• Title/Summary/Keyword: Efficiency of Traffic Information System

Search Result 281, Processing Time 0.055 seconds

Performance Improvement of Traffic Signal Lights Recognition Based on Adaptive Morphological Analysis (적응적 형태학적 분석에 기초한 신호등 인식률 성능 개선)

  • Kim, Jae-Gon;Kim, Jin-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2129-2137
    • /
    • 2015
  • Lots of research and development works have been actively focused on the self-driving vehicles, locally and globally. In order to implement the self-driving vehicles, lots of fundamental core technologies need to be successfully developed and, specially, it is noted that traffic lights detection and recognition system is an essential part of the computer vision technologies in the self-driving vehicles. Up to nowadays, most conventional algorithm for detecting and recognizing traffic lights are mainly based on the color signal analysis, but these approaches have limits on the performance improvements that can be achieved due to the color signal noises and environmental situations. In order to overcome the performance limits, this paper introduces the morphological analysis for the traffic lights recognition. That is, by considering the color component analysis and the shape analysis such as rectangles and circles simultaneously, the efficiency of the traffic lights recognitions can be greatly increased. Through several simulations, it is shown that the proposed method can highly improve the recognition rate as well as the mis-recognition rate.

Self-similarity of SMS Traffic (SMS 트래픽의 Self-similarity)

  • Ha, Jun;Shin, Woo-Cheol;Park, Jin-Kyung;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.353-356
    • /
    • 2003
  • As the wireless mobile telecommunication system has been developed with astonishment, its offering service has also widely been expanded including various data service. Currently, the wireless mobile telecommunication network presents voice service that covers for the most part of the whole service areas. For this reason, the availability of the switching capacity in the mobile switching center(MSC) is manipulated by the required volume of voice service. However, considering the increase of data service, it is desirable for the current switching method to be modified for more efficiency. In this Paper, we analyze the data traffic caused by providing data service in the wireless mobile telecommunication network. For this, we are firstly going to review the result of the analysis in the feature of the data traffic. Secondly, based on the review, we are also going to perform analyzing the other feature of the data traffic normally generated in the wireless mobile telecommunication network. We expect that this paper would be utilized as an elementary source for the feature of the SMS data .traffic and it will be an honour for ourselves to work on it.

  • PDF

MIMO Techniques for Green Radio Guaranteeing QoS

  • Nicolaou, Marios;Han, Congzheng;Beh, Kian Chung;Armour, Simon;Doufexi, Angela
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.130-139
    • /
    • 2010
  • Environmental issues and the need to reduce energy consumption for lowering operating costs have pushed power efficiency to become one of the major issues of current research in the field of wireless networks. This paper addresses a number of multiple input multiple output (MIMO) precoding and scheduling techniques across the PHY and MAC layers that can operate under a reduced link budget and collectively improve the transmit power efficiency of a base station, while maintaining the same levels of service. Different MIMO transmission and precoding schemes proposed for LTE, achieving varying degrees of multiuser diversity in both the time, frequency as well as the space domain, are examined. Several fairness-aware resource allocation algorithms are applied to the considered MIMO schemes and a detailed analysis of the tradeoffs between power efficiency and quality of service is presented. This paper explicitly examines the performance of a system serving real-time, VoIP traffic under different traffic loading conditions and transmit power levels. It is demonstrated that by use of efficient scheduling and resource allocation techniques significant savings in terms of consumed energy can be achieved, without compromising QoS.

Inter-clustering Cooperative Relay Selection Schemes for 5G Device-to-device Communication Networks

  • Nasaruddin, Nasaruddin;Yunida, Yunida;Adriman, Ramzi
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.3
    • /
    • pp.143-152
    • /
    • 2022
  • The ongoing adoption of 5G will increase the data traffic, throughput, multimedia services, and power consumption for future wireless applications and services, including sensor and mobile networks. Multipath fading on wireless channels also reduces the system performance and increases energy consumption. To address these issues, device-to-device (D2D) and cooperative communications have been proposed. In this study, we propose two inter-clustering models using the relay selection method to improve system performance and increase energy efficiency in cooperative D2D networks. We develop two inter-clustering models and present their respective algorithms. Subsequently, we run a computer simulation to evaluate each model's outage probability (OP) performance, throughput, and energy efficiency. The simulation results show that inter-clustering model II has the lowest OP, highest throughput, and highest energy efficiency compared with inter-clustering model I and the conventional inter-clustering-based multirelay method. These results demonstrate that inter-clustering model II is well-suited for use in 5G overlay D2D and cellular communications.

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

Caching Algorithm for Core Network Offloading in Smallcell Environment (소형셀 환경에서 코어망 오프로딩을 위한 캐시 알고리즘)

  • Jung, So-Yi;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.32-38
    • /
    • 2015
  • In this paper, we propose a smallcell local caching algorithm under user's context in smallcell environment. The proposed system reduces traffic to core network and the network cost, but increases it's performance. The proposed algorithm precache suitable files using smallcell's regional characteristics and target's personality. It can adjusts a storage allocation to make effective usage of our limited cache storage capacity. In order to evaluate the performance of the proposed cache algorithm, we define the cache efficiency, the decrement of core network traffic. The simulation results show that the proposed algorithm can improve performance by about 200% compared to existing web cache scheme.

An Efficient QoS-Aware Bandwidth Re-Provisioning Scheme in a Next Generation Wireless Packet Transport Network (차세대 이동통신 패킷 수송망에서 서비스 품질을 고려한 효율적인 대역폭 재할당 기법)

  • Park, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1A
    • /
    • pp.30-37
    • /
    • 2006
  • In this paper, we propose a QoS-aware efficient bandwidth re-provisioning scheme in a next generation wireless packet transport network. At the transport network layer, it classifies the traffic of the radio network layer into a real time class and a non-real time class. Using an auto-regressive time-series model and a given packet loss probability, our scheme predicts the needed bandwidth of the non-real time class at every re-provisioning interval. Our scheme increases the system capacity by releasing the unutilized bandwidth of the non-real time traffic class for the real-time traffic class while insuring a controllable upper bound on the packet loss probability of a non-real time traffic class. Through empirical evaluations using the real Internet traffic traces, our scheme is validated that it can increase the bandwidth efficiency while guaranteeing the quality of service requirements of the non-real time traffic class.

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications

  • Wang, Jingpu;Song, Xin;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1837-1860
    • /
    • 2020
  • We propose a general framework for studying resource allocation problem and the tradeoff between spectral efficiency (SE) and energy efficiency (EE) for downlink traffic in power domain-non-orthogonal multiple access (PD-NOMA) and device to device (D2D) based heterogeneous cloud radio access networks (H-CRANs) under imperfect channel state information (CSI). The aim is jointly optimize radio remote head (RRH) selection, spectrum allocation and power control, which is formulated as a multi-objective optimization (MOO) problem that can be solved with weighted Tchebycheff method. We propose a low-complexity algorithm to solve user association, spectrum allocation and power coordination separately. We first compute the CSI for RRHs. Then we study allocating the cell users (CUs) and D2D groups to different subchannels by constructing a bipartite graph and Hungrarian algorithm. To solve the power control and EE-SE tradeoff problems, we decompose the target function into two subproblems. Then, we utilize successive convex program approach to lower the computational complexity. Moreover, we use Lagrangian method and KKT conditions to find the global optimum with low complexity, and get a fast convergence by subgradient method. Numerical simulation results demonstrate that by using PD-NOMA technique and H-CRAN with D2D communications, the system gets good EE-SE tradeoff performance.

Hybrid Scheduling Algorithm based on DWDRR using Hysteresis for QoS of Combat Management System Resource Control

  • Lee, Gi-Yeop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.21-27
    • /
    • 2020
  • In this paper, a hybrid scheduling algorithm is proposed for CMS(Combat Management System) to improve QoS(Quality of Service) based on DWDRR(Dynamic Weighted Deficit Round Robin) and priority-based scheduling method. The main proposed scheme, DWDRR is method of packet transmission through giving weight by traffic of queue and priority. To demonstrate an usefulness of proposed algorithm through simulation, efficiency in special section of the proposed algorithm is proved. Therefore, We propose hybrid algorithm between existing algorithm and proposed algorithm. Also, to prevent frequent scheme conversion, a hysteresis method is applied. The proposed algorithm shows lower packet loss rate and delay in the same traffic than existing algorithm.