• Title/Summary/Keyword: real time traffic

Search Result 1,598, Processing Time 0.028 seconds

Study on UAV Flight Patterns and Simulation Modelling for UTM (저고도 무인기 교통관리 체계에서 무인기 비행패턴 분류 및 시뮬레이션 모형 개발)

  • Jung, Kyu-sur;Kim, Se-Yeon;Lee, Keum-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.13-19
    • /
    • 2018
  • In this paper, we classified a flight pattern of unmanned aerial vehicle(UAV) which will be operating in UTM system and analyzed its flight pattern by purpose of use. Flight patterns of UAV are sorted into three patterns which are circling, monitoring and delivery. We considered four cases of industry areas using UAV which are agriculture, infrastructure monitoring, public safety & security(p.s.s) and delivery. It is necessary to build a simulation model as a verification tool for applying the flight pattern according to the use of UAV to the real UTM system. Therefore, we propose the simulation model of UAV with updating states over time. We applied simulation to UAV monitoring flight pattern, and confirmed that the flight was done by the given input data. The simulation model will be used in the future to verify that the UAV has various flight patterns and can operate safely and efficiently for the intended use.

Performance Evaluation of ISA100.11a Superframe Using Deadline Monotonic Scheduling (마감 단조 스케줄링을 사용한 ISA100.11a 슈퍼프레임 성능평가)

  • Saputra, Oka Danil;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1338-1345
    • /
    • 2014
  • Recently, wireless technology gains attention for industrial networks due to low cost, flexibility, relatively easy installation and most importantly, solving the rouring issue. ISA100.11a is one of promising standard for wireless industrial networks (WINs). Data traffic in industrial networks are known to be periodic and must satisfy the real-time property namely deadline. Therefore, in this paper, we proposed to apply deadline monotonic scheduling to periodic tasks in ISA100.11a networks and to evaluate the performance of ISA100.11a by checking the schedulability and beacon frame overhead. Simulation results showns, that our proposed scheme can reduces the network overhead while maintaining schedulability as compared to the previous algorithm. In addition, by reducing the network overhead, our proposed scheme can send more data without degrading the overall performance of WINs.

A Study on an Impedance Matching Technique for Rail Power Line Communication (레일 전력선통신을 위한 임피던스 정합방안 연구)

  • Seo, Ill-Kwon;Ahn, Seung-Ho;Kim, Chul-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.202-207
    • /
    • 2016
  • An auxiliary real-time train communications system among drivers, train-traffic controllers and field workers is necessary to share hazard information (i.e. rockfall detection, track maintenance) in low visibility zones (long tunnels and steep curved track). To develop the appropriate communication system, this paper proposes a new way of power line communication using the rail track (Rail - PLC), which has little noise and distortion of attenuation. Therefore, it is important to measure the impedance of the rail and to apply an impedance matching technique to increase the transmission characteristic of the Rail - PLC. This study would evaluate the reflection and the transmission characteristics of the rail using a network analyzer and an impedance matching transformer. The suitable impedance matching ratio was 1:3.28 from the result of back-to-back testing. The results confirmed that the transformer can improve the performance of the transmission signal in Rail - PLC using an impedance matching technique.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

Development of Houses for Information Society through the Interpretation and Application of the Korean Traditional Houses (안채, 사랑채의 재해석을 통한 직주통합형(職住統合型) 주거(住居) 유형(類型) 개발(開發)에 관한 연구(硏究))

  • Kim, Jong-Heon
    • Journal of architectural history
    • /
    • v.11 no.1 s.29
    • /
    • pp.21-32
    • /
    • 2002
  • Until now, we have a great progress in computer hardwares and computer softwares. Many people think these days as the information time or information society. Even though, we make a great progress in the computer science, we can not regard this society as the information society, if we do not accept the development of computer in our real life. In order to provide desirable residential environment for the information - society, it is necessary to review previous housing projects from the Industrial - Revolution to these days. Thus this study deals with limits of modern housings. This research also suggests a new housing concept for the information - society by reinterpretation of the Korean traditional houses. Use of space in the Korean traditional houses was mostly interpreted by the concept of sexual discrimination from Confucianism. However it is suggested in this study, that An-Chae is a home space for providing privacy of family and Sarang - Chae is a social space for providing social activity. Thus it is found that the Korean traditional house has been used as office as well as home. In this view, it is suggested that Korean traditional houses be the prototype of future house as a business space and also as a home space. In this study, 3 types of housing for the information - society are suggested; flat type, tower type and skip floor type. these houses have two entrances independently for the home space and the social space. Therefore each space has no interference with each other. Then one can do his own at home efficiently. He does not have to go to his office in downtown. One can relieve traffic congestions in the city and reduce air contamination.

  • PDF

A Study on the Evaluation of the Service Quality of Port-MIS (항만운영정보시스템(Port-MIS) 서비스 품질 평가에 관한 연구)

  • Kim, Minjin;Shin, Seungsik
    • Journal of Korea Port Economic Association
    • /
    • v.29 no.2
    • /
    • pp.211-238
    • /
    • 2013
  • The Port Logistics Information System (Port-MIS) is the system that processes all of port management such as entry and departure of ships, using facilities within ports, port traffic control, cargo entering and carrying and tax collection in 31 trade ports over the whole country. Lately, The Port Logistics Information System (Port-MIS) has been reformed as a WEB-based system and established basis to provide real time information support structure, diversification of civil complaint system, and optimized civil complaint service by using wire and wireless internet. The typical study on the Port Logistics Information System was C/S program and EDI-centered. But it has significance to study on service quality measurement of WEB Port-MIS that has been served as a new web-based platform since April 2010, for there was no such a study until now.

A Study on the Predictive Model of Propagation Path Loss in Millimeter-Wave Band (밀리미터파 대역에서 전파경로손실 예측 모델)

  • Kim, Song-Min
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.2
    • /
    • pp.23-28
    • /
    • 2005
  • This study was to suggest the propagation path loss and predictive model of propagation path analysis in order to apply the frequency in the millimeter-wave band to the real time inter-vehicle communication system. This study was to suppose the case of inter-vehicle communication on the one-way two-lanes road in the big cites with a lot of traffic jams in order to analyze the effect by the reflected wave of multipath. As a simulation of suggested model, it found out that the propagation path by the reflected wave was about 0.1[m]$\sim$5.1[m] longer than the one by the direct wave during the transmission of 100[m] wave direct path. Also, as a result of comparing the propagation path loss, the loss would be about -0.8[dB]$\sim$-4.2[dB] larger in case of wall reflection and -0.8[dB]$\sim$-1[dB] vehicle reflection. From the result above, this researcher found out that the path loss of reflected wave produced by the walls was about -3.2[dB] larger than the path loss produced by the adjacent vehicles.

The Research about Analyzing the Charging Pattern using the Electric Vehicle Running Feature Simulation (전기자동차 운행특성 모의를 통한 충전패턴 분석에 관한 연구)

  • Lim, You Seok;Bang, Chang Hyun;Han, Seung Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.205-214
    • /
    • 2013
  • In this paper, we analyzed the various EV charging-infra information(charging status, charging pattern, charging rate, charging fee, etc.) through the charging infra simulator which would be of help to effectively construct the EV charging infrastructure. The proposed simulator virtually made the EV motoring pattern referred to TMS(Traffic Monitoring System) & Ministry of Land, Transport and Maritime Affairs, and analyzed the charging-infra information(amount of charging, accumulated charging fee, etc.) based on vehicle types, charging type, time and days using EV charging-fee list noticed by KEPCO. Through this simulator, we deducted some considerable contents to build the EV charging infrastructure similarly with real environment.

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF