• Title/Summary/Keyword: traffic characteristic data

Search Result 110, Processing Time 0.031 seconds

Self-Similarity Characteristic in Data traffic (Self-Similar특성을 이용한 데이터 트래픽 특성에 관한 연구)

  • 이동철;김기문;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.454-459
    • /
    • 2001
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

Self-Similarity Characteristic in Mobile Communications Data traffic (이동전화 데이터 트래픽에서의 Self-Similar 특성)

  • 이동철;정인명;김기문;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.468-471
    • /
    • 2001
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF

A Study to Improve the Database for the Efficiency on Railway Traffic Control System (철도관제 시스템의 효율성을 위한 데이터베이스 개선 방안 연구)

  • Jung, Hye-Ran;Cho, Woo-Sic
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1275-1281
    • /
    • 2011
  • Most of the railway traffic control systems are using in the DBMS(Database Management System)is a disk-based DBMS. When the train schedule and the event data is inputted and referred at real time on Disk-based DBMS, it is characteristic of the slow access time and the data is preserved permanently. For this reason, this paper suggests the way of improving for Railway Traffic Control System by the hybrid DBMS using a combination of memory and disk. We apply the Hybrid DBMS to Railway Traffic Control System and compare the existing method with suggested one using the same data. As a result of comparison, we have come to the conclusion that suggested method is far more performance to shorten data access time and process a mass information than the previous methods.

  • PDF

Traffic Accident Analysis using Doppler Effect of the Horn (경적음의 도플러 효과를 이용한 교통사고분석)

  • Choi, Youngsoo;Kim, Jonghyuk;Yun, Yongmun;Park, Jongchan;Park, Hasun
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.4
    • /
    • pp.70-77
    • /
    • 2020
  • In this study, we estimate the vehicle speed by analyzing the acoustic data recorded in a single microphone of a surveillance camera. The frequency analysis of the acoustic data corrects the Doppler effect, which is a characteristic of the moving sound source, and reflects the geometric relationship according to the location of the sound source and the microphone on the two-dimensional plane. The acoustic data is selected from the horn sound that is mainly observed in an urgent situation among various sound sources that may occur in a traffic accident, and the characteristics of the monotone source are considered. We verified the reliability of the proposed method by time domain acoustic analysis and actual vehicle evaluation. This method is effective and can be used for traffic accident analysis in the blind spot of the camera using a single microphone built into the existing surveillance camera.

On-Line Travel Time Estimation Methods using Hybrid Neuro Fuzzy System for Arterial Road (검지자료합성을 통한 도시간선도로 실시간 통행시간 추정모형)

  • 김영찬;김태용
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.6
    • /
    • pp.171-182
    • /
    • 2001
  • Travel Time is an important characteristic of traffic conditions in a road network. Currently, there are so many road users to get a unsatisfactory traffic information that is provided by existing collection systems such as, Detector, Probe car, CCTV and Anecdotal Report. This paper presents the results achieved with Data Fusion Model, Hybrid Neuro Fuzzy System for on - line estimation of travel times using RTMS(Remote Traffic Microwave Sensor) and Probe Data in the signalized arterial road. Data Fusion is the most important process to compose the various of data which can present real value for traffic situation and is also the one of the major process part in the TIC(Traffic Information Center) for analyzing and processing data. On-line travel time estimation methods(FALEM) on the basis of detector data has been evaluated by real value under KangNam Test Area.

  • PDF

Internet Traffic Forecasting Using Power Transformation Heteroscadastic Time Series Models (멱변환 이분산성 시계열 모형을 이용한 인터넷 트래픽 예측 기법 연구)

  • Ha, M.H.;Kim, S.
    • The Korean Journal of Applied Statistics
    • /
    • v.21 no.6
    • /
    • pp.1037-1044
    • /
    • 2008
  • In this paper, we show the performance of the power transformation GARCH(PGARCH) model to analyze the internet traffic data. The long memory property which is the typical characteristic of internet traffic data can be explained by the PGARCH model rather than the linear GARCH model. Small simulation and the analysis of the real internet traffic show the out-performance of the PARCH MODEL over the linear GARCH one.

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

The Distribution of the Normal Traffic Loads on the Steel Plate Girder Bridge (실동하중에 의한 강판형교의 교통하중 분포)

  • Woo, Sang-Ik;Jung, Kyoung-Sup
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.4 no.2
    • /
    • pp.103-111
    • /
    • 2000
  • The objectives of the study are to know the strain distribution and modal dynamic behaviour of steel bridge girders by actual traffic load. The live load effect depends on many parameters including the span length, gross vehicle weight, axle weight, axle configuration so on. For the estimation of static and dynamic characteristic, strain data caused by moving loads and traffic characteristics of passing vehicle under actual traffic load have measured using Bridge Weigh in Motion. To confirm the reliability of BWIM system, strain data measured using the $120{\Omega}$ strain gauge under the same condition. It is considered that the data acquired from BWIM system have reliability through the analysis and comparison between stress measured by strain data from BWIM and computed by FEM. Additionally according to the measured strain data of up-line and down-line on the highway, the up-line bridge grows more faster than the down-line bridge and girder 4 and 5 carry more load when vehicles pass the inner line and girder 2 and 3 does when vehicles pass the outer line as this case(the bridge composed with 5 girders).

  • PDF

Priority oriented dobule reservation probocol for very high speed wireless LANs (초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜)

  • 조광민;정상일;강철신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

Self-Similarity Characteristic in Data traffic (데이터 트래픽에서의 Self-Similar 특성)

  • 김창호;황인수;최삼길;김동일;이동철;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.146-151
    • /
    • 1999
  • The classical queuing analysis has been tremendously useful in doing capacity planning and performance prediction. However, in many real-world cases. it has found that the predicted results form a queuing analysis differ substantially from the actual observed performance. Specially, in recent years, a number of studies have demonstrated that for some environments, the traffic pattern is self-similar rather than Poisson. In this paper, we study these self-similar traffic characteristics and the definition of self-similar stochastic processes. Then, we consider the examples of self-similar data traffic, which is reported from recent measurement studies. Finally, we wish you that it makes out about the characteristics of actual data traffic more easily.

  • PDF