• Title/Summary/Keyword: traffic system

Search Result 5,549, Processing Time 0.03 seconds

Improving Utilization of GPS Data for Urban Traffic Applications

  • Nguyen, Duc Hai;Nguyen, Tan Phuc;Doan, Khue;Ta, Ho Thai Hai;Pham, Tran Vu;Huynh, Nam;Le, Thanh Van
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.6-9
    • /
    • 2015
  • The use of Intelligent Transportation System (ITS) is promising to bring better solutions for managing and handling the city traffic. This system combines many fields in advanced technology such as Global Positioning System (GPS), Geographic Information System (GIS) and so on. The basement of applications in ITS is the effective collections and data integration tools. The purpose of our research is to propose solutions which involve the use of GPS time series data collected from GPS devices in order to improve the quality of output traffic data. In this study, GPS data is collected from devices attached to vehicles travelling on routes in Ho Chi Minh City (HCMC). Then, GPS data is stored in database system to serve in many transportation applications. The proposed method combines the data usage level and data coverage to improve the quality of traffic data.

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

A Study on Improving the National Highway Traffic Counts System : With Focus on Short Duration Counts and Continuous Counts (일반국도 교통량조사의 조사 유형별 개선 방안)

  • Lee, Sang Hyup;Ha, Jung Ah;Yoon, Taekwan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.3D
    • /
    • pp.205-212
    • /
    • 2012
  • The national highway traffic counts system consists of short duration counts and continuous counts. Unlike continuous counts, short duration counts are performed by collection of a few days period and thus, the magnitude of deviation of collected data from AADT varies depending upon when data collection takes place. Therefore, this study was done to find out the best months and days of data collection of each highway classification in order to enhance the accuracy of AADT estimation. Continuous counts, another type of the national traffic counts system, are performed by collection of 365-day period using a permanent traffic counter. Therefore, it is necessary to keep the number of days for which the counter malfunctions to a minimum in order to enhance the accuracy of data. However, from time to time the permanent traffic counter malfunctions due to various causes and thus, cannot collect data. Therefore, this study was done to find out whether the age of counter, the ratio of heavy vehicle volume to total traffic volume, etc. could be the direct causes of counter's malfunction based on the number of maintenance for a certain time period.

Development and Analysis of the Interchange Centrality Evaluation Index Using Network Analysis (네트워크 분석을 이용한 거점평가지표 개발 및 특성분석)

  • KIM, Suhyun;PARK, Seungtae;WOO, Sunhee;LEE, Seungchul
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.6
    • /
    • pp.525-544
    • /
    • 2017
  • With the advent of the big data era, the interest in the development of land using traffic data has increased significantly. However, the current research on traffic big data lingers around organizing or calibrating the data only. In this research, a novel method for discovering the hidden values within the traffic data through data mining is proposed. Considering the fact that traffic data and network structures have similarities, network analysis algorithms are used to find valuable information in the actual traffic volume data. The PageRank and HITS algorithms are then employed to find the centralities. While conventional methods present centralities based on uncomplicated traffic volume data, the proposed method provides more reasonable centrality locations through network analysis. Since the centrality locations that we have found carry detailed spatiotemporal characteristics, such information can be used as an objective basis for making policy decisions.

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.

The Ramp Metering System Construction of Urban Freeway by the Intelligent Transportation System (ITS) Technology (첨단교통체계(ITS)에 의한 도시고속도록의 Ramp Metering 시스템 구축에 관한 연구)

  • 김태곤
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.333-350
    • /
    • 1999
  • Today freeway is thought to be a very important transportation facility carrying tremendous traffic flow as the main corridor within the area of between the areas. However freeway is experiencing severe congestion and accidents by increased entrance ramp flow especially at peak time period. Ramp meters on the freeway entrance ramps that supply traffic to the freeway in a measured or appropriately regulated amount are needed for alleviating freeway congestion. Because ramp meters can be operated to discharge traffic at a measured or regulated rate thus maintaining more uniform speed on the mainline section maximizing the throughput to the freeway within the capacity of a downstream bottleneck and reducing the congestion related accidents. Thus the objectives in this study were to analyze the traffic characteristics on the freeway I-94 with ramp metering system before/after ITS technology in Detroit (Michigan) area compare shifts of the traffic characteristics on the freeway I-94 before/after ITS technology and finally suggest a better ramp metering strategy for the freeway system The following results were obtained: i)Flow occupancies and speeds on the mainline merge section of freeway were shown to be a big difference depending on the peak periods areas and directions based on the distribution of traffic flow characteristics on the freeway. ii)Reduced speed was shown to be more than 5 mph and ramp flow was also shown to be more than 240 vph at peak periods if there was the ramp metering system constructed on the freeway. iii)Ramp metering system was shown to be optimally operated on the freeway if ramp flow could be maximized within the range of over 900 vph and reduced occupancy could be also maximized by no more than 2 percent at peak periods. iv)The average flows on the freeway after the ITS technology were shown to be a decrease of over 20% depending on the peak periods areas and directions when compared with those flow on the freeway before the ITS technology. over 20% depending on the peak periods areas and directions when compared with those speeds on the freeway before the ITS technology. vi)The average metering rates on the freeway after the ITS technology were shown to be an increase of over 10% depending on the peak periods areas and directions when compared with those metering rates on the freeway before the ITS technology.

  • PDF

A Study on the traffic flow prediction through Catboost algorithm (Catboost 알고리즘을 통한 교통흐름 예측에 관한 연구)

  • Cheon, Min Jong;Choi, Hye Jin;Park, Ji Woong;Choi, HaYoung;Lee, Dong Hee;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.58-64
    • /
    • 2021
  • As the number of registered vehicles increases, traffic congestion will worsen worse, which may act as an inhibitory factor for urban social and economic development. Through accurate traffic flow prediction, various AI techniques have been used to prevent traffic congestion. This paper uses the data from a VDS (Vehicle Detection System) as input variables. This study predicted traffic flow in five levels (free flow, somewhat delayed, delayed, somewhat congested, and congested), rather than predicting traffic flow in two levels (free flow and congested). The Catboost model, which is a machine-learning algorithm, was used in this study. This model predicts traffic flow in five levels and compares and analyzes the accuracy of the prediction with other algorithms. In addition, the preprocessed model that went through RandomizedSerachCv and One-Hot Encoding was compared with the naive one. As a result, the Catboost model without any hyper-parameter showed the highest accuracy of 93%. Overall, the Catboost model analyzes and predicts a large number of categorical traffic data better than any other machine learning and deep learning models, and the initial set parameters are optimized for Catboost.

Traffic Channel Management of the Radio Network Controller in IMT-2000 W-CDMA System (IMT-2000 비동기 방식 시스템에서 제어국의 트래픽 채널 관리 방식)

  • 유병한;장성철;백장현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3B
    • /
    • pp.226-236
    • /
    • 2002
  • In this paper, we present the channel assignment and management methods for an efficient use of traffic channel resource for supporting 12.2 Kbps, 64 Kbps, and 384 Kbps traffic with the different quality of service (QoS) in the radio network controller (RNC) in asynchronous IMT-2000 system. We first describe two types of traffic channel block assignments for utilizing the traffic channel efficiently; the partially dedicated and partially shared channel (PDPSC) assignment and the completely shared channel (CSC) assignment. The former is that some traffic channel block is completely assigned to each traffic type and the other blocks are shared with some traffic type. The latter is that all traffic channel blocks are completely shared with all traffic types. Further, for efficiently assigning, releasing, and managing the channel resource, we present the traffic channel management method which consists of the block and task management step. Through numerical examples, we evaluate the blocking probability and the mean number of required search for fading the available channel when applying our proposed channel block assignment and resource management methods.

Improving Assessments of Maritime Traffic Congestion Based On Occupancy Area Density Analysis for Traffic Vessels (통항선박의 점용영역 밀집도 분석을 통한 해상교통혼잡도 평가 개선에 관한 연구)

  • Kim, Soung-Tae;Rhee, Hahn-Kyou;Gong, In-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.2
    • /
    • pp.153-160
    • /
    • 2017
  • It may be reasonable to consider density per unit area over time rather than analyze traffic volume, which is simply the traffic volume per unit of time, in assessing the maritime traffic congestion of a certain area. This study contributes to the standardization of maritime traffic congestion assessment methods for the maritime traffic safety diagnosis institute while seeking a new method to minimize evaluation error due to converted traffic volume per ship tonnage level. To solve this problem, a method to evaluate maritime traffic congestion by comparing the area occupied by a vessel with the area of its route using vessel identification data from the Automatic Identification System (AIS) has been proposed. In this new model, it is possible to use actual data due to the development of information and communication technology, reducing conversion error while allowing for the evaluation of maritime traffic congestion by route.

Analysis of abnormal traffic controller based on prediction to improve network service survivability (네트워크 서비스의 생존성을 높이기 위한 예측기반 이상 트래픽 제어 방식 분석)

  • Kim Kwang sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.296-304
    • /
    • 2005
  • ATCoP(Abnormal traffic controller based on prediction) is presented to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. ATCoP is a method to control abnormal traffic that is entering into the network When unknown attack generates excessive traffic, service survivability is guaranteed by giving the priority to normal traffic than abnormal traffic, that is reserving some channels for normal traffic. If the reserved channel number increases, abnormal traffic has lower quality service by ATCoP system and then its service survivability becomes worse. As an analytic result, the proposed scheme maintains the blocking probability of normal traffic on the predefined level in the specific interval of input traffic.