• Title/Summary/Keyword: Traffic Event

Search Result 262, Processing Time 0.023 seconds

Lightweight and Migration Optimization Algorithms for Reliability Assurance of Migration of the Mobile Agent

  • Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.91-98
    • /
    • 2020
  • The mobile agent, which handles a given task while migrating between the sensor nodes, moves including the execution commands and task processing results. This increases the size of the mobile agent, causing the network to load, leading to the migration time delay and the loss of migration reliability. This paper presents the method of lightening the mobile agent using distributed object technology and the algorithm for exploring and providing the optimal migration path that is actively performed in the event of network traffic, and it proposes a method to ensure the reliability of the mobile agent migration by applying them. In addition, through the comparative analysis experiments based on agent size and network traffic for the migration time of mobile agent equipped with active rules in sensor network-based mobile agent middleware environment, applying the proposed methods proves to ensure the autonomy and migration reliability of the mobile agent.

Dynamic Data Path Prediction use Extend EKF Movement Tracing in Net-VE (Net-VE에서 이동궤적을 이용한 동적데이터 경로예측)

  • Song, Sun-Hee;Oh, Haeng-Soo;Park, Kwang-Chae;Kim, Gwang-Jun;Ra, Sang-Dong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.81-89
    • /
    • 2008
  • Improved EKF suggests variable path prediction to reduce the event traffic caused by the information sharing among multi-users in networked virtual environment. The three dimensional virtual space is maintained consistently by endless status information exchange among dispersed users, and periodic status transmission brings traffic overhead in network. By using the error between the measured movement trace of dynamic information and the EKF predicted, we propose the method applied to predict the mobile packet of dynamic data which is simultaneously changing. And, the simulation results of DIS dead reckoning algorithms and EKF path prediction is compared here. It followed the specific path and while moving, the proposed method which it proposes predicting with DIS dead reckoning algorithm and to compare to the mobile path of the actual object and it got near it predicts the possibility of knowing it was.

  • PDF

Performance Analysis of Flow Control Method Using Virtual Switchs on ATM (ATM에서 가상 스위치를 이용한 흐름 제어 방식의 성능 분석)

  • 조미령;양성현;이상훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.85-94
    • /
    • 2002
  • EMRCA(Explicit Max_min Rate Control Algorithm) switch, which has been proposed in the ATM(Asychronous Transfer Mode) standard, controls the ABR(Available Bit Rate) service traffic in the ATM networks. The ABR service class of ATM networks uses a feedback control mechanism to adapt to varying link capacities. The VS/VD(Virtual Source/Virtual Destination) technique offers the possibility to segment the otherwise end-to-end ABR control loop into separate loops. The improved feedback delay and the control of ABR traffic inside closed segments provide a better performance and QoS(Quality of Service) for ABR connections with respect to throughput, delay, and jitter. This paper is study of an ABR VS/VD flow control method. Linear control theory offers the means to derive correct choices of parameters and to assess performance issues, like stability of the system, during the design phase. The performance goals are a high link utilization, fair bandwidth distribution and robust operation in various environments, which are verified by discrete event simulations. The major contribution of this work is the use of linear control theory to model and design an ABR flow control method tailored for the special layout of a VS/VD switch, the simulation shows that this techniques better than conventional method.

  • PDF

The Importance and Utilization Plan of Database Based on Actual Accident Investigation System in Korea (한국형 자동차사고 심층조사 자료의 필요성 및 활용방안)

  • Lee, Hee Young;Lee, Kang Hyun;Kim, Oh Hyun;Youk, Hyun;An, Gyo Jin;Kong, Joon Seok;Kang, Chan Young;Choo, Yeon Il;Kim, Ho Jung;Kim, Sang Chul
    • Journal of Auto-vehicle Safety Association
    • /
    • v.11 no.3
    • /
    • pp.43-47
    • /
    • 2019
  • Developed countries are operating an in-depth database in motor vehicle crashes nationwide. They do not rely solely on the police investigation reports that are responsible for motor vehicle crashes in each country but are developing into a useful database by expanding the categories of data through more indicators addition. In Korea, after implementing comprehensive measures to reduce traffic accident deaths in 2013, the medical centers participated in establishing the actual accident investigation system, which was called as the Korean In-Depth Accident Study (hereinafter KIDAS). This KIDAS database included more in-depth indicators as the types of accidents, types of vehicles, the injury severity, adequacy of safety devices, seating position of passengers. Although there are difficulties in establishing an actual accident investigation system including data collection due to various restrictions, if the system can cooperate with each other such as medical centers, insurance companies, police, fire and rescue services, towing companies, and car repair shops in the future, It would be expected to contribute to the development of safer vehicle, treatment system and traffic safety policy that lower the injury severity of occupant in the event of a motor vehicle crashes.

An Efficient Method for Analyzing Network Security Situation Using Visualization (시각화 기반의 효율적인 네트워크 보안 상황 분석 방법)

  • Jeong, Chi-Yoon;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Na, Jung-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.107-117
    • /
    • 2009
  • Network administrator recognizes the abnormal phenomenon in the managed network by using the alert messages generated in the security devices including the intrusion detection system, intrusion prevention system, firewall, and etc. And then the series of task, which searches for the traffic related to the alert message and analyzes the traffic data, are required to determine where the abnormal phenomenon is the real network security threat or not. There are many alert messages to have to inspect in order to determine the network security situation. Also the much times are needed so that the network administrator can analyze the security condition using existing methods. Therefore, in this paper, we proposed an efficient method for analyzing network security situation using visualization. The proposed method monitors anomalies occurred in the entire IP address's space and displays the detail information of a security event. In addition, it represents the physical locations of the attackers or victims by linking GIS information and IP address. Therefore, it is helpful for network administrator to rapidly analyze the security status of managed network.

AUTOMATIC DATA COLLECTION TO IMPROVE READY-MIXED CONCRETE DELIVERY PERFORMANCE

  • Pan Hao;Sangwon Han
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.187-194
    • /
    • 2011
  • Optimizing truck dispatching-intervals is imperative in ready mixed concrete (RMC) delivery process. Intervals shorter than optimal may induce queuing of idle trucks at a construction site, resulting in a long delivery cycle time. On the other hand, intervals longer than optimal can trigger work discontinuity due to a lack of available trucks where required. Therefore, the RMC delivery process should be systematically scheduled in order to minimize the occurrence of waiting trucks as well as guarantee work continuity. However, it is challenging to find optimal intervals, particularly in urban areas, due to variations in both traffic conditions and concrete placement rates at the site. Truck dispatching intervals are usually determined based on the concrete plant managers' intuitive judgments, without sufficient and reliable information regarding traffic and site conditions. Accordingly, the RMC delivery process often experiences inefficiency and/or work discontinuity. Automatic data collection (ADC) techniques (e.g., RFID or GPS) can be effective tools to assist plant managers in finding optimal dispatching intervals, thereby enhancing delivery performance. However, quantitative evidence of the extent of performance improvement has rarely been reported to data, and this is a central reason for a general reluctance within the industry to embrace these techniques, despite their potential benefits. To address this issue, this research reports on the development of a discrete event simulation model and its application to a large-scale building project in Abu Dhabi. The simulation results indicate that ADC techniques can reduce the truck idle time at site by 57% and also enhance the pouring continuity in the RMC delivery process.

  • PDF

QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks (USN에서 QoS보장을 위한 MAC 프로토콜)

  • Kim, Seong-Hun;Goh, Sun-Bok;Lee, Seung-Keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.513-516
    • /
    • 2008
  • The sensor node's performance is expected to be improved and the price will be largely decreased. As USN-applied field is expanded, multiple application services are expected to be provided through one USN soon. Multiple applications be required a periodic data reporting, consecutive information monitoring, event-driven data and query-based data as the data pattern that USN is delivered. Accordingly, the mechanism which can assure QoS according to each data characteristic is required. In this paper, A proposed protocol apply the duty cycle of S-MAC protocol variably and flexible according QoS level. This method largely reduces the delay on the delay-sensitive traffic, while keeping the energy efficiency.

  • PDF

Experimental study on possible vortex shedding in a suspension bridge - Part II - Results when under typhoon Babs and York

  • Law, S.S.;Yang, Q.S.;Fang, Y.L.
    • Wind and Structures
    • /
    • v.10 no.6
    • /
    • pp.555-576
    • /
    • 2007
  • Statistical analysis on the measured responses of a suspension bridge deck (Law, et al. 2007) show that vibration response at the first torsional mode of the structure has a significant increase at and beyond the critical wind speed for vortex shedding as noted in the wind tunnel tests on a sectional model. This paper further analyzes the measured responses of the structure when under typhoon conditions for any possible vortex shedding events. Parameters related to the lifting force in such a possible event and the vibration amplitudes are estimated with a single-degree-of-freedom model of the system. The spatial correlation of vortex shedding along the bridge span is also investigated. Possible vortex shedding events are found at both the first torsional and second vertical modes with the root-mean-square amplitudes comparable to those predicted from wind tunnel tests. Small negative stiffness due to wind effects is observed in isolated events that last for a short duration, but the aerodynamic damping exhibits either positive or negative values when the vertical angle of wind incidence is beyond ${\pm}10^{\circ}$. Vibration of the bridge deck is highly correlated in the events at least in the middle one-third of the main span.

Emphasizing Intelligent Event Processing Cooperative Surveillance System (지능형 사건 처리를 강조한 협업 감시 시스템)

  • Yoon, Tae-Ho;Song, Yoo-Seoung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.6
    • /
    • pp.339-343
    • /
    • 2012
  • Security and monitoring system has many applications and commonly used for detection, warning, alarm, etc. As the networking technology advances, user requirements are getting higher. An intelligent and cooperative surveillance system is proposed to meet current user demands and improve the performance. This paper focuses on the implementation issue for the embedded intelligent surveillance system. To cover wide area cooperative function is implemented and connected by wireless sensor network technology. Also to improve the performance lots of sensors are employed into the surveillance system to reduce the error but improve the detection probability. The proposed surveillance system is composed of vision sensor (camera), mic array sensor, PIR sensor, etc. Between the sensors, data is transferred by IEEE 802.11s or Zigbee protocol. We deployed a private network for the sensors and multiple gateways for better data throughput. The developed system is targeted to the traffic accident detection and alarm. However, its application can be easily changed to others by just changing software algorithm in a DSP chip.

Analysis of Driver Injuries Caused by Frontal Impact during Abnormal Driver Position (비정상 상태 운전 시 정면충돌에서의 상해 분석)

  • Park, Jiyang;Youn, Younghan;Kwak, Youngchan;Son, Changki
    • Journal of Auto-vehicle Safety Association
    • /
    • v.10 no.3
    • /
    • pp.32-37
    • /
    • 2018
  • Recently, the driver can be assisted by the advanced active safety devices such as ADAS from road traffic risks. With this system, driver and passenger may freed from can driving tasks or kept eyes on forward direction while on the road. Help from adoptive cruise control, auto parking and newly develped automated driving vehicles technologies, the driver positions will vary significantly from the current standard driver position during the travel time. On this hypothesis, the objective of this study is analyze the behavior and injuries of drivers in the event of frontal impact under these abnormal driver position. Based on the KNCAP frontal impact testing method, this simulation matrix was set-up with dummies of 5 th tile female Hybrid III dummy and 50 th tile male Hybrid III dummy. The small sedan type passenger car was modeled in this simulation. The series of simulation was performed to compare the injuries and behaviour of each dummy, varying the seating status and seat position of each dummy.