• Title/Summary/Keyword: traffic scenarios

Search Result 303, Processing Time 0.025 seconds

Inter-Cell Interference Management for Next-Generation Wireless Communication Systems

  • Kwon, Ho-Joong;Ko, Soo-Min;Seo, Han-Byul;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.258-267
    • /
    • 2008
  • In this paper, we examine what changes the next-generation wireless communication systems will experience in terms of the technologies, services, and networks and, based on that, we investigate how the inter-cell interference management should evolve in various aspects. We identify that the main driving forces of the future changes involve the data-centric services, new dynamic service scenarios, all-IP core access networks, new physical-layer technologies, and heavy upload traffic. We establish that in order to cope with the changes, the next-generation inter-cell interference management should evolve to 1) set the objective of providing a maximal data rate, 2) take the form of joint management of power allocation and user scheduling, 3) operate in a fully distributed manner, 4) handle the time-varying channel conditions in mobile environment, 5) deal with the changes in interference mechanism triggered by the new physical-layer technologies, and 6) increase the spectral efficiency while avoiding centralized coordination of resource allocation of the users in the uplink channel.

Damage detection on output-only monitoring of dynamic curvature in composite decks

  • Domaneschi, M.;Sigurdardottir, D.;Glisic, B.
    • Structural Monitoring and Maintenance
    • /
    • v.4 no.1
    • /
    • pp.1-15
    • /
    • 2017
  • Installation of sensors networks for continuous in-service monitoring of structures and their efficiency conditions is a current research trend of paramount interest. On-line monitoring systems could be strategically useful for road infrastructures, which are expected to perform efficiently and be self-diagnostic, also in emergency scenarios. This work researches damage detection in composite concrete-steel structures that are typical for highway overpasses and bridges. The techniques herein proposed assume that typical damage in the deck occurs in form of delamination and cracking, and that it affects the peak power spectral density of dynamic curvature. The investigation is performed by combining results of measurements collected by long-gauge fiber optic strain sensors installed on monitored structure and a statistic approach. A finite element model has been also prepared and validated for deepening peculiar aspects of the investigation and the availability of the method. The proposed method for real time applications is able to detect a documented unusual behavior (e.g., damage or deterioration) through long-gauge fiber optic strain sensors measurements and a probabilistic study of the dynamic curvature power spectral density.

Development of Risk-Appearance Frequency Evaluation Model for Railway Level-Crossing Accidents (철도건널목 사고 위험도-발생빈도 평가모델 개발)

  • Kim, Min-Su;Wang, Jong-Bae;Park, Chan-Woo;Choi, Don-Bum
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.3
    • /
    • pp.96-101
    • /
    • 2009
  • In this study, a risk-appearance frequency evaluation model for railway level-crossing accidents is developed with the frequency estimation based on the accident history. It follows the worldwide common safety management approach and reflects the operation conditions and accident properties of the domestic railway system. The risk appearance frequency evaluation process contains a development of accident scenarios by defining the system configurations and functions, and a frequency estimation of hazardous events based on the accident history. The developed model is verified with the accident history during 5 years('03-'07) for 3 hazardous events: 'Being trapped in level crossing(Hl)', 'Crossing during warning signal(H2)' and 'Breaking through/detouring the barrier(H3)'. This risk appearance frequency evaluation model will be combined with a consequence evaluation model so as to offer full risk assessment for the railway accident. The accident risk assessment will contribute to improving the safety management of the railway system.

Seismic response of a highway bridge in case of vehicle-bridge dynamic interaction

  • Erdogan, Yildirim S.;Catbas, Necati F.
    • Earthquakes and Structures
    • /
    • v.18 no.1
    • /
    • pp.1-14
    • /
    • 2020
  • The vehicle-bridge interaction (VBI) analysis might be cumbersome and computationally expensive in bridge engineering due to the necessity of solving large number of coupled system of equations. However, VBI analysis can provide valuable insights into the dynamic behavior of highway bridges under specific loading conditions. Hence, this paper presents a numerical study on the dynamic behavior of a conventional highway bridge under strong near-field and far-field earthquake motions considering the VBI effects. A recursive substructuring method, which enables solving bridge and vehicle equations of motion separately and suitable to be adapted to general purpose finite element softwares, was used. A thorough analysis that provides valuable information about the effect of various traffic conditions, vehicle velocity, road roughness and effect of soil conditions under far-field and near-field strong earthquake motions has been presented. A real-life concrete highway bridge was chosen for numerical demonstrations. In addition, sprung mass models of vehicles consist of conventional truck and car models were created using physical and dynamic properties adopted from literature. Various scenarios, of which the results may help to highlight the different aspects of the dynamic response of concrete highway bridges under strong earthquakes, have been considered.

Performance Analysis of Routing Protocols depending on the Types of Topology in MANET (토폴로지 유형에 따른 MANET 라우팅 프로토콜의 성능 분석)

  • Kim Myung-Gwan;Hwang Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.934-942
    • /
    • 2005
  • MANET(Mobile Ad hoc NETwork) routing protocols have merits and demerits under the specific situations. Because it is not clear which protocol is the best under all situations, a suitable routing protocol should be selected depending on the traffic and moving characteristics of nodes. The aim of this paper is to select an appropriate routing protocol to be used by the Korea Coal Corporation. So we designed working scenarios such as coal mining and tunnel supporting that reflected mobile characteristics of nodes. We constructed coal mining and tunnel supporting topology, and analyzed the performance of MANET routing protocols. This result can be used as a basis to select a MANET routing protocol in underground tunnel environment and other mine of the Korea Coal Corporation.

A Study on the Reduction of Photochemical Ozone Concentration using OZIPR in Seoul Area (OZIPR을 이용한 서울지역 광화학오존농도 저감방안에 관한 연구)

  • Hong, You-Deog;Lee, Sang-Uk;Han, Jin-Seok;Lee, Suk-Jo;Kim, Shin-Do;Kim, Yoon-Shin
    • Journal of Environmental Impact Assessment
    • /
    • v.14 no.3
    • /
    • pp.117-126
    • /
    • 2005
  • This study was executed to know the best matrix of photochemical ozone reduction in the metropolitan area. For this object, we used the OZIPR(Ozone Isopleth Plotting Package for Research) model for comparing the effectiveness of VOCs and NOx amount variation about the ozone creation. Among the various ozone reduction scenarios, 50% reduction of VOCs from organic solvent and road traffic respectively was the best matrix for ozone reduction. Although it needs more accurate assessment and confirmation of VOCs and NOx emission amount data, according to existing data, the control of VOCs is the best way for photochemical ozone reduction in Seoul.

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis

  • Hostiadi, Dandy Pramana;Wibisono, Waskitho;Ahmad, Tohari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4176-4197
    • /
    • 2020
  • Botnet is a type of dangerous malware. Botnet attack with a collection of bots attacking a similar target and activity pattern is called bot group activities. The detection of bot group activities using intrusion detection models can only detect single bot activities but cannot detect bots' behavioral relation on bot group attack. Detection of bot group activities could help network administrators isolate an activity or access a bot group attacks and determine the relations between bots that can measure the correlation. This paper proposed a new model to measure the similarity between bot activities using the intersections-probability concept to define bot group activities called as B-Corr Model. The B-Corr model consisted of several stages, such as extraction feature from bot activity flows, measurement of intersections between bots, and similarity value production. B-Corr model categorizes similar bots with a similar target to specify bot group activities. To achieve a more comprehensive view, the B-Corr model visualizes the similarity values between bots in the form of a similar bot graph. Furthermore, extensive experiments have been conducted using real botnet datasets with high detection accuracy in various scenarios.

Beamforming Strategy Using Adaptive Beam Patterns and Power Control for Common Control Channel in Hierarchical Cell Structure Networks

  • You, Cheol-Woo;Jung, Young-Ho;Cho, Sung-Hyun
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.319-326
    • /
    • 2011
  • Beamforming techniques have been successfully utilized for traffic channels in order to solve the interference problem. However, their use for control channels has not been sufficiently investigated. In this paper, a (semi-) centralized beamforming strategy that adaptively changes beam patterns and controls the total transmit power of cells is proposed for the performance enhancement of the common channel in hierarchical cell structure (HCS) networks. In addition, some examples of its practical implementation with low complexity are presented for two-tier HCS networks consisting of macro and pico cells. The performance of the proposed scheme has been evaluated through multi-cell system-level simulations under optimistic and pessimistic interference scenarios. The cumulative distribution function of user geometry or channel quality has been used as a performance metric since in the case of common control channel the number of outage users is more important than the sum rate. Simulation results confirm that the proposed scheme provides a significant gain compared to the random beamforming scheme as well as conventional systems that do not use the proposed algorithm. Finally, the proposed scheme can be applied simultaneously to several adjacent macro and pico cells even if it is designed primarily for the pico cell within macro cells.

Experiences of Emergency Surgical Treatment for a COVID-19 Patient with Severe Traumatic Brain Injury at a Regional Trauma Center: A Case Report

  • Yun, Jung-Ho
    • Journal of Trauma and Injury
    • /
    • v.34 no.3
    • /
    • pp.212-217
    • /
    • 2021
  • Various medical scenarios have arisen with the prolonged coronavirus disease 2019 (COVID-19) pandemic. In particular, the increasing number of asymptomatic COVID-19 patients has prompted reports of emergency surgical experiences with these patients at regional trauma centers. In this report, we describe an example. A 25-year-old male was admitted to the emergency room after a traffic accident. The patient presented with stuporous mentality, and his vital signs were in the normal range. Lacerations were observed in the left eyebrow area and preauricular area, with hemotympanum in the right ear. Brain computed tomography showed a contusional hemorrhage in the right frontal area and an epidural hematoma in the right temporal area with a compound, comminuted fracture and depressed skull bone. Surgical treatment was planned, and the patient was intubated to prepare for surgery. A blood transfusion was prepared, and a central venous catheter was secured. The initial COVID-19 test administered upon presentation to the emergency room had a positive result, and a confirmatory polymerase chain reaction (PCR) test was administered. The PCR test confirmed a positive result. Emergency surgical treatment was performed because the patient's consciousness gradually deteriorated. The risk of infection was high due to the open and unclean wounds in the skull and brain. We prepared and divided the COVID-19 surgical team, including the patient's transportation team, anesthesia team, and surgical preparation team, for successful surgery without any transmission or morbidity. The patient recovered consciousness after the operation, received close monitoring, and did not show any deterioration due to COVID-19.

A Security Vulnerability Analysis for Printer Kiosks (무인 복합 출력기 솔루션의 취약성 분석)

  • Ji, Woojoong;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.165-174
    • /
    • 2019
  • They are frequently used today in public places such as street, subway, school or library. Since users can sometimes print documents that contain confidential data using Printer Kiosks, the devices should store and manage the documents securely. In this paper, we identify potential security threats in Printer Kiosks and suggest practical attack scenarios that can take place. To show the feasibility of suggested attack, we analyzed network traffic that were generated by the real Printer Kiosk device. As a result of our analysis, we have found that attackers can access other users' scanned files and access other users' documents from Printer Kiosk's home page. We confirmed that using our attack, we could retrieve other users' personal data.