• Title/Summary/Keyword: Traffic Verification

Search Result 212, Processing Time 0.027 seconds

A Study on the Real-time Simulated Traffic Generation and Verification Methods based on the Traffic Pattern Analysis (트래픽 패턴분석 기반 실시간 모의 트래픽 생성 및 검증 기법 연구)

  • Kang, Hyun Joong;Kim, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.69-76
    • /
    • 2009
  • High-speed services and bulk transmission were available by the development of the network and communication technologies. Moreover various next-generation converged services are undergoing a change by various services. This paper presents improved real-time simulated traffic generation and verification schemes based on the actual traffic pattern analysis. For this, we analyzed traffic patterns of actual application system and generated simulated traffics. We also suggested scheme that verify similarity of simulated traffic and actual traffic.

A Traffic Simulation Model Verification Method Using GPS Equipment (GPS를 활용한 교통 시뮬레이션 모형 검증)

  • Hu, Hyejung;Baek, Jongdae;Han, Sangjin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.62-69
    • /
    • 2012
  • Traffic simulation models have been used for assessing various transportation strategies. Through comparing results from a simulation model and real field data, researchers try to show how close the model can reproduce the real world traffic. This model verification step is one of the most essential tasks in modeling procedure. Traffic counts and speeds have been frequently used for the verification or validation. Authors modeled severe PM peak bottleneck situation on the I-40 corridor in Raleigh, North Carolina using DYNASMART-P, a mesoscopic traffic simulation tool and verified the model. NCDOT has Traffic Information Management System which has archive capability for the traffic speeds on the I-40 corridor. However, the authors selected travel time as the field measure for model verification and collected the data using a GPS equipment because the speed data from NCDOT speed detectors are spot speeds which are not appropriate for comparison with link average speed from the simulation model. This paper describes the GPS field data collection procedure, the model verification method, and the results.

A study on development of verification system for real-time traffic data using TPEG data and GPS device (TPEG-GPS 데이터를 활용한 실시간 교통정보 검증 시스템 개발에 관한 연구)

  • Park, Young-Su;Jeong, Yong-Mu;Min, Su-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.547-549
    • /
    • 2012
  • In this paper, we propose the verification platform for traffic information of TPEG. Verification platform contains the parsing module of TPEG data and the processing module of GPS data. We compared the traffic information of GPS devices with traffic information of TPEG data. As a result, traffic information from TPEG data is distinguished from actual road traffic information.

  • PDF

Real-Traffic Based Verification for Gigabit-Switch Chips (실제 트래픽 기반의 기가비트 스위치 칩의 검증)

  • 전정범;장유성;이주환;강무경;이승왕;경종민
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.1049-1052
    • /
    • 1999
  • As the Internet traffic increases, the demand for higher performance routers continues to grow, and it makes switch chips more complex. To make matters worse, these chips also need to handle high-level services. In this paper, we introduce an efficient verification methodology that can support real network traffics to satisfy the verification requirement of real complex situation even at the early design phase of switch chips.

  • PDF

Detection of a Light Region Based on Intensity and Saturation and Traffic Light Discrimination by Model Verification (명도와 채도 기반의 점등영역 검출 및 모델 검증에 의한 교통신호등 판별)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1729-1740
    • /
    • 2017
  • This paper describes a vision-based method that effectively recognize a traffic light. The method consists of two steps of traffic light detection and discrimination. Many related studies have used color information to detect traffic light, but color information is not robust to the varying illumination environment. This paper proposes a new method of traffic light detection based on intensity and saturation. When a traffic light is turned on, the light region usually shows values with high saturation and high intensity. However, when the light region is oversaturated, the region shows values of low saturation and high intensity. So this study proposes a method to be able to detect a traffic light under these conditions. After detecting a traffic light, it estimates the size of the body region including the traffic light and extracts the body region. The body region is compared with five models which represent specific traffic signals, then the region is discriminated as one of the five models or rejected as none of them. Experimental results show the performance of traffic light detection reporting the precision of 97.2%, the recall of 95.8%, and correct recognition rate of 94.3%. These results shows that the proposed method is effective.

Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Dongcheul;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1284-1297
    • /
    • 2019
  • The network environment is presently becoming very increased. Accordingly, the study of traffic classification for network management is becoming difficult. Automatic signature extraction system is a hot topic in the field of traffic classification research. However, existing automatic payload signature generation systems suffer problems such as semi-automatic system, generating of disposable signatures, generating of false-positive signatures and signatures are not kept up to date. Therefore, we provide a fully automatic signature update system that automatically performs all the processes, such as traffic collection, signature generation, signature management and signature verification. The step of traffic collection automatically collects ground-truth traffic through the traffic measurement agent (TMA) and traffic management server (TMS). The step of signature management removes unnecessary signatures. The step of signature generation generates new signatures. Finally, the step of signature verification removes the false-positive signatures. The proposed system can solve the problems of existing systems. The result of this system to a campus network showed that, in the case of four applications, high recall values and low false-positive rates can be maintained.

Simulation System Development for Verification of Autonomous Navigation Algorithm Considering Near Real-Time Maritime Traffic Information (준실시간 해상교통 정보를 반영한 자율운항 알고리즘 검증용 시뮬레이션 시스템 개발)

  • Hansol Park;Jungwook Han
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.6
    • /
    • pp.473-481
    • /
    • 2023
  • In this study, a simulation system was developed to verify autonomous navigation algorithm in complex maritime traffic areas. In particular, real-world maritime traffic scenario was applied by considering near real-time maritime traffic information provided by Korean e-Navigation service. For this, a navigation simulation system of Unmanned Surface Vehicle (USV) was integrated with an e-Navigation equipment, called Electronic Chart System (ECS). To verify autonomous navigation algorithm in the simulation system, initial conditions including initial position of an own ship and a set of paths for the ship to follow are assigned by an operator. Then, considering real-world maritime traffic information obtained from the service, the simulation is implemented in which the ship repeatedly travels by avoiding surrounding obstacles (e.g., approaching ships). In this paper, the developed simulation system and its application on verification of the autonomous navigation algorithm in complex maritime traffic areas are introduced.

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic (무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법)

  • Han, Man-Ho;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

Suggestion and verification of effective traffic information processing method by using voice (음성 사용시 효율적인 교통정보 처리방안의 제안 및 검증)

  • 박진권;김용덕
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.5
    • /
    • pp.17-24
    • /
    • 1998
  • In this paper, we suggested and verified the effective traffic information transfer methods using the GPS (Global positioning system) and voice broadcasting. We suggested four traffic information selection methods with their testing algorithms. A traffic information transfer simulation system is developed for testing the recommended methods. In the result, we compared and analyzed efficiency of suggested methods.

  • PDF