• Title/Summary/Keyword: network time-delay

Search Result 1,471, Processing Time 0.037 seconds

Development of an Online Evaluation Model for Traffic Signal Control System (교통신호제어시스템 온라인 평가모형 개발)

  • Go, Gwang-Yong;Lee, Seung-Hwan
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.3
    • /
    • pp.31-40
    • /
    • 2008
  • There have been a lot of efforts to find more accurate evaluation methods for traffic signal control effectiveness for a long period of time. Nowadays a newly advanced method called HILSS, 'Hardware-in-the-Loop-Simulation System', is used to evaluate the overall traffic control's effectiveness including physical control environments like communication conditions, hardware performance, controller's mechanical operations and so on. In this study, an Online-HILSS model has been developed, which runs on CORSIM(5.0) micro traffic simulation model on-lined to COSMOS. For the verification of the model, three tests are performed as follows; (1) a comparison of TMC's timing plan with the simulated green interval, (2) as a case study, a delay distribution comparison of the online simulation with the CORSIM stand-alone simulation. The result of the first test shows that the model can run the simulation green interval by TMC's timing plan correctly. The result of second test shows that the online simulation of the model brings the same simulation results with the CORSIM offline simulation in case of the same timing plan. These results mean that the online evaluation model could be a reliable tool to measure a real-time signal control effectiveness of a wide area street network with the HILSS method.

Congestion Control Scheme for Wide Area and High-Speed Networks (초고속-장거리 네트워크에서 혼잡 제어 방안)

  • Yang Eun Ho;Ham Sung Il;Cho Seongho;Kim Chongkwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.571-580
    • /
    • 2005
  • In fast long-distance networks, TCP's congestion control algorithm has the problem of utilizing bandwidth effectively. Several window-based congestion control protocols for high-speed and large delay networks have been proposed to solve this problem. These protocols deliberate mainly three properties : scalability, TCP-friendliness, and RTT-fairness. These protocols, however, cannot satisfy above three properties at the same time because of the trade-off among them This paper presents a new window-based congestion control algorithm, called EM (Exponential Increase/ Multiplicative Decrease), that simultaneously supports all four properties including fast convergence, which is another important constraint for fast long-distance networks; it can support scalability by increasing congestion window exponentially proportional to the time elapsed since a packet loss; it can support RTT-fairness and TCP-friendliness by considering RTT in its response function; it can support last fair-share convergence by increasing congestion window inversely proportional to the congestion window just before packet loss. We evaluate the performance of EIMD and other algorithms by extensive computer simulations.

Development of Network Equipment Based on V2X System for Automatic Intersection Traffic Signal Control (V2X 시스템 기반 교차로 네트워크 자동 신호시스템 개발에 관한 연구)

  • Oh, Jeakon;Kim, Hyungjin;Kang, JeongJin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.173-177
    • /
    • 2016
  • Korea, the traffic and transportation problems are significant because private cars are increasing constantly. Therefore, it is imperative to improve traffic condition so as to solve the problems such as traffic congestion and accidents which may occur due to the increase of vehicles in a limited area through the signal control. However, the current operating system for traffic control cannot provide car users the optimal signal but it generates a time delay of vehicles, traffic congestions etc. In this paper, we propose and implement the system based on V2X based automatic controller, which reduces the waste of time and the driver's psychological stress on the road intersection.

Unfairness of Congestion Control for Point-to-Multipoint Connections on ATM (ATM 상의 다중점 연결을 위한 폭주 제어 기법의 불공정성)

  • Choi, Won-Jeong;Lee, Mee-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1311-1319
    • /
    • 1998
  • The methods of providing available bandwidth adaptively using feedback to maximize the utilization of network as well as the quality of service have been the focus of recent research activities for ATM(Asynchronous Transfer Mode). This study has been extended from the point-to-point connection to a point-to-multipoint environment as the number of applications requiring multicast service increases. It is known that the effectiveness of feedback based congestion control scheme diminishes as propagation delay increases. Especially for a multicast connection consisting of various paths and destinations with different performance and congestion status, the problem of unfairness due to different propagation delays may occur. The degree of such unfairness may change depending on various aspects of congestion control schemes. These has been, however, relatively little study on these problems. In this paper, we present how various aspects of control schemes-length of the interval between feedback generations, point of time to coalesce feedback cells from child paths, decreasing factor of source rate in case of congestion-affect the degree of unfairness. Simulation results show that degree of unfairness changes according to when the feedback coalescing happens. Expecially it is shown that the effect of feedback coalescing time to the degree of unfairness is more significant for the smaller feedback interval. It is also found that as the source rate decreasing factor becomes larger the average ACR(Allowed Cell Rate) at the source gets lower and the degree of unfairness grow larger.

  • PDF

Generation of Mosaic Image using Aerial Oblique Images (경사사진을 이용한 모자이크 영상 제작)

  • Seo, Sang Il;Park, Byung-Wook;Lee, Byoung Kil;Kim, Jong In
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.3
    • /
    • pp.145-154
    • /
    • 2014
  • The road network becomes more complex and extensive. Therefore, the inconveniences are caused in accordance with the time delay of the restoration of damaged roads, demands for excessive costs on information collection, and limitations on acquisition of damage information of the roads. Recently, road centric spatial information is gathered using mobile multi sensor system for road inventory. But expensive MMS(Mobile Mapping System) equipments require high maintenance costs from beginning and takes a lot of time in the data processing. So research is needed for continuous maintenance by collecting and displaying the damaged information on a digital map using low cost mobile camera system. In this research we aim to develop the techniques for mosaic with a regular ground sample distance using successive image from oblique camera on a vehicle. For doing this, mosaic image is generated by estimating the homography of high resolution oblique image, and the ground sample distance and appropriate overlap are analyzed using high resolution aerial oblique images which contain resolution target. Based on this we have proposed the appropriate overlap and exposure interval for mobile road inventory system.

Adaptive Migration Path Technique of Mobile Agent Using the Metadata of Naming Agent (네이밍 에이전트의 메타데이터를 이용한 이동 에이전트의 적응적 이주 경로 기법)

  • Kim, Kwang-Jong;Ko, Hyun;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.165-175
    • /
    • 2007
  • The mobile agent executes a given task by which the agent code moves to the server directly. Therefore, node migration method becomes an important factor which impact on the whole performance of distributed system. In this paper, we propose an adaptive migration path technique of mobile agent using the metadata of naming agent. In this proposed technique, node selection for migration depends on the content of referenced metadata, and the reliability of migrated information is determined by the metadata updating method and cooperative operations of individual agents in multi-agents system. For these, we design the metadata using by the number of hit documents, hit ratio, node processing time and network delay time, and describe the methods for creating, using and updating metadata for which determine the adaptive node migration path of mobile agent according to the cooperation of individual agents and number of hit documents using by designed metadata. And results of evaluated performance for proposed adaptive migration path technique through the proper experiment and analysis gain rate of high effective information earning, because of high hit ratio(72%) about of fathered documents by case of applying metadata move to the 13 nodes. But, in case of non-applying metadata is hit ratio(46%) of gathered documents and rate of effective information earning about of 26 nodes is 36.8%.

  • PDF

Intelligent Tuning of the Two Degrees-of-Freedom Proportional-Integral-Derivative Controller On the Distributed Control System for Steam Temperature Control of Thermal Power Plant

  • Dong Hwa Kim;Won Pyo Hong;Seung Hack Lee
    • KIEE International Transaction on Systems and Control
    • /
    • v.2D no.2
    • /
    • pp.78-91
    • /
    • 2002
  • In the thermal power plant, there are six manipulated variables: main steam flow, feedwater flow, fuel flow, air flow, spray flow, and gas recirculation flow. There are five controlled variables: generator output, main steam pressure, main steam temperature, exhaust gas density, and reheater steam temperature. Therefore, the thermal power plant control system is a multinput and output system. In the control system, the main steam temperature is typically regulated by the fuel flow rate and the spray flow rate, and the reheater steam temperature is regulated by the gas recirculation flow rate. However, strict control of the steam temperature must be maintained to avoid thermal stress. Maintaining the steam temperature can be difficult due to heating value variation to the fuel source, time delay changes in the main steam temperature versus changes in fuel flow rate, difficulty of control of the main steam temperature control and the reheater steam temperature control system owing to the dynamic response characteristics of changes in steam temperature and the reheater steam temperature, and the fluctuation of inner fluid water and steam flow rates during the load-following operation. Up to the present time, the Proportional-Integral-Derivative Controller has been used to operate this system. However, it is very difficult to achieve an optimal PID gain with no experience, since the gain of the PID controller has to be manually tuned by trial and error. This paper focuses on the characteristic comparison of the PID controller and the modified 2-DOF PID Controller (Two-Degrees-Freedom Proportional-Integral-Derivative) on the DCS (Distributed Control System). The method is to design an optimal controller that can be operated on the thermal generating plant in Seoul, Korea. The modified 2-DOF PID controller is designed to enable parameters to fit into the thermal plant during disturbances. To attain an optimal control method, transfer function and operating data from start-up, running, and stop procedures of the thermal plant have been acquired. Through this research, the stable range of a 2-DOF parameter for only this system could be found for the start-up procedure and this parameter could be used for the tuning problem. Also, this paper addressed whether an intelligent tuning method based on immune network algorithms can be used effectively in tuning these controllers.

  • PDF

A Context Free Grammar based Algorithm for Generating Playable Transcoding Paths of the Multimedia Presentation with Different End-to-End QoS (종단간 상이한 QoS를 갖는 멀티미디어 연출 재생을 위한 CFG 기반의 변환 경로 생성 알고리즘)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.699-708
    • /
    • 2002
  • Since various terminals and different networks get involved in playing of a multimedia presentation, the case that the presentation QoS at a destination should be different from the QoS of multimedia data at a source occurs frequently. For playing the multimedia presentation, the multimedia data at a source should be transcoded into the multimedia data satisfying the QoS required at the terminal. The problem of generating the transcoding path is that, for a given multimedia presentation, different transcoding paths depending the terminal and networks should be generated. That is, a fixed transcoding path cannot be applied to a multimedia presentation. Instead, whenever the terminal and network to play the presentation get determined, a proper transcoding path should be regenerated automatically. In this paper, the algorithm for generating the transcoding path and the method for checking the playability of the generated path are proposed. The generating algorithm adopted the technique of Context Free Grammar in describing the set of transcoding resources and a user's transcoding rules in order to utilize the well-known compiler techniques. For the playability check, a method of computing the transcoding time and the delay time between data units are proposed. Finally all the proposed methods were implemented in the stream engine, called Transcore and the presentation-authoring tool, called VIP, we had developed. And the test results with a sample scenario were presented at the last.

A Prediction of N-value Using Artificial Neural Network (인공신경망을 이용한 N치 예측)

  • Kim, Kwang Myung;Park, Hyoung June;Goo, Tae Hun;Kim, Hyung Chan
    • The Journal of Engineering Geology
    • /
    • v.30 no.4
    • /
    • pp.457-468
    • /
    • 2020
  • Problems arising during pile design works for plant construction, civil and architecture work are mostly come from uncertainty of geotechnical characteristics. In particular, obtaining the N-value measured through the Standard Penetration Test (SPT) is the most important data. However, it is difficult to obtain N-value by drilling investigation throughout the all target area. There are many constraints such as licensing, time, cost, equipment access and residential complaints etc. it is impossible to obtain geotechnical characteristics through drilling investigation within a short bidding period in overseas. The geotechnical characteristics at non-drilling investigation points are usually determined by the engineer's empirical judgment, which can leads to errors in pile design and quantity calculation causing construction delay and cost increase. It would be possible to overcome this problem if N-value could be predicted at the non-drilling investigation points using limited minimum drilling investigation data. This study was conducted to predicted the N-value using an Artificial Neural Network (ANN) which one of the Artificial intelligence (AI) method. An Artificial Neural Network treats a limited amount of geotechnical characteristics as a biological logic process, providing more reliable results for input variables. The purpose of this study is to predict N-value at the non-drilling investigation points through patterns which is studied by multi-layer perceptron and error back-propagation algorithms using the minimum geotechnical data. It has been reviewed the reliability of the values that predicted by AI method compared to the measured values, and we were able to confirm the high reliability as a result. To solving geotechnical uncertainty, we will perform sensitivity analysis of input variables to increase learning effect in next steps and it may need some technical update of program. We hope that our study will be helpful to design works in the future.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.