharing or other innovative public transportation systems were developed to alleviate traffic congestion and carbon emissions. These measures can make the traffic environment more comfortable, and efficient. Cloud Transportation System (CTS) is a recent carsharing model. User can rent an electronic vehicles with various traffic information through the CTS. In this study, a concept, vision and scenarios of CTS are introduced. And, authors analyzed the location of CTS rental stations and estimated CTS demands. Firstly, we analyze the number of the population, employees, students and traffic volume in study areas. Secondly, the frequency and utilization time are examined. Demand for CTS in each traffic zone was estimated. Lastly, the CTS rental station location is determined based on the analyzed data of the study areas. Evaluation standard of the determined location includes accessibility and density of population. And, the number of vehicles and that of parking zone at the rental station are estimated. The result suggests that Haewoondae Square parking lot would be assigned 11 vehicles and 14.23 parking spaces and that Dongbac parking lot be assigned 7.9 vehicles and 10.29 parking spaces. Further study requires additional real-time data for CTS to increase accuracy of the demand estimation. And network design would be developed for redistribution of vehicles.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.