• 제목/요약/키워드: Traffic Event

검색결과 262건 처리시간 0.031초

Public Evacuation Time Estimates within EPZ of Ulchin Site (울진원전 방사선비상계획구역 내의 주민 소개시간 예측)

  • Chung Yang-Geun;Lee Gab-Bock;Bang Sun-Young;Kim Sung-Min;Lee Eun-Mi
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • 제3권4호
    • /
    • pp.359-372
    • /
    • 2005
  • The strong protection method of radiation emergency preparedness is the evacuation when a great deal of radionuclide material is released to environment. Required factors for evacuation time estimate of Ulchin nuclear power plant site were investigated. The traffic capacity and the traffic volume by season were investigated for the traffic analysis and simulation within EPZ of Ulchin site. As a result, the background traffic volume by season were established. The NETSIM code was applied to simulate for 12 scenarios in the event of normal traffic/summer peak traffic/winter peak traffic, daytime/night, and normal weather/adverse weather conditions. The results showed that the evacuation time required for total vehicles to move out from EPZ took generally $210\~315$ minutes. The evacuation time took longer about 45 minutes at night than in the daytime, and 45 minutes in adverse weather than normal condition.

  • PDF

Real-Time Web Middleware Framework for Supporting Electronic Commerce (전자상거래를 지원하기 위한 실시간 웹 미들웨어 프레임워크)

  • Yoon, Eun-Young;Yoon, Yong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권5S호
    • /
    • pp.1666-1675
    • /
    • 2000
  • This paper proposes a RTWM (Real-Time Web Middleware) framework for real-time EC(Electronic Commerce) systems. RTWM system is extended the existing COS( CORBA Object Service) model added to the event monitoring, real-time scheduler, real-time event filtering for supporting real-time concept of EC systems. Especially, this paper is concentrated on providing suitable event filtering function for EC system in order to meed various user time requirements under distributed system environment. It stores time constraint requirements an interesting event information input from users into QoS repository, then processes the data through appropriate RTFA(Real-Time Filtering Agent) module when real-time events occur. From this method, users can get the filtered event result reflected their requirements about real-time filtering. It means this system provides thigh QoS to users. In addition, it results in decreasing network traffic as unnecessary event information is filtered from network.

  • PDF

Development of Integrated Transportation Analysis System for Large-scale event (대형 이벤트 대응형 통합교통분석 시스템 개발)

  • Lim, Sung-Han
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • 제13권3호
    • /
    • pp.1-9
    • /
    • 2014
  • This study deals with development of Integrated Transportation Analysis System for Large-scale event. Based on case studies, the requirements of the system were defined and the direction of development was established. The large-scale events that require fast and accurate transportation policy were selected. The data warehouse and data mart were developed by integrating the large-scale event data and the traffic data. Business intelligence system was designed and developed users to allow timely decisions.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • 제6권4호
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Statistical analysis of recurrent gap time events with incomplete observation gaps (불완전한 관측틈을 가진 재발 사건 소요시간에 대한 자료 분석)

  • Shin, Seul Bi;Kim, Yang Jin
    • Journal of the Korean Data and Information Science Society
    • /
    • 제25권2호
    • /
    • pp.327-336
    • /
    • 2014
  • Recurrent event data occurs when a subject experiences same type of event repeatedly and is found in various areas such as the social sciences, Economics, medicine and public health. To analyze recurrent event data either a total time or a gap time is adopted according to research interest. In this paper, we analyze recurrent event data with incomplete observation gap using a gap time scale. That is, some subjects leave temporarily from a study and return after a while. But it is not available when the observation gaps terminate. We adopt an interval censoring mechanism for estimating the termination time. Furthermore, to model the association among gap times of a subject, a frailty effect is incorporated into a model. Programs included in Survival package of R program are implemented to estimate the covariate effect as well as the variance of frailty effect. YTOP (Young Traffic Offenders Program) data is analyzed with both proportional hazard model and a weibull regression model.

An Adaptive Dead Reckoning Algorithm using Update Lifetime (유효갱신기간에 기반한 가변 데드레코닝 알고리즘)

  • 유석종;정혜원;최윤철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 한국멀티미디어학회 2000년도 춘계학술발표논문집
    • /
    • pp.449-452
    • /
    • 2000
  • This paper proposes a new, adaptive Dead Reckoning model, called Dynamic Dead Reckoning , for Distributed Interactive Simulation and humanoid avatar systems. The proposed model can overcome the weak points of traditional Dead Reckoning caused by a fixed threshold and strong dependency on rotation event. This paper introduces new criteria for update message filtering , named as Update lifetime. The Dynamic Dead Reckoning keeps the balance between extrapolation fidelity and filtering performance by two component models, Variable Threshold Mechanism and Rotation Event model. The experimental results show that the proposed model can lower the increment rate of update traffic to the increase of rotation frequency without any significant loss of accuracy.

  • PDF

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • 제20권2호
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Performance Analysis of Handover Based on LTE Systems (LTE 시스템의 handover 성능 분석)

  • Song, Jong Seob;Jung, Minah;Chae, Eun Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2021년도 춘계학술대회
    • /
    • pp.182-183
    • /
    • 2021
  • To ensure the mobility of the UE(User Equipment), the handover phenomenon occurs depending on the level and quality of the radio signal. According to the set of handover event, the threshold of handover is changed. In this paper, we analyze the handover performance using LTE KPI(Key Performance Indicator) of measurement mobile traffic data in Ireland.

  • PDF

A Methodology for Evaluating Vehicle Driving Safety based on the Analysis of Interactions With Roads and Adjacent Vehicles (도로 및 인접차량과의 상호작용분석을 통한 차량의 주행안전성 평가기법 개발 연구)

  • PARK, Jaehong;OH, Cheol;YUN, Dukgeun
    • Journal of Korean Society of Transportation
    • /
    • 제35권2호
    • /
    • pp.116-128
    • /
    • 2017
  • Traffic accidents can be defined as a physical collision event of vehicles occurred instantaneously when drivers do not perceive the surrounding vehicles and roadway environments properly. Therefore, detecting the high potential events that cause traffic accidents with monitoring the interactions among the surroundings continuously by driver is the prerequisite for prevention the traffic accidents. For the analysis, basic data were collected to analyze interactions using a test vehicle which is equipped the GPS(Global Positioning System)-IMU(Inertial Measurement Unit), camera, radar and RiDAR. From the collected data, highway geometric information and the surrounding traffic situation were analyzed and then safety evaluation algorithm for driving vehicle was developed. In order to detect a dangerous event of interaction with surrounding vehicles, locations and speed data of surrounding vehicles acquired from the radar sensor were used. Using the collected data, the tangent and curve section were divided and the driving safety evaluation algorithm which is considered the highway geometric characteristic were developed. This study also proposed an algorithm that can assess the possibility of collision against surrounding vehicles considering the characteristics of geometric road structure. The methodology proposed in this study is expected to be utilized in the fields of autonomous vehicles in the future since this methodology can assess the driving safety using collectible data from vehicle's sensors.

Short-term Traffic States Prediction Using k-Nearest Neighbor Algorithm: Focused on Urban Expressway in Seoul (k-NN 알고리즘을 활용한 단기 교통상황 예측: 서울시 도시고속도로 사례)

  • KIM, Hyungjoo;PARK, Shin Hyoung;JANG, Kitae
    • Journal of Korean Society of Transportation
    • /
    • 제34권2호
    • /
    • pp.158-167
    • /
    • 2016
  • This study evaluates potential sources of errors in k-NN(k-nearest neighbor) algorithm such as procedures, variables, and input data. Previous research has been thoroughly reviewed for understanding fundamentals of k-NN algorithm that has been widely used for short-term traffic states prediction. The framework of this algorithm commonly includes historical data smoothing, pattern database, similarity measure, k-value, and prediction horizon. The outcomes of this study suggests that: i) historical data smoothing is recommended to reduce random noise of measured traffic data; ii) the historical database should contain traffic state information on both normal and event conditions; and iii) trial and error method can improve the prediction accuracy by better searching for the optimum input time series and k-value. The study results also demonstrates that predicted error increases with the duration of prediction horizon and rapidly changing traffic states.