• Title/Summary/Keyword: Traffic safety system

Search Result 1,129, Processing Time 0.028 seconds

The Effect of VMS Message Presentation Type on the Speed Reduction of Driving Vehicle in School Zone (스쿨존에서 VMS의 메시지 제시유형이 주행차량속도 감소에 미치는 영향)

  • Lim, Sung Jun;Lee, Ji Dong;Park, Han Kyu;Lee, Kee Hoon;Moon, Kwang Su;Oah, She Zeen
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.1
    • /
    • pp.89-99
    • /
    • 2018
  • The number of traffic accidents in Korea has been increasing since 2014. In most school zones, safety signs are installed to prevent children's traffic accidents. However, it has been known that the effects of those signs are not significant. A variable message sign(VMS), one of the components of Intelligent Transport System(ITS), has emerged as an alternative method. Therefore, this study examines relative effects of two different VMS messages(Timely vs. Continuous) on vehicle speed. Experiments were conducted in two school zones. 6,676 vehicles were measured for speed limit compliance. A counterbalanced multiple baseline design was adopted. The results showed that both types of message are effective in reducing the speed of vehicle. Specifically, A timely message was more effective in slowing down vehicle speed and improving speed limit compliance than a continuous message. The present study suggested that a VMS with human factors can be effective.

Analysis of Traffic Accident Characteristics for the Overlap Section of Horizontal and Vertical Alignment (평면곡선과 종단곡선이 겹친 복합선형 구간에서 교통사고 특성분석)

  • Park, Min-Soo;Chang, Myung-Soon
    • International Journal of Highway Engineering
    • /
    • v.14 no.1
    • /
    • pp.95-102
    • /
    • 2012
  • This study has been conducted to characterize the relations between the accident rate and the overlap section elements where the horizontal alignment and vertical alignment are overlapped. The researches were performed on Horizontal curve sections of 4-lane highways with 100km/h of design speed and speed limit. Korea Highway Corporation's Geographic Figurative Information System was adopted for geometric organization and Highway Traffic Accident Statistics was used. The results reveal that sections made of a single slope without vertical curve has greater accident rate than those with vertical curve, and that sections with 1 vertical curve are higher in the accident rate than those with over 2 vertical curve. For the sections with 1 vertical curve, SAG sections are higher than CREST sections and for the previous straight section of horizontal curve are higher than curved ones. In particular, when the road surface is wet, the accident rate is closely related with SAG vertical curves or leftward horizontal curved sections. This study will have meanings that it proposes the importance of design of road alignment by taking consideration of 3D synthetic alignment conditions for improvement of the road safety.

Introduction to Definition and Basic Role of Performance Measure in Asset Management for Bridge Management (자산관리기법의 교량시설물의 적용에 있어 성능평가지표의 정의 및 역할에 대한 기초연구)

  • Park, Cheol-Woo;Park, Kyung-Hoon;Hwang, Yoon-Koog;Lee, Sang-Yoon;Kong, Jung-Sik;Min, Dae-Hong
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.401-404
    • /
    • 2008
  • Bridges are exposed to very severe environment and experience, as service life increased, elevated traffic load and traffic flow, in addition to natural disasters. In comparing to other road structures, bridges may cause more significant damage, such as human-involved accidents, to the society in the event of collapse. A certain level of service shall be necessarily secured to assure the minimum safety of users. The cost for manage and preserve bridges will increase gradually and more restrictions will be loaded to efficiently distribute the limited resources, such as monetary budget and human resource etc. In order to enhance performance and serviceability of bridges with the limited resource, asset management technique has been applied into the bridge management system, which capitalizes the road infrastructures including bridges and assess them in accordance with the government finance report. In the application of asset management, there must be a tool for assess the performance of bridges and this study introduces the basic information on the definition and role of performance measures for asset management for bridges.

  • PDF

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

Sensibility Evaluation for Car Navigation System based on Vehicle-type Preference (선호 차종별 자동차 네비게이션 시스템의 감성평가)

  • Park Sung Joon;Kim Sung Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2004
  • Owing to the rapid increase of the number of automobiles, the traffic is being heavily crippled as time goes by. To provide drivers with better safety and convenience, a variety of CNSs(Car Navigation System) are being installed more and more specially for the vehicles which are produced in recent days. As the CNS has gained the public popularity, it has been playing a role as a component of the multimedia system in a vehicle in addition to providing the capability of route guidance service. It is, therefore, now recognized as an important unit of the vehicle interior system. As the situation has been changed as formerly described, it is necessary that not only the functions but also the usability and exterior features are to be designed to suit customers' tastes. This paper is an attempt to find out what the major sensibility factors which customers want as far as a CNS is concerned are. Because these factors can differ from a vehicle type to another that customers prefer, the analysis is based on the vehicle preference. It is proved that MDS(Multi Dimensional Scaling) is an effective method to analyze the sensibility factors for the different types of vehicles. The result shows that for the people who prefer the sedan-type vehicles, luxuriousness, harmoniousness, and texture are major factors. For people who like sports car, faminism, salience, and dynamics are major factors. For people who prefer SUV's(Sports Utility Vehicle) or MPV's(Multi Purpose Vehicle), solidity, dynamics, and convenience are important.

  • PDF

Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric (하이퍼레저 패브릭을 이용한 화물차 디지털 운행기록 단말기의 안전운행 보상시스템 구현)

  • Kim, Yong-bae;Back, Juyong;Kim, Jongweon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.47-56
    • /
    • 2022
  • The safe driving reward system aims to reduce the loss of life and property by reducing the occurrence of accidents by motivating safe driving and encouraging active participation by providing direct reward to vehicle drivers who have performed safe driving. In the case of the existing digital tachograph, the goal is to limit dangerous driving by recording the driving status of the vehicle whereas the safe driving reward system is a support measure to increase the effect of accident prevention and induces safe driving with financial reward when safe driving is performed. In other words, in an area where accidents due to speeding are high, direct reward is provided to motivate safe driving to prevent traffic accidents when safe driving instructions such as speed compliance, maintaining distance between vehicles, and driving in designated lanes are performed. Since these safe operation data and reward histories must be managed transparently and safely, the reward evidences and histories were constructed using the closed blockchain Hyperledger Fabric. However, while transparency and safety are guaranteed in the blockchain system, low data processing speed is a problem. In this study, the sequential block generation speed was as low as 10 TPS(transaction per second), and as a result of applying the acceleration function a high-performance network of 1,000 TPS or more was implemented.

Performance of Feature-based Stitching Algorithms for Multiple Images Captured by Tunnel Scanning System (터널 스캐닝 다중 촬영 영상의 특징점 기반 접합 알고리즘 성능평가)

  • Lee, Tae-Hee;Park, Jin-Tae;Lee, Seung-Hun;Park, Sin-Zeon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.5
    • /
    • pp.30-42
    • /
    • 2022
  • Due to the increase in construction of tunnels, the burdens of maintenance works for tunnel structures have been increasing in Korea. In addition, the increase of traffic volume and aging of materials also threatens the safety of tunnel facilities, therefore, maintenance costs are expected to increase significantly in the future. Accordingly, automated condition assessment technologies like image-based tunnel scanning system for inspection and diagnosis of tunnel facilities have been proposed. For image-based tunnel scanning system, it is key to create a planar image through stitching of multiple images captured by tunnel scanning system. In this study, performance of feature-based stitching algorithms suitable for stitching tunnel scanning images was evaluated. In order to find a suitable algorithm SIFT, ORB, and BRISK are compared. The performance of the proposed algorithm was determined by the number of feature extraction, calculation speed, accuracy of feature matching, and image stitching result. As for stitching performance, SIFT algorithm was the best in all parts of tunnel image. ORB and BRISK also showed satisfactory performance and short calculation time. SIFT can be used to generate precise planar images. ORB and BRISK also showed satisfactory stitching results, confirming the possibility of being used when real-time stitching is required.

A Study on Methods for Accelerating Sea Object Detection in Smart Aids to Navigation System (스마트 항로표지 시스템에서 해상 객체 감지 가속화를 위한 방법에 관한 연구)

  • Jeon, Ho-Seok;Song, Hyun-hak;Kwon, Ki-Won;Kim, Young-Jin;Im, Tae-Ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.47-58
    • /
    • 2022
  • In recent years, navigation aids, which plays as sea traffic lights, have been digitized, and are developing beyond simple sign purpose to provide various functions such as marine information collection, supervision, control, etc. For example, Busan Port which is located in South Korea is leading the application of the advanced technologies by installing cameras on buoys and recording video images to supervise maritime accidents. However, there are difficulties to perform their major functions since the advanced technologies require long-term battery operation and also management and maintenance of them are hampered by marine characteristics. This study proposes a system that can automatically notify maritime objects passing around buoys by analyzing image information. In the existing sensor-based accident prevention systems, the alarms are generated by a collision detection sensor. The system can identify the cause of the accident whilst even though it is difficult not possible to fundamentally prevent the accidents. Therefore, in order to overcome these limitations, the proposed a maritime object detection system is based on marine characteristics. The experiments demonstrate that the proposed system shows about 5 times faster processing speed than other existing algorithms.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

A study on the Analysis of Radio Characteristics about Communication Mode in a Road (공용도로에서의 통신방식에 대한 전파특성 분석 연구)

  • Choi, Gi-Do;Lim, Ki-Taek;Cho, Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.1
    • /
    • pp.95-101
    • /
    • 2016
  • Vehicular communications is system which can be applied for transmission of various safety messages or Intelligent Transportation Systems(ITS) applications by combining vehicle/road technology with Information and Communication Technology(ICT). In recent years, a variety of ITS services are available such as driving information, road conditions, V2X messages as well as navigation and traffic jams notification. In general, vehicular communications can be used for vehicle-to-vehicle and vehicle-to-infrastructure communication by adopting IEEE802.11p/1609 standard which is commonly known as wireless access in vehicular environments. In this paper, WAVE communication standard based on the IEEE802.11p is explained and signal characteristics in WAVE communication is introduced. Also, The H/W and S/W characteristics in Road Side Station and On Board Equipment for the Vehicle to Everything communication are analyzed. Received Signal Strength which is power of receiving signal of communication equipment is measured in test road to estimate the real WAVE communication's performance. It is shown that the implemented WAVE communication technology is satisfactory to provide ITS services.