• Title/Summary/Keyword: Traffic state

Search Result 795, Processing Time 0.027 seconds

The study of operation mode of ventilation system in the longitudinal ventilation system tunnel (조합환기 방식 터널의 환기기 운전 단계에 관한 연구)

  • Yoo, Ji-Oh;Shin, Hyun-Jun;Lee, Dong-Ho;Lee, Young-hwa
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.4 no.4
    • /
    • pp.343-353
    • /
    • 2002
  • In the past many tunnels have been built to lowest capital investment cost without adequate regard for the cost of operation. But according to increasing the capacity of a ventilation system and to becoming diverse, it is to become more important to come up with the optimal operation stage of ventilation system. In this study, the tunnel ventilation dynamic simulation program had been developed. it is used to calculate the unsteady-state tunnel air velocity and concentration of pollutants according to the assumed average day traffic profile and summarize the energy consumption for the operation of ventilation system. And the operation energy consumption for the electric precipitation system and vertical vent shaft system are evaluated and compared in various operation mode. As the results of this study, the optimal operation stage for these ventilation system are provided.

  • PDF

Vibration behaviors of a damaged bridge under moving vehicular loads

  • Yin, Xinfeng;Liu, Yang;Kong, Bo
    • Structural Engineering and Mechanics
    • /
    • v.58 no.2
    • /
    • pp.199-216
    • /
    • 2016
  • A large number of bridges were built several decades ago, and most of which have gradually suffered serious deteriorations or damage due to the increasing traffic loads, environmental effects, and inadequate maintenance. However, very few studies were conducted to investigate the vibration behaviors of a damaged bridge under moving vehicles. In this paper, the vibration behaviors of such vehicle-bridge system are investigated in details, in which the effects of the concrete cracks and bridge surface roughness are particularly considered. Specifically, two vehicle models are introduced, i.e., a simplified four degree-of-freedoms (DOFs) vehicle model and a more complex seven DOFs vehicle model, respectively. The bridges are modeled in two types, including a single-span uniform beam and a full scale reinforced concrete high-pier bridge, respectively. The crack zone in the reinforced concrete bridge is considered by a damage function. The bridge and vehicle coupled equations are established by combining the equations of motion of both the bridge and vehicles using the displacement relationship and interaction force relationship at the contact points between the tires and bridge. The numerical simulations and verifications show that the proposed modeling method can rationally simulate the vibration behaviors of the damaged bridge under moving vehicles; the effect of cracks on the impact factors is very small and can be neglected for the bridge with none roughness, however, the effect of cracks on the impact factors is very significant and cannot be neglected for the bridge with roughness.

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Diwakar, Khushboo
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.241-260
    • /
    • 2011
  • In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of data, data transmission at that path becomes difficult, which leads to network congestion. This causes delay in data transmission and might also lead to packet drops in the network. The retransmission of these lost packets would aggravate the situation and jam the network. In this paper, we aim at providing a solution to the problem of network congestion in mobile ad hoc networks [1, 2] by designing a protocol that performs routing intelligently and minimizes the delay in data transmission. Our Objective is to move the traffic away from the shortest path obtained by a suitable shortest path calculation algorithm to a less congested path so as to minimize the number of packet drops during data transmission and to avoid unnecessary delay. For this we have proposed a protocol named as Congestion Aware Selection Of Path With Efficient Routing (CASPER). Here, a router runs the shortest path algorithm after pruning those links that violate a given set of constraints. The proposed protocol has been compared with two link state protocols namely, OSPF [3, 4] and OLSR [5, 6, 7, 8].The results achieved show that our protocol performs better in terms of network throughput and transmission delay in case of bulky data transmission.

Design Validation through Analysis of Concrete Modular Road Behavior under Static Axial Loads (콘크리트 모듈러 도로 축하중 거동 분석을 통한 설계 타당성 검증)

  • Nam, Jeong-Hee;Kim, Woo Seok;Kim, Ki Hyun;Kim, Yeon Bok
    • International Journal of Highway Engineering
    • /
    • v.17 no.6
    • /
    • pp.37-45
    • /
    • 2015
  • PURPOSES : The purpose of this study is to validate the design criteria of the concrete modular road system, which is a new semi-bridge-type concept road, through a comparison of numerical analysis results and actual loading test results under static axial loads. METHODS : To design the semi-bridge-type modular road, both the bridge design code and the concrete structural design code were adopted. The standard truck load (KL-510) was applied as the major traffic vehicle for the design loading condition. The dimension of the modular slab was designed in consideration of self-weight, axial load, environmental load, and combined loads, with ultimate limit state coefficients. The ANSYS APDL (2010) program was used for case studies of center and edge loading, and the analysis results were compared with the actual mock-up test results. RESULTS : A full-scale mock-up test was successfully conducted. The maximum longitudinal steel strains were measured as about 35 and 83.5 micro-strain (within elastic range) at center and edge loading locations, respectively, under a 100 kN dual-wheel loading condition by accelerating pavement tester. CONCLUSIONS : Based on the results of the comparison between the numerical analysis and the full-scale test, the maximum converted stress range at the edge location is 32~51% of the required standard flexural strength under the two times over-weight loading condition. In the case of edge loading, the maximum converted stresses from the Westergaard equation, the ANSYS APDL analysis, and the mock-up test are 1.95, 1.7, and 2.3 times of that of the center loading case, respectively. The primary reason for this difference is related to the assumption of the boundary conditions of the vertical connection between the slab module and the crossbeam module. Even though more research is required to fully define the boundary conditions, the proposed design criteria for the concrete modular road finally seems to be reasonable.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

Implementation of a Vehicle Monitoring System using Multimodal Information (다중 정보를 활용하는 차량 모니터링 시스템의 구현)

  • Park, Su-Wan;Son, Jun-U
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • In order to detect driver's state in a driver safety system, both overt and covert measures such as driving performance, visual attention, physiological arousal and traffic situation should be collected and interpreted in the driving context. In this paper, we suggest a vehicle monitoring system that provides multimodal information on a broad set of measures simultaneously collected from multiple domains including driver, vehicle and road environment using an elaborate timer equipped as a soft synchronization mechanism. Using a master timer that records key values from various modules with the same master time of short and precise interval, the monitoring system provides more accurate context awareness through synchronized data at any given time. This paper also discusses the data collected from nine young drivers performing a cognitive secondary task through this system while driving.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Efficient Hardware Support: The Lock Mechanism without Retry (하드웨어 지원의 재시도 없는 잠금기법)

  • Kim Mee-Kyung;Hong Chul-Eui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1582-1589
    • /
    • 2006
  • A lock mechanism is essential for synchronization on the multiprocessor systems. The conventional queuing lock has two bus traffics that are the initial and retry of the lock-read. %is paper proposes the new locking protocol, called WPV (Waiting Processor Variable) lock mechanism, which has only one lock-read bus traffic command. The WPV mechanism accesses the shared data in the initial lock-read phase that is held in the pipelined protocol until the shared data is transferred. The nv mechanism also uses the cache state lock mechanism to reduce the locking overhead and guarantees the FIFO lock operations in the multiple lock contentions. In this paper, we also derive the analytical model of WPV lock mechanism as well as conventional memory and cache queuing lock mechanisms. The simulation results on the WPV lock mechanism show that about 50% of access time is reduced comparing with the conventional queuing lock mechanism.

Performance Analysis of Packet CDMA R-ALOHA for Multi-media Integration in Cellular Systems with Adaptive Access Permission Probability

  • Kyeong Hur;Eom, Doo-Seop;Tchah, Kyun-Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.12B
    • /
    • pp.2109-2119
    • /
    • 2000
  • In this paper, the Packet CDMA Reservation ALOHA protocol is proposed to support the multi-traffic services such as voice and videophone services with handoff calls, high-rate data and low-rate data services efficiently on the multi-rate transmission in uplink cellular systems. The frame structure, composed of the access slot and the transmission slot, and the proposed access permission probability based on the estimated number of contending users for each service are presented to reduce MAI. The assured priority to the voice and the videophone handoff calls is given through higher access permission probability. And through the proposed code assignment scheme, the voice service can be provided without the voice packet dropping probability in the CDMA/PRMA protocols. The code reservation is allowed to the voice and the videophone services. The low-rate data service uses the available codes during the silent periods of voice calls and the remaining codes in the codes assigned to the voice service to utilize codes efficiently. The high-rate data service uses the assigned codes to the high-rate data service and the remaining codes in the codes assigned to the videophone service. Using the Markov-chain subsystem model for each service including the handoff calls in uplink cellular systems, the steady-state performances are simulated and analyzed. After a round of tests for the examples, through the proposed code assignment scheme and the access permission probability, the Packet CDMA Reservation ALOHA protocol can guarantee the priority and the constant QoS for the handoff calls even at large number of contending users. Also, the data services are integrated efficiently on the multi-rate transmission.

  • PDF