• Title/Summary/Keyword: traffic flow data

Search Result 460, Processing Time 0.026 seconds

Deriving Macroscopic Fundamental Diagrams Using Probe Vehicle Data Based on DSRC (DSRC 기반 프로브 자료를 이용한 거시 교통류 모형 추정 방법)

  • Shim, Jisup;Yeo, Jiho;Lee, Sujin;Jang, Kitae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.29-41
    • /
    • 2017
  • In this study, we used individual trip data to estimate a macroscopic fundamental diagram (MFD) that relates flow (or production) to density (or state) in Daegu metropolitan city. The individual trip data were generated by processing data that were collected from DSRC-based (dedicated short range communication) traffic data collection system. Using the processed individual trip data, we first examined whether the assumptions for MFD are valid, and then the relation between outflow and accumulation was estimated in our study site. As a result, we found that i) the assumptions are valid to construct MFD; and ii) the reproducible and well-defined MFDs exist in the network level.

Design and Performance Analysis of a new MAC Protocol for Providing Real-time Traffic Information using USN (USN 기반 실시간 주행 상황 정보 제공을 위한 MAC 설계 및 성능 분석)

  • Park, Man-Kyu;So, Sang-Ho;Lee, Jae-Yong;Lim, Jae-Han;Son, Myung-Hee;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.38-48
    • /
    • 2007
  • In ubiquitous environment, sensor networks that sense and transmit surrounding data without human intervention will become more important. If sensors are installed for detecting vehicles and measuring their speed in the road and that real-time information is given to drivers, it will be very effective for enhancing safety and controlling traffic in the road. In this paper, we proposed a new reliable and real-time sensor MAC protocol between AP and sensor nodes in order to provide real-time traffic flow information based on ubiquitous sensor networks. The proposed MAC allocates one TDMA slot for each sensor node on the IEEE 802.15.4 based channel structure, introduces relayed communication for distant sensors, and adopts a frame structure that supports retransmission for the case of errors. In addition, the proposed MAC synchronizes with AP by using beacon and adopts a hybrid tracking mode that supports economic power consumption according to various traffic situations, We implemented a simulator for the proposed MAC by using sim++ and evaluated various performances. The simulation results show that the proposed MAC reduces the power consumption and reveals excellent performance in real-time application systems.

A Study on Improving Subway Crowding Based on Smart Card Data : a Focus on Early Bird Policy Alternative (교통카드 자료를 활용한 지하철 혼잡도 개선 연구 : Early Bird 정책대안을 중심으로)

  • Lee, Sang Jun;Shin, Sung Il
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.125-138
    • /
    • 2020
  • Currently, subway crowding is estimated by observing a specific point at specific hours once or twice every 1 or 2 years. Given the extensive subway network in Seoul Metropolitan Area covering 588 stations, 11 lines and 80 transfer stations as of 2017, implementing crowding mitigation policy may have its limitations due to data uncertainty. A proposal has recently been made to effectively use smart card data, which generates big data on the overall subway traffic related to an estimated 8 million passengers per day. To mitigate subway crowding, this study proposes two viable options based on data related to smart card used in Seoul Metropolitan Area. One is to create a subway passenger pattern model to accurately estimate subway crowding, while the other is to prove effectiveness of early bird policy to distribute subway demand that is concentrated at certain stations and certain time. A subway passenger pattern model was created to estimate the passenger routes based on subway terminal ID at the entrance and exit and data by hours. To that end, we propose assigning passengers at the routes similar to the shortest routes based on an assumption that passengers choose the fastest routes. In the model, passenger flow is simulated every minute, and subway crowding level by station and line at every hour is analyzed while station usage pattern is identified by depending on passenger paths. For early bird policy, highly crowded stations will be categorized based on congestion level extracted from subway passenger pattern model and viability of a policy which transfers certain traveling demands to early commuting hours in those stations will be reviewed. In particular, review will be conducted on the impact of policy implemented at certain stations on other stations and lines from subway network as a whole. Lastly, we proposed that smart card based subway passenger pattern model established through this study used in decision making process to ensure effective implementation of public transport policy.

The Analysis of the Impact of Heavy Vehicles in Urban Freeway Basic Section (도시고속도로 기본구간의 서비스수준별 중차량 영향 분석)

  • Kim, Tae-Heon;Roh, Chang-Gyun;Son, Bong-Soo
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.1
    • /
    • pp.75-83
    • /
    • 2012
  • This study is to find a shortcoming embedded in the current Korean Highway Capacity Manual (KHCM) on reflecting a heavy vehicle effect to the highway capacity. The KHCM suggests to handle the percent heavy vehicle to deal with its effect to a capacity regardless of density levels. Authors hypothesized in this study that the effect of heavy vehicles would vary at different levels of traffic density - the effect would be comparably insignificant when a density is low and it becomes comparably significant when it becomes high. Field data from a freeways located in Seoul were collected for 360 hours (15 days) and categorized them into a set of operation conditions grouped by 15 minutes and by the LOS density levels. Comparison between the field measured and the estimated by the KHCM method showed that the KHCM method overestimated the effect of heavy vehicles in LOS B and C but underestimated in LOS E. The results suggested that there be a difference pattern from the one the KHCM expected and brought discussion on further studies.

A Proposal for a Femto-Cell Local Gateway and Packet Off-Loading for Remote Shipyards (원격 조선소의 펨토셀 로컬 게이트웨이 구성과 패킷 오프로드 방식 제안)

  • Lee, Won Hee;Min, Sang Won;Jeong, Min A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.387-393
    • /
    • 2013
  • In shipyard site, a ship is constructed by integrating lots of modules that are made in several sites with different capabilities and specifications. Recently, it needs to make a shipyard to be smart with wired and wireless broadband networks between hierarchical shipyards. In this paper, we propose an installation of LTE femtocell local gateway at a remote shipyard, an information exchange method between hierarchical shipyards, and an offload method to separate the general traffic. We define the mode change in a femtocell gateway for supporting the offload of the general traffic between the headquarter and a remote shipyard, the offload data management and trigger message, and cache entry fields. To show the operation of our proposed off-loading function, we consider the transcipient message flow at the femtocell gateway with its state transition diagram. Hence, it is expected to increase the productivity of shipyard industry with mobile communications and broadband Internet technologies.

Development of an Interface Module with a Microscopic Simulation Model for COSMOS Evaluation (미시적 시뮬레이터를 이용한 실시간 신호제어시스템(COSMOS) 평가 시뮬레이션 환경 개발)

  • Song, Sung-Ju;Lee, Seung-Hwan;Lee, Sang-Soo
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.2 s.73
    • /
    • pp.95-102
    • /
    • 2004
  • The COSMOS is an adaptive traffic control systems that can adjust signal timing parameters in response to various traffic conditions. To evaluate the performance of the COSMOS systems, the field study is only practical option because any evaluation tools are not available. To overcome this limitation, a newly integrated interfacing simulator between a microscopic simulation program and COSMOS was developed. In this paper, a detector module and a signal timing module as well as general feature of the simulator were described. A validation test was performed to verify the accuracy of the data flow within the simulator. It was shown that the accuracy level of information from the simulator was high enough for real application. Several practical comments on further studies were also included to enhance the functional specifications of the simulator.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

An Enhanced Mechanism of Security Weakness in CDMA Service (CDMA 서비스의 보안취약성과 개선방안)

  • Ryu, Dae-Hyun;Jang, Seung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.729-742
    • /
    • 2003
  • Mobile Communication has a possibility of eavesdropping by nature of wireless channel. It is known that eavesdropping of CDMA system is impossible because the voice data spreads with the PN. First of all, we show that it is possible to eavesdrop the CDMA channel by analysis of the forward channel in case that we know the ESN and the MIN. We can monitor the forward traffic channel with easy since ESN and MIN are exposed during the call processing in CDMA service in Korea. In this paper, we will show security weakness and propose an enhanced mechanism for CDMA service. We consider the problem of security in the CDMA service. CDMA system has wireless channels to transmit voice or data. By this reason, CDMA communication has a possibility of being eavesdropped by someone. It is known that eavesdropping in CDMA system is impossible because the voice data spreads with the PN. However, we can eavesdrop the CDMA data in FCM protocol in case that we know the ESN and the MIN. In CDMA system, ESN and MIN are exposed to the wireless channel. In this paper, we analyze the flow of the voice and signal in the CDMA system and monitor the forward traffic channel by the FCM protocol. The FCM protocol is proposed to monitor the forward channel in CDMA system. We can show the possibility of monitoring in one-way channel of CDMA system by the FCM protocol. The test instrument based on the FCM protocol is proposed to monitor the CDMA forward channel. We will show the system architecture of the test instrument to monitor the forward channel in CDMA.

Reliable Message Routing Protocol for Periodic Messages on Wireless Sensor Networks (무선센서 네트워크에서 주기적 메시지에 대해 신뢰성 있는 메시지 전송을 위한 라우팅 프로토콜)

  • Ngo, Hoai Phong;Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.190-197
    • /
    • 2011
  • In industrial distributed control systems, sensors collect data from the physical environment periodically and transmit them to the actuators, which process the control operations based on the received data. For the effective operation of the control systems, the data transmitted by the sensors has to be delivered to the actuators reliably within the deadline, and if the message reception rate of the actuators becomes lower than a threshold, then the performance of the control systems drops greatly. This paper suggests a message routing protocol to transmit periodic messages reliably in a distributed control system based on wireless sensor networks. For reliable message transmission, the proposed protocol selects a routing path whose end-to-end message reception rate is the highest before transmitting data messages. The proposed protocol has the capability of maintaining a target message reception rate for each flow. To maintain the required target reception rate, each destination monitors the actual message reception rate periodically and transmits a feedback message to the source if it drops below the target reception rate. On receiving the feedback message, the source tries to find a new path which can satisfy the target rate. The performance of the proposed protocol has been evaluated using simulation and compared with other protocols in terms of the message reception rate, the message delay and delay jitter, and so on. The simulation results show that the proposed protocol has a higher message reception rate and comparable message delay and delay jitter to other protocols. The simulation results also show that the proposed protocol has an ability to adapt well to the dynamic network traffic change.