• 제목/요약/키워드: traffic analysis

Search Result 4,976, Processing Time 0.032 seconds

Study on Effect of Low Visibility Condition at Nighttime on Traffic Accident (야간의 시인성 저하가 교통사고에 미치는 영향 진단 -경기도 지역의 경부, 서해안, 영동, 서울외곽순환고속도로를 중심으로-)

  • Lee, Seung-Sin;Kim, Tae-Heon;Son, Bong-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.2
    • /
    • pp.12-26
    • /
    • 2014
  • This Study deals with effect of low visibility condition at nighttime on traffic accident. Roads for experiment of this study are Gyeongbu expressway, Seohaean expressway, Yeongdong expressway and Seoul beltway in Gyeonggi province. For this study, I subdivided basic straight section of them into 58 short section. And I analyzed effect of low visibility condition by darkness at nighttime on traffic accident by using 410 traffic accidents between January 1, 2009 and June 30, 2012 on those sections. The Quasi-experimental and negative binomial regression were applied to analyze effect of low visibility condition at nighttime on traffic accident. In this study, I only analyzed visibility difference of daytime and nighttime on traffic accident except other effective variables on traffic accidents. As a result, I have found that it is for low visibility condition at nighttime to have effect on traffic accidents at such specific conditions as Los A speed is maintained in basic straight section of expressway in fine weather. And I tried to do various analysis on types and causes of traffic accidents using the result of analysis.

Develpoment of Customer Satisfaction Model of Providing Traffic Information through VMS on the Freeway (교통정보 제공에 따른 이용자 만족도 모형 개발 - 고속도로상의 VMS 정보제공을 중심으로 -)

  • Kim, Jang Wook;Kim, Tae Hee;Lee, Soo Beom
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5D
    • /
    • pp.597-607
    • /
    • 2008
  • ATIS(Advanced Traffic Information System) provide valuable information as the travel time and traffic congestion, detour, traffic accident information to drivers, so it is being in the spotlight. But so far, the study on the consumer satisfaction with providing traffic information is incomplete. So, this study run a Canonical discriminant analysis and a Canonical correlation analysis by a QuantificationIItheory based on a Traffic Information Satisfaction image data through questionnaires, and found out the factors with influence on the consumer satisfaction. And this study definitely found out the correlation between consumer's recognition and traffic information satisfaction through understanding the change on the recognition about traffic information satisfaction by a QuantificationItheory. Finally, this study found out the change on the sensibility recognition of drivers by running the principal component anlysis, developed the traffic information satisfaction evaluation model considering the change on the recognition by using the structural equation model.

An Adaptable Integrated Prediction System for Traffic Service of Telematics

  • Cho, Mi-Gyung;Yu, Young-Jung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.171-176
    • /
    • 2007
  • To give a guarantee a consistently high level of quality and reliability of Telematics traffic service, traffic flow forecasting is very important issue. In this paper, we proposed an adaptable integrated prediction model to predict the traffic flow in the future. Our model combines two methods, short-term prediction model and long-term prediction model with different combining coefficients to reflect current traffic condition. Short-term model uses the Kalman filtering technique to predict the future traffic conditions. And long-term model processes accumulated speed patterns which means the analysis results for all past speeds of each road by classifying the same day and the same time interval. Combining two models makes it possible to predict future traffic flow with higher accuracy over a longer time range. Many experiments showed our algorithm gives a better precise prediction than only an accumulated speed pattern that is used commonly. The result can be applied to the car navigation to support a dynamic shortest path. In addition, it can give users the travel information to avoid the traffic congestion areas.

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Traffic Control Algorithm for Periodic Traffics in WSN (WSN에서 주기적 트래픽 처리를 위한 트래픽 제어 알고리즘)

  • Kim, Jeonghye;Lee, Sungkeun;Koh, Jingwang;Park, Jaesung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.44-50
    • /
    • 2010
  • Wireless sensor network is consist of multiple sensor nodes and performs a shared tasks through the coordination of sensor nodes. Traffic in WSN is categorized as periodical monitoring traffic, event-driven traffic and query-based traffic. Periodic traffic takes significant proportion of the whole traffic processing because multiple sensor nodes generate traffic in a steady interval although the generation frequency of periodic traffic is low. In this paper, we propose a traffic control algorithm of network protocol for periodic traffic in terms of energy efficiency and conduct performance analysis of the algorithm.

A Study on the Relationship between Air Traffic Controllers' Safety Culture and Their Complex Mitigation Strategies: Using a Safety Culture Measurement Tool with Intrinsic and Extrinsic Levels (항공교통관제사의 안전문화와 업무복잡성 완화전략의 관계성 연구: 안전문화의 내재적 및 외재적 수준 측정도구를 활용하여)

  • Jeon, Jong-Duk;Lee, Nam-Ryung;Kim, Geun-Su
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.28 no.1
    • /
    • pp.22-33
    • /
    • 2020
  • Due to recent increased air traffic,, air traffic controllers in charge of en-route and approach control have faced huge increase in both workload and its intensity. The purpose of this paper is to analyze how much safety culture of air traffic controllers has effect on their complexity mitigation strategies during their duties. It could be expected complexity mitigation improve air traffic flow resulting in enhancing safety eventually. According to empirical analysis against air traffic controllers in civil aviation and air force in South Korea, it was proven safety culture had a statistically positive effect on complex mitigation strategies through safety behavior. In safety culture among air traffic controllers, intrinsic culture had a positive effect on extrinsic value of safety culture. Intrinsic value of safety culture led to air traffic controllers' safety behavior which created work complexity mitigation strategies. Among work complexity mitigation strategies, communication and cooperation was proven to be the most important factor effected by safety culture and behavior. It was implied that enhancing the intrinsic values of safety culture would cause to improve extrinsic safety culture and air traffic controller's work efficiency.

Modeling and Analysis of Wireless Lan Traffic (무선 랜 트래픽의 분석과 모델링)

  • Yamkhin, Dashdorj;Lee, Seong-Jin;Won, You-Jip
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.667-680
    • /
    • 2008
  • In this work, we present the results of our empirical study on 802.11 wireless LAN network traffic. We collect the packet trace from existing campus wireless LAN infra-structure. We analyzed four different data sets: aggregate traffic, upstream traffic, downstream traffic, tcp only packet trace from aggregate traffic. We analyze the time series aspect of underlying traffic (byte count process and packet count process), marginal distribution of time series, and packet size distribution. We found that in all four data sets there exist long-range dependent property in byte count and packet count process. Inter-arrival distribution is well fitted with Pareto distribution. Upstream traffic, i.e. from the user to Internet, exhibits significant difference in its packet size distribution from the rests. Average packet size of upstream traffic is 151.7 byte while average packet size of the rest of the data sets are all greater than 260 bytes. Packets with full data payloads constitutes 3% and 10% in upstream traffic and the downstream traffic, respectively. Despite the significant difference in packet size distribution, all four data sets have similar Hurst values. The Hurst alone does not properly explain the stochastic characteristics of the underlying traffic. We model the underlying traffic using fractional-ARIMA (FARIMA) and fractional Gaussian Noise (FGN). While the fractional Gaussian Noise based method is computationally more efficient, FARIMA exhibits superior performance in accurately modeling the underlying traffic.

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Congestion Analysis in the Inner Harbour of Ulsan Using a Scenario (시나리오를 이용한 울산 내항의 혼잡 분석)

  • Ha, Chang-Seung;Baek, Ih-Huhm
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.19 no.2
    • /
    • pp.278-287
    • /
    • 2007
  • Since traffic congestion ratio at any given port fluctuates on the number of arriving and departing vessels, the total tonnage of freight volume being handled, and the number of berth in operation and other factors, there exists a need to numerically analyze the waterway traffic volume. However, there are no effective regulations in regards to the waterway traffic analysis prior to expansion of a port facility. The current analysis requires the traffic analysis in relation only to the width of the waterway, which clearly falls short of achieving a comprehensive evaluation study that could be used in consideration of port expansion.This study provides five scenarios to execute a comprehensive evaluation study and base for the sensitivity study by analyzing the scenarios. As a result of the sensitivity analysis, the A, B, and C scenarios varies the average arrival ratio of the berth shows 1.1, 1.19, and 1.28 times of delays respectively. Also, The D and E scenarios take place malfunctions of pier shows 1.21 and 1.53 times of delays respectively. Therefore, various strategies of harbor development and method of harbor management are needed for the flexible correspondence to the environmental changes such as the excessive increasing of the freight volume and often taking place of malfunctioning.