• Title/Summary/Keyword: Data Traffic

Search Result 4,747, Processing Time 0.029 seconds

A Study on the Verification of Traffic Flow and Traffic Accident Cognitive Function for Road Traffic Situation Cognitive System

  • Am-suk, Oh
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.273-279
    • /
    • 2022
  • Owing to the need to establish a cooperative-intelligent transport system (C-ITS) environment in the transportation sector locally and abroad, various research and development efforts such as high-tech road infrastructure, connection technology between road components, and traffic information systems are currently underway. However, the current central control center-oriented information collection and provision service structure and the insufficient road infrastructure limit the realization of the C-ITS, which requires a diversity of traffic information, real-time data, advanced traffic safety management, and transportation convenience services. In this study, a network construction method based on the existing received signal strength indicator (RSSI) selected as a comparison target, and the experimental target and the proposed intelligent edge network compared and analyzed. The result of the analysis showed that the data transmission rate in the intelligent edge network was 97.48%, the data transmission time was 215 ms, and the recovery time of network failure was 49,983 ms.

A Study on the Improvement of Standards of Traffic Information Service and Provide Services Based on the Detailed Traffic Information (교통정보서비스 표출기준 개선 및 상세교통정보 기반 서비스 제공방안 연구)

  • Bae, Kwangsoo;Lee, Seungcheol
    • Journal of Information Technology Services
    • /
    • v.17 no.4
    • /
    • pp.85-100
    • /
    • 2018
  • In this study, we formulated rational criteria to efficiently provide traffic information services via a crafted approach. By utilizing this, we presented a detailed traffic information service providing method that can overcome the limitations of existing link unit information provision system. Three methodologies such as user survey, data mining, and KHCM (Korea Highway Capacity Manual) utilization method were applied to formulate a rational expression standard for traffic information service. Each method was designed to establish a quantitative criterion for various traffic conditions and to enable user-oriented traffic information service in consideration of the traffic principal/compatibility. Considering the results of each methodological analysis in a comprehensive manner, the basic expression standards for traffic information service was formulated. Then we presented improvements such as traffic condition step by road, speed range of traffic condition, expression term of traffic condition and so on. In order to complement the problems of the information provision system of the existing link unit based on the derived improvement criterion, we presented the detailed traffic information service provision method by using the traffic speed data of the second order. And we applied this to the two links of Daegu city. The method presented in this research can improve the quality of traffic information service. Not only it can be used for various fields such as optimal route search, traffic safety service and so on.

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

Analysis System for Traffic Accident based on WEB (WEB 기반 교통사고 분석)

  • Hong, You-Sik;Han, Chang-Pyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.13-20
    • /
    • 2022
  • Road conditions and weather conditions are very important factors in the case of traffic accident fatalities in fog and ice sections that occur on roads in winter. In this paper, a simulation was performed to estimate the traffic accident risk rate assuming traffic accident prediction data. In addition, in this paper, in order to reduce traffic accidents and prevent traffic accidents, factor analysis and traffic accident fatality rates were predicted using the WEKA data mining technique and TENSOR FLOW open source data on traffic accident fatalities provided by the Korea Transportation Corporation.

Analysis of Transportation Safety Policies among 81 Cities in Korea (도시별 교통안전정책의 시행효과 분석)

  • Kim, Chang-Kyun;Kim, Dong-Gun;Park, Yong-Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.3 s.74
    • /
    • pp.27-39
    • /
    • 2004
  • The previous studies on analyzing the effects of traffic safety policies are very limited. Implementing traffic safety policies in view of their own urban traffic characteristics would be fairly desirable to handle properly the traffic safety problems. The relationships between traffic accidents and traffic safety policies have been researched by classifying the eighty one cities in Korea into four groups in terms of the size of the city population. Statistical analysis have been conducted for traffic accidents data and traffic safety policies, respectively. In order to mearsure the effectiveness of the traffic policies in the real world, regression models have been developed by handling the accident data and policy data. As a result of analysing the data, the traffic policies have showed different effects according to the size of the cities. While budget investment policies had provided enormous influences to reduce traffic accidents in the big cities more than a half million polulation, traffic enforcement and traffic education have been so efficient to control traffic accident problems in the smaller cities less than a half million poluation.

A New Fair Call Admission Control for Integrated Voice and Data Traffic in Wireless Mobile Networks

  • Hwang, Young Ha;Noh, Sung-Kee;Kim, Sang-Ha
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.107-113
    • /
    • 2006
  • It is essential to guarantee a handoff dropping probability below a predetermined threshold for wireless mobile networks. Previous studies have proposed admission control policies for integrated voice/data traffic in wireless mobile networks. However, since QoS has been considered only in terms of CDP (Call Dropping Probability), the result has been a serious CBP (Call Blocking Probability) unfairness problem between voice and data traffic. In this paper, we suggest a new admission control policy that treats integrated voice and data traffic fairly while maintaining the CDP constraint. For underprivileged data traffic, which requires more bandwidth units than voice traffic, the packet is placed in a queue when there are no available resources in the base station, instead of being immediately rejected. Furthermore, we have adapted the biased coin method concept to adjust unfairness in terms of CBP. We analyzed the system model of a cell using both a two-dimensional continuous-time Markov chain and the Gauss-Seidel method. Numerical results demonstrate that our CAC (Call Admission Control) scheme successfully achieves CBP fairness for voice and data traffic.

Design of Traffic Data Acquisition System with Loop Defector and Piezo-Electric Sensor (루프검지기와 피에조 센서를 이용한 차량정보 수집 시스템 설계)

  • 한경호;양승훈
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.6
    • /
    • pp.102-108
    • /
    • 2002
  • This paper handles the design of a real time traffic data acquisition system using loop detector and piezo-electric sensor to acquire the vehicle information EISA compatible parallel I/O interface card is designed to sample 30 I/O channels at variable rates for raw traffic data acquisition. The control software is designed to generate the traffic data informations from the raw data. The traffic data information provides vehicle length, speed, number of axles, etc. Vehicle types are detected and categorized into eleven types from the vehicle length, axles positions and axle counts information. The traffic information is formed into packet and transferred to the remote hosts through serial communications for ITS applications.

Traffic Correction System Using Vehicle Axles Counts of Piezo Sensors (피에조센서의 차량 축 카운트를 활용한 교통량보정시스템)

  • Jung, Seung-Weon;Oh, Ju-Sam
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.277-283
    • /
    • 2021
  • Traffic data by vehicle classification are important data used as basic data in various fields such as road and traffic design. Traffic data is collected through permanent and temporary surveys and is provided as an annual average daily traffic (AATD) in the statistical yearbook of road traffic. permanent surveys are collected through traffic collection equipment (AVC), and the AVC consists of a loop sensor that detects traffic volume and a piezo sensor that detects the number of axes. Due to the nature of the buried type of traffic collection equipment, missing data is generated due to failure of detection equipment. In the existing method, it is corrected through historical data and the trend of traffic around the point. However, this method has a disadvantage in that it does not reflect temporal and spatial characteristics and that the existing data used for correction may also be a correction value. In this study, we proposed a method to correct the missing traffic volume by calculating the axis correction coefficient through the accumulated number of axes acquired by using a piezo sensor that can detect the axis of the vehicle. This has the advantage of being able to reflect temporal and spatial characteristics, which are the limitations of the existing methods, and as a result of comparative evaluation, the error rate was derived lower than that of the existing methods. The traffic volume correction system using axis count is judged as a correction method applicable to the field system with a simple algorithm.

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

Analysis of Urban Traffic Network Structure based on ITS Big Data (ITS 빅데이터를 활용한 도시 교통네트워크 구조분석)

  • Kim, Yong Yeon;Lee, Kyung-Hee;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.2 no.2
    • /
    • pp.1-7
    • /
    • 2017
  • Intelligent transportation system (ITS) has been introduced to maximize the efficiency of operation and utilization of the urban traffic facilities and promote the safety and convenience of the users. With the expansion of ITS, various traffic big data such as road traffic situation, traffic volume, public transportation operation status, management situation, and public traffic use status have been increased exponentially. In this paper, we derive structural characteristics of urban traffic according to the vehicle flow by using big data network analysis. DSRC (Dedicated Short Range Communications) data is used to construct the traffic network. The results can help to understand the complex urban traffic characteristics more easily and provide basic research data for urban transportation plan such as road congestion resolution plan, road expansion plan, and bus line/interval plan in a city.

  • PDF