• 제목/요약/키워드: traffic system

Search Result 5,544, Processing Time 0.037 seconds

Research on the Development of Distance Metrics for the Clustering of Vessel Trajectories in Korean Coastal Waters (국내 연안 해역 선박 항적 군집화를 위한 항적 간 거리 척도 개발 연구)

  • Seungju Lee;Wonhee Lee;Ji Hong Min;Deuk Jae Cho;Hyunwoo Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.367-375
    • /
    • 2023
  • This study developed a new distance metric for vessel trajectories, applicable to marine traffic control services in the Korean coastal waters. The proposed metric is designed through the weighted summation of the traditional Hausdorff distance, which measures the similarity between spatiotemporal data and incorporates the differences in the average Speed Over Ground (SOG) and the variance in Course Over Ground (COG) between two trajectories. To validate the effectiveness of this new metric, a comparative analysis was conducted using the actual Automatic Identification System (AIS) trajectory data, in conjunction with an agglomerative clustering algorithm. Data visualizations were used to confirm that the results of trajectory clustering, with the new metric, reflect geographical distances and the distribution of vessel behavioral characteristics more accurately, than conventional metrics such as the Hausdorff distance and Dynamic Time Warping distance. Quantitatively, based on the Davies-Bouldin index, the clustering results were found to be superior or comparable and demonstrated exceptional efficiency in computational distance calculation.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

A preliminary study for development of an automatic incident detection system on CCTV in tunnels based on a machine learning algorithm (기계학습(machine learning) 기반 터널 영상유고 자동 감지 시스템 개발을 위한 사전검토 연구)

  • Shin, Hyu-Soung;Kim, Dong-Gyou;Yim, Min-Jin;Lee, Kyu-Beom;Oh, Young-Sup
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.1
    • /
    • pp.95-107
    • /
    • 2017
  • In this study, a preliminary study was undertaken for development of a tunnel incident automatic detection system based on a machine learning algorithm which is to detect a number of incidents taking place in tunnel in real time and also to be able to identify the type of incident. Two road sites where CCTVs are operating have been selected and a part of CCTV images are treated to produce sets of training data. The data sets are composed of position and time information of moving objects on CCTV screen which are extracted by initially detecting and tracking of incoming objects into CCTV screen by using a conventional image processing technique available in this study. And the data sets are matched with 6 categories of events such as lane change, stoping, etc which are also involved in the training data sets. The training data are learnt by a resilience neural network where two hidden layers are applied and 9 architectural models are set up for parametric studies, from which the architectural model, 300(first hidden layer)-150(second hidden layer) is found to be optimum in highest accuracy with respect to training data as well as testing data not used for training. From this study, it was shown that the highly variable and complex traffic and incident features could be well identified without any definition of feature regulation by using a concept of machine learning. In addition, detection capability and accuracy of the machine learning based system will be automatically enhanced as much as big data of CCTV images in tunnel becomes rich.

An analytical study on the fire characteristics of the small tunnel with large smoke exhaust port (대배기구 배연방식을 적용한 소형차 전용 터널의 화재특성에 관한 해석적 연구)

  • Yoo, Ji-Oh;Kim, Jin-Su;Rhee, Kwan-Seok
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.3
    • /
    • pp.375-388
    • /
    • 2017
  • In order to solve the traffic congest and environmental issues, small-cross section tunnel for small car only is increasing, but there is not standard for installation of disaster prevention facility. In this study, in order to investigate the behavioral characteristics of thermal environment and smoke in a small cross section tunnels with a large port exhaust ventilation system, the A86, the U-Smartway and the Seobu moterawy tunnel, Temperature and CO concentration in case of fire according to cross sectional area, heat release rate and exhaust air flow rate were analyzed by numerical analysis and the results were as follows. As the cross-sectional area of the tunnel decreases, the temperature of the fire zone increases and the rate of temperature rise is not significantly affected by heat release rate. However, there is a difference depending on the change of the exhaust air flow rate. In the case of applying the exhaust air flow rate $Q_3+2.5Ar$ of the large port exhaust ventilation system, the temperature of the fire zone was 7.1 times for A86 ($Ar=25.3m^2$) and 5.4 time for U-smartway ($Ar=37.32m^2$) by Seobu moterway tunnel ($Ar=46.67m^2$). The CO concentration of fire zone also showed the same tendency. The A86 tunnels were 10.7 times and the U-Smartways were 9.5 times more than the Seobu moterway. Therefore, in the case of a small section tunnel, the thermal environment and noxious gas concentration due to the reduction of the cross-sectional area are expected to increase significantly more than the cross-sectional reduction rate.

The Present State of Domestic Acceptance of Various International Conventions for the Prevention of Marine Pollution (해양오염방지를 위한 각종 국제협약의 국내 수용 현황)

  • Kim, Kwang-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.4 s.27
    • /
    • pp.293-300
    • /
    • 2006
  • Domestic laws such as Korea Marine Pollution Prevention Law (KMPPL) which has been mae and amended according to the conclusions and amendments of various international conventions for the prevention a marine pollution such as MARPOL 73/78 were reviewed and compared with the major contents of the relevant international conventions. Alternative measures for legislating new laws or amending existing laws such as KMPPL for the acceptance of major contents of existing international conventions were proposed. Annex VI of MARPOL 73/78 into which the regulations for the prevention of air pollution from ship have been adopted has been recently accepted in KMPPL which should be applied to ships which are the moving sources of air pollution at sea rather tlnn in Korea Air Environment Conservation Law which should be applied to automobiles and industrial installations in land. The major contents of LC 72/95 have been accepted in KMPPL However, a few of substances requiring special care in Annex II of 72LC, a few of items in characteristics and composition for the matter in relation to criteria governing the issue of permits for the dumping of matter at sea in Annex III of 72LC, and a few of items in wastes or other matter that may be considered for dumping in Annex I of 96 Protocol have not been accepted in KMPPL yet. The major contents of OPRC 90 have been accepted in KMPPL. However, oil pollution emergency plans for sea ports and oil handling facilities, and national contingency plan for preparedness and response have not been accepted in KMPPL yet. The waste oil related articles if Basel Convention, which shall regulate and prohibit transboundary movement of hazardous waste, should be accepted in KMPPL in order to prevent the transfer if scrap-purpose tanker ships containing oil/water mixtures and chemicals remained on beard from advanced countries to developing and/or underdeveloped countries. International Convention for the Control if Harmful Anti-Fouling Systems on the Ships should be accepted in KMPPL rather tlnn in Korea Noxious Chemicals Management Law. International Convention for Ship's Ballast Water/Sediment Management should be accepted in KMPPL or by a new law in order to prevent domestic marine ecosystem and costal environment from the invasion of harmful exotic species through the discharge of ship's ballast water.

  • PDF

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

An Analysis on the Relationship between the Art Elements and Preference of Urban Street Furnitures (도시 가로시설물의 조형 요소와 선호도 간의 상관성 분석)

  • Kang, Gui-Bum;Cho, Se-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.4
    • /
    • pp.10-20
    • /
    • 2014
  • This study was carried out for the purpose of analysis correlations between street furniture design elements and preference of street furniture. This research analyzed the various street furniture set on Ilsan new town street, which are rest, hygiene, light, information, sale, traffic, and landscape. This study has processed by analysing street furniture literature investigation and consideration of theory. First, for analysed effect of street furniture element, has been appear as element 'relaxation facilities', 'information facilities', landscape facilities' mainly effect on street. Specially, 'rest', 'landscape', 'information' in order had a major influence on scenery. Each kind of 'chair elements' in rest facilities, 'sign board' in information facilities, 'sculpture', 'fountain' in 'landscape facilities' has analyzed as the main elements in the landscape affinity property affecting factor. Second, the results of analyzed landscape elements (shape, colour, texture, scale) affect to the affinity of street furniture. chair which are included in rest facilities affect "texture", "form", "scale", "color" in the order of preference of the molding design elements that influence landscape. Particularly, showed statistically significant on 'colour' element affecting the landscape preference than the other three elements. It means as the chair element which is rest facilities mainly affect on preferences, rather than texture, form, scale, colour. Monument in the landscape associated with a preference 'colour', 'shape', 'texture' 'scale' and appears to be in order of impact so we could get the consequence like chair and rest facilities show different aspects of the respectively. It means, visual element which are colour and shape significantly impact on landscape preferences. Third, information facilities such as signboard formative elements of landscape design preferences and correlation with negative showed that the correlation. That mean if the sign board is very negative influence on landscape preferences and the correlations of the design formative elements appear in order of 'scale', 'colour', 'texture'. It also means that the 'scale' namely the size of advertising material and colour are adversely affected in terms of landscape. As these results, when design street furniture as the street scenery, facilities according to the kind of the shape element and need to focus on relative shape element according to the kind of facilities difference. Finally, so far as to clarify the street furniture, mainly 'function' and 'system' classification shows undesirable in outdoor scape. Thus, performed studies in relationship with landscape, classify 'kind of facilities' is more desirable than 'system'.

Spatial Distribution of Urban Heat and Pollution Islands using Remote Sensing and Private Automated Meteorological Observation System Data -Focused on Busan Metropolitan City, Korea- (위성영상과 민간자동관측시스템 자료를 활용한 도시열섬과 도시오염섬의 공간 분포 특성 - 부산광역시를 대상으로 -)

  • HWANG, Hee-Soo;KANG, Jung Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.3
    • /
    • pp.100-119
    • /
    • 2020
  • During recent years, the heat environment and particulate matter (PM10) have become serious environmental problems, as increases in heat waves due to rising global temperature interact with weakening atmospheric wind speeds. There exist urban heat islands and urban pollution islands with higher temperatures and air pollution concentrations than other areas. However, few studies have examined these issues together because of a lack of micro-scale data, which can be constructed from spatial data. Today, with the help of satellite images and big data collected by private telecommunication companies, detailed spatial distribution analyses are possible. Therefore, this study aimed to examine the spatial distribution patterns of urban heat islands and urban pollution islands within Busan Metropolitan City and to compare the distributions of the two phenomena. In this study, the land surface temperature of Landsat 8 satellite images, air temperature and particulate matter concentration data derived from a private automated meteorological observation system were gridded in 30m × 30m units, and spatial analysis was performed. Analysis showed that simultaneous zones of urban heat islands and urban pollution islands included some vulnerable residential areas and industrial areas. The political migration areas such as Seo-dong and Bansong-dong, representative vulnerable residential areas in Busan, were included in the co-occurring areas. The areas have a high density of buildings and poor ventilation, most of whose residents are vulnerable to heat waves and air pollution; thus, these areas must be considered first when establishing related policies. In the industrial areas included in the co-occurring areas, concrete or asphalt concrete-based impervious surfaces accounted for an absolute majority, and not only was the proportion of vegetation insufficient, there was also considerable vehicular traffic. A hot-spot analysis examining the reliability of the analysis confirmed that more than 99.96% of the regions corresponded to hot-spot areas at a 99% confidence level.

The Simulation for the Organization of Fishing Vessel Control System in Fishing Ground (어장에 있어서의 어선관제시스템 구축을 위한 모의실험)

  • 배문기;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.3
    • /
    • pp.175-185
    • /
    • 2000
  • This paper described on a basic study to organize fishing vessel control system in order to control efficiently fishing vessel in Korean offshore. It was digitalized ARPA image on the fishing processing of a fleet of purse seiner in conducting fishing operation at Cheju offshore in Korea as a digital camera and then simulated by used VTMS. Futhermore, it was investigated on the application of FVTMS which can control efficiently fishing vessels in fishing ground. The results obtained were as follows ; (1) It was taken 16 minutes and 35 minutes to casting and hauling net in fishing processing respectively. The length of rope pulled by scout boat was 200m, tactical diameter in casting net was 340.8m, turning speed was 6kts as well. (2) The processing of casting and hauling net was moved to SW, NE as results of simulation when the current direction and speed set into NE, 2kts and SW, 2kts respectively. Such as these results suggest that can predict to control the fishing vessel previously with information of fishing ground, fishery and ship's maneuvering, etc. (3) The control range of VTMS radar used in simulation was about 16 miles. Although converting from a radar of the control vessel to another one, it was continuously acquired for the vector and the target data. The optimum control position could be determined by measuring and analyzing to distance and direction between the control vessel and the fleet of fishing vessel. (4) The FVTMS(fishing vessel traffic management services) model was suggested that fishing vessels received fishing conditions and safety navigation information can operate safely and efficiently.

  • PDF