• Title/Summary/Keyword: traffic identification

Search Result 297, Processing Time 0.027 seconds

Health monitoring of pedestrian truss bridges using cone-shaped kernel distribution

  • Ahmadi, Hamid Reza;Anvari, Diana
    • Smart Structures and Systems
    • /
    • v.22 no.6
    • /
    • pp.699-709
    • /
    • 2018
  • With increasing traffic volumes and rising vehicle traffic, especially in cities, the number of pedestrian bridges has also increased significantly. Like all other structures, pedestrian bridges also suffer damage. In order to increase the safety of pedestrians, it is necessary to identify existing damage and to repair them to ensure the safety of the bridge structures. Owing to the shortcomings of local methods in identifying damage and in order to enhance the reliability of detection and identification of structural faults, signal methods have seen significant development in recent years. In this research, a new methodology, based on cone-shaped kernel distribution with a new damage index, has been used for damage detection in pedestrian truss bridges. To evaluate the proposed method, the numerical models of the Warren Type steel truss and the Arregar steel footbridge were used. Based on the results, the proposed method and damage index identified the damage and determined its location with a high degree of precision. Given the ease of use, the proposed method can be used to identify faults in pedestrian bridges.

Random Forest Classifier-based Ship Type Prediction with Limited Ship Information of AIS and V-Pass

  • Jeon, Ho-Kun;Han, Jae Rim
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.4
    • /
    • pp.435-446
    • /
    • 2022
  • Identifying ship types is an important process to prevent illegal activities on territorial waters and assess marine traffic of Vessel Traffic Services Officer (VTSO). However, the Terrestrial Automatic Identification System (T-AIS) collected at the ground station has over 50% of vessels that do not contain the ship type information. Therefore, this study proposes a method of identifying ship types through the Random Forest Classifier (RFC) from dynamic and static data of AIS and V-Pass for one year and the Ulsan waters. With the hypothesis that six features, the speed, course, length, breadth, time, and location, enable to estimate of the ship type, four classification models were generated depending on length or breadth information since 81.9% of ships fully contain the two information. The accuracy were average 96.4% and 77.4% in the presence and absence of size information. The result shows that the proposed method is adaptable to identifying ship types.

Long-Term Monitoring and Analysis of a Curved Concrete Box-Girder Bridge

  • Lee, Sung-Chil;Feng, Maria Q.;Hong, Seok-Hee;Chung, Young-Soo
    • International Journal of Concrete Structures and Materials
    • /
    • v.2 no.2
    • /
    • pp.91-98
    • /
    • 2008
  • Curved bridges are important components of a highway transportation network for connecting local roads and highways, but very few data have been collected in terms of their field performance. This paper presents two-years monitoring and system identification results of a curved concrete box-girder bridge, the West St. On-Ramp, under ambient traffic excitations. The authors permanently installed accelerometers on the bridge from the beginning of the bridge life. From the ambient vibration data sets collected over the two years, the element stiffness correction factors for the columns, the girder, and boundary springs were identified using the back-propagation neural network. The results showed that the element stiffness values were nearly 10% different from the initial design values. It was also observed that the traffic conditions heavily influence the dynamic characteristics of this curved bridge. Furthermore, a probability distribution model of the element stiffness was established for long-term monitoring and analysis of the bridge stiffness change.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

A Study on the Development of the Integration Management System for the Standardized High-tech Marine Transportation Infrastructure (표준화된 첨단해양교통시설의 통합관리시스템 구축에 관한 연구)

  • Jeon, Joong-Sung;Lee, Seo-Jeong;Oh, Jin-Seok
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.4
    • /
    • pp.532-539
    • /
    • 2010
  • The high tech marine transportation infrastructure is an innovative transportation infrastructure that may be able to secure a safe transportation environment as well as efficient operation by connecting up-to-date skills including a broad range of wire and wireless communication-based information, control and electronics technologies. When integrated into the marine transportation infrastructure by the standard requirements, these standard technologies help monitor and manage navigational aids. After investigated on current status of marine transportation system, verified on integrating marine transportation systems, the standard requirements have to suggest a appropriate way of integrating marine traffic systems and proper way of using old marine traffic infrastructure.

A Study on the Building of Open Operational System for the Integration Management System of the Maritime Traffic Facilities (해양교통시설 통합관리시스템을 위한 개방형 운영시스템 구축 방안에 관한 연구)

  • Jeon, Joong-Sung;Lee, Seo-Jeong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1135-1144
    • /
    • 2010
  • The high tech marine transportation infrastructure is an innovative transportation infrastructure that may be able to secure a safe transportation environment as well as efficient operation by connecting up-to-date skills including a broad range of wire and wireless communication-based information, control and electronics technologies. When integrated into the marine transportation infrastructure by the standard requirements, these standard technologies help monitoring and managing navigational aids. This paper defined a concept of middleware in the marine traffic management systems which gives characteristics of system independency, scalability, extensibility, and researches a functionality of the middleware and a software block of the middleware.

Flow-based P2P Traffic Identification using SVM (SVM을 이용한 플로우 기반 P2P 트래픽 식별)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.123-130
    • /
    • 2008
  • To avoid some protection systems such as firewall, P2P applications have recently used to apply dynamic port numbers. Reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal, privacy technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P growth and dynamics. Despite various methods such as port-based and signature-based techniques, it still dose not satisfy the method which uses both qualitative and quantitative aspects. In this paper, a method using SVM mechanism which discriminate the P2P traffic from non-P2P traffics using differences between P2P and other application traffics is suggested. This is a systematic methodology to identify P2P networks, and without relying on packet payload.

  • PDF

A Study on Near-miss Incidents from Maritime Traffic Flow by Clustering Vessel Positions (선박위치 클러스터링을 활용한 해상교통 근접사고 산출에 관한 연구)

  • Kim, Kwang-Il;Jeong, Jung Sik;Park, Gyei-Kark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.603-608
    • /
    • 2014
  • In the maritime traffic environment, the near-miss between vessels is the situation approaching on collision course but collision accident is not occurred. In this study, in order to calculate the near-miss between navigating vessels, the discriminating equation using ship bumper theory and vessel position clustering methods are proposed. Applying proposed module to the vessel trajectories of the WANDO waterway, we assessment navigational risk factors of vessel type, navigational speed, meeting situation.

DNS Resolution with Renewal Using Piggyback

  • Jang, Beak-Cheol;Lee, Dong-Man;Chon, Kil-Nam;Kim, Hyun-Chul
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.416-427
    • /
    • 2009
  • Domain name system (DNS) is a primary identification mechanism for Internet applications. However, DNS resolutions often take an unbearably long time, and this could seriously impair the consistency of the service quality of Internet applications based on DNS such as World Wide Web. Several approaches reduce DNS resolution time by proactively refreshing expired cached records or prefetching available records beforehand, but these approaches have an inherent problem in that they cause additional DNS traffic. In this paper, we propose a DNS resolution time reduction scheme, named renewal using piggyback (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of by issuing additional DNS queries. This method decreases both DNS resolution time and DNS traffic since it reduces the number of queries generated to handle a given DNS resolution without generating additional DNS messages. Simulation results based on two large independent DNS traces show that our proposed approach much reduces not only the DNS resolution time but also the DNS traffic.

Theoretical Model for Accident Prevention Based on Root Cause Analysis With Graph Theory

  • Molan, Gregor;Molan, Marija
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.42-50
    • /
    • 2021
  • Introduction: Despite huge investments in new technology and transportation infrastructure, terrible accidents still remain a reality of traffic. Methods: Severe traffic accidents were analyzed from four prevailing modes of today's transportations: sea, air, railway, and road. Main root causes of all four accidents were defined with implementation of the approach, based on Flanagan's critical incident technique. In accordance with Molan's Availability Humanization model (AH model), possible preventive or humanization interventions were defined with the focus on technology, environment, organization, and human factors. Results: According to our analyses, there are significant similarities between accidents. Root causes of accidents, human behavioral patterns, and possible humanization measures were presented with rooted graphs. It is possible to create a generalized model graph, which is similar to rooted graphs, for identification of possible humanization measures, intended to prevent similar accidents in the future. Majority of proposed humanization interventions are focused on organization. Organizational interventions are effective in assurance of adequate and safe behavior. Conclusions: Formalization of root cause analysis with rooted graphs in a model offers possibility for implementation of presented methods in analysis of particular events. Implementation of proposed humanization measures in a particular analyzed situation is the basis for creation of safety culture.