• Title/Summary/Keyword: Incident Detection Time

Search Result 73, Processing Time 0.026 seconds

Development of a Freeway Incident Detection Model Based on Traffic Congestion Classification Scheme (교통정체상황 분류기법에 기초한 연속류 돌발상황 검지모형 개발 연구)

  • Kim, Young-Jun;Chang, Myung-Soon
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.6
    • /
    • pp.175-196
    • /
    • 2004
  • This study focuses on improving the performance of freeway incident detection by introducing some new measures to reduce false alarms in developing a new incident detection model. The model consists of the 5 major components through which a series of decision makings in determining the given traffic flow condition are made. The decision making process was designed such that the causes of traffic congestions can be accurately classified into several types including incidents and bottlenecks according to their unique characteristics. The model performance was tested and found to be compatible with that of the existing well-recognized models in terms of the detection rate and detection time. It should noted that the model produced much less false alarms than most of the existing models. The study results prove that the initial objective of the study was satisfied as it was an experimental trial to improve the false alarm rate for the incident detection model to be more pactically usable for traffic management purposes.

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

Method of Tunnel Incidents Detection Using Background Image (배경영상을 이용한 터널 유고 검지 방법)

  • Jeong, Sung-Hwan;Ju, Young-Ho;Lee, Jong-Tae;Lee, Joon-Whoan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6089-6097
    • /
    • 2012
  • This study suggested a method of detecting an incident inside tunnel by using camera that is installed within the tunnel. As for the proposed incident detection method, a static object, travel except vehicles, smoke, and contra-flow were detected by extracting the moving object through using the real-time background image differencing after receiving image from the camera, which is installed inside the tunnel. To detect the moving object within the tunnel, the positive background image was created by using the moving information of the object. The incident detection method was developed, which is strong in a change of lighting that occurs within the tunnel, and in influence of the external lighting that occurs in the entrance and exit of the tunnel. To examine the efficiency of the suggested method, the experimental images were acquired from Marae tunnel and Expo tunnel in Yeosu of Jeonnam and from Unam tunnel in Imsil of Jeonbuk. Number of images, which were used in experiment, included 20 cases for static object, 20 cases for travel except vehicles, 4 cases for smoke, and 10 cases for contra-flow. As for the detection rate, all of the static object, the travel except vehicles, and the contra-flow were detected in the experimental image. In case of smoke, 3 cases were detected. Thus, excellent performance could be confirmed. The proposed method is now under operation in Marae tunnel and Expo tunnel in Yeosu of Jeonnam and in Unam tunnel in Imsil of Jeonbuk. To examine accurate efficiency, the evaluation of performance is considered to be likely to be needed after acquiring the incident videos, which actually occur within tunnel.

Stop Object Method within Intersection with Using Adaptive Background Image (적응적 배경영상을 이용한 교차로 내 정지 객체 검출 방법)

  • Kang, Sung-Jun;Sur, Am-Seog;Jeong, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2430-2436
    • /
    • 2013
  • This study suggests a method of detecting the still object, which becomes a cause of danger within the crossroad. The Inverse Perspective Transform was performed in order to make the object size consistent by being inputted the real-time image from CCTV that is installed within the crossroad. It established the detection area in the image with the perspective transform and generated the adaptative background image with the use of the moving information on object. The detection of the stop object was detected the candidate region of the stop object by using the background-image differential method. To grasp the appearance of truth on the detected candidate region, a method is proposed that uses the gradient information on image and EHD(Edge Histogram Descriptor). To examine performance of the suggested algorithm, it experimented by storing the images in the commuting time and the daytime through DVR, which is installed on the cross street. As a result of experiment, it could efficiently detect the stop vehicle within the detection region inside the crossroad. The processing speed is shown in 13~18 frame per second according to the area of the detection region, thereby being judged to likely have no problem about the real-time processing.

Development of a Fuzzy-Genetic Algorithm-based Incident Detection Model with Self-adaptation Capability (Fuzzy-Genetic Algorithm기반의 자가적응형 돌발상황 검지모형 개발 연구)

  • Lee, Si-Bok;Kim, Young-Ho
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.4 s.75
    • /
    • pp.159-173
    • /
    • 2004
  • This study utilizes the fuzzy logic and genetic algorithm to improve the existing incident detection models by addressing the problems associated with "crisp" thresholds and model transferability (applicability). The model's major components were designed to be a set of the fuzzy inference engines, and for the self-adaptation capability the genetic algorithm was introduced in optimization(or training) of the fuzzy membership functions. This approach is often called "the hybrid of fuzzy-genetic algorithm" The model performance was tested and found to be compatible with that of the existing well-recognized models in terms of performance measures such as detection rate, false alarm rate, and detection time. This study was not an effort for simple improvement of the model performance, but an experimental attempt to incorporate new characteristics essential for the incident detection model to be universally applicable for various roadway and traffic conditions. The study results prove that the initial objective of the study was satisfied, and suggest a direction that the future research work in this area must follow.

Improvement of ATIS Model Performance under Connected Vehicle Environment

  • Kim, Hoe-Kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.10-18
    • /
    • 2012
  • This paper develops a decentralized advanced traveler information system (ATIS) under the connected vehicle environment, recently regarded as one of most promising tools in Intelligent Transportation Systems (ITS). The performance of the proposed ATIS is reinforced by introducing autonomous automatic incident detection (AAID) function. The proposed ATIS is implemented and tested using an off-the-shelf microscopic simulation model (VISSIM) on a simple traffic network under idealized communication conditions. A key attribute of this experiment is the inclusion of a non-recurrent traffic state (i.e., traffic incident). Simulation results indicate that the ATIS using V2V communication is efficient in saving drivers' travel time and AAID plays an important role in improving the effectiveness of the system.

Abnormal Crowd Behavior Detection Using Heuristic Search and Motion Awareness

  • Usman, Imran;Albesher, Abdulaziz A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.131-139
    • /
    • 2021
  • In current time, anomaly detection is the primary concern of the administrative authorities. Suspicious activity identification is shifting from a human operator to a machine-assisted monitoring in order to assist the human operator and react to an unexpected incident quickly. These automatic surveillance systems face many challenges due to the intrinsic complex characteristics of video sequences and foreground human motion patterns. In this paper, we propose a novel approach to detect anomalous human activity using a hybrid approach of statistical model and Genetic Programming. The feature-set of local motion patterns is generated by a statistical model from the video data in an unsupervised way. This features set is inserted to an enhanced Genetic Programming based classifier to classify normal and abnormal patterns. The experiments are performed using publicly available benchmark datasets under different real-life scenarios. Results show that the proposed methodology is capable to detect and locate the anomalous activity in the real time. The accuracy of the proposed scheme exceeds those of the existing state of the art in term of anomalous activity detection.

Precision Evaluation of Expressway Incident Detection Based on Dash Cam (차량 내 영상 센서 기반 고속도로 돌발상황 검지 정밀도 평가)

  • Sanggi Nam;Younshik Chung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.6
    • /
    • pp.114-123
    • /
    • 2023
  • With the development of computer vision technology, video sensors such as CCTV are detecting incident. However, most of the current incident have been detected based on existing fixed imaging equipment. Accordingly, there has been a limit to the detection of incident in shaded areas where the image range of fixed equipment is not reached. With the recent development of edge-computing technology, real-time analysis of mobile image information has become possible. The purpose of this study is to evaluate the possibility of detecting expressway emergencies by introducing computer vision technology to dash cam. To this end, annotation data was constructed based on 4,388 dash cam still frame data collected by the Korea Expressway Corporation and analyzed using the YOLO algorithm. As a result of the analysis, the prediction accuracy of all objects was over 70%, and the precision of traffic accidents was about 85%. In addition, in the case of mAP(mean Average Precision), it was 0.769, and when looking at AP(Average Precision) for each object, traffic accidents were the highest at 0.904, and debris were the lowest at 0.629.

An Acoustic Event Detection Method in Tunnels Using Non-negative Tensor Factorization and Hidden Markov Model (비음수 텐서 분해와 은닉 마코프 모델을 이용한 터널 환경에서의 음향 사고 검지 방법)

  • Kim, Nam Kyun;Jeon, Kwang Myung;Kim, Hong Kook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.9
    • /
    • pp.265-273
    • /
    • 2018
  • In this paper, we propose an acoustic event detection method in tunnels using non-negative tensor factorization (NTF) and hidden Markov model (HMM) applied to multi-channel audio signals. Incidents in tunnel are inherent to the system and occur unavoidably with known probability. Incidents can easily happen minor accidents and extend right through to major disaster. Most incident detection systems deploy visual incident detection (VID) systems that often cause false alarms due to various constraints such as night obstacles and a limit of viewing angle. To this end, the proposed method first tries to separate and detect every acoustic event, which is assumed to be an in-tunnel incident, from noisy acoustic signals by using an NTF technique. Then, maximum likelihood estimation using Gaussian mixture model (GMM)-HMMs is carried out to verify whether or not each detected event is an actual incident. Performance evaluation shows that the proposed method operates in real time and achieves high detection accuracy under simulated tunnel conditions.

A Simulation-Based Investigation of an Advanced Traveler Information System with V2V in Urban Network (시뮬레이션기법을 통한 차량 간 통신을 이용한 첨단교통정보시스템의 효과 분석 (도시 도로망을 중심으로))

  • Kim, Hoe-Kyoung
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.5
    • /
    • pp.121-138
    • /
    • 2011
  • More affordable and available cutting-edge technologies (e.g., wireless vehicle communication) are regarded as a possible alternative to the fixed infrastructure-based traffic information system requiring the expensive infrastructure investments and mostly implemented in the uninterrupted freeway network with limited spatial system expansion. This paper develops an advanced decentralized traveler information System (ATIS) using vehicle-to-vehicle (V2V) communication system whose performance (drivers' travel time savings) are enhanced by three complementary functions (autonomous automatic incident detection algorithm, reliable sample size function, and driver behavior model) and evaluates it in the typical $6{\times}6$ urban grid network with non-recurrent traffic state (traffic incident) with the varying key parameters (traffic flow, communication radio range, and penetration ratio), employing the off-the-shelf microscopic simulation model (VISSIM) under the ideal vehicle communication environment. Simulation outputs indicate that as the three key parameters are increased more participating vehicles are involved for traffic data propagation in the less communication groups at the faster data dissemination speed. Also, participating vehicles saved their travel time by dynamically updating the up-to-date traffic states and searching for the new route. Focusing on the travel time difference of (instant) re-routing vehicles, lower traffic flow cases saved more time than higher traffic flow ones. This is because a relatively small number of vehicles in 300vph case re-route during the most system-efficient time period (the early time of the traffic incident) but more vehicles in 514vph case re-route during less system-efficient time period, even after the incident is resolved. Also, normally re-routings on the network-entering links saved more travel time than any other places inside the network except the case where the direct effect of traffic incident triggers vehicle re-routings during the effective incident time period and the location and direction of the incident link determines the spatial distribution of re-routing vehicles.