• Title/Summary/Keyword: speed violation

Search Result 62, Processing Time 0.025 seconds

The Relationship between Violation of Designated Lane Usage and Accident Severity on Freeways (고속도로 지정차로제 위반과 교통사고 심각도와의 관계분석: 화물차량을 대상으로)

  • Kim, Joo-Hee;Lee, Soo-Beom;Kim, Da-Hee;Hong, Ji-Yeon
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.3
    • /
    • pp.119-127
    • /
    • 2012
  • For traffic safety, it is imperative for motorists to secure their clear view and to maintain a similar speed with others while driving in a lane. Large-sized vehicles at lower speeds, however, are likely to increase the risk of accident when they share a lane with cars. Although to overcome this complication the Korean Road Traffic Act established rules for the safe use of roads, the reality is that the rules are seldom observed strictly. In this light, this study was designed to analyze the severity of truck-involved accidents, thereby providing justification for the need of truck-designated lanes and thus contributing to measuring road safety more precisely. A binomial logistic regression model was applied to analyze the severity of truck-involved accidents. The analysis showed that several variables affect the severity of truck-involved accidents on freeways; i.e., violation against the rule of truck-designated lanes, weather, difference between daytime and nighttime, and parking on road shoulder. Moreover, the strong enforcement will be needed to make motorists observe the rule, because a Wald statistical test showed that the violation against the rule of truck-designated lanes has the largest influence on the severity.

A Study on Driving Characteristics of Drivers at the Enforcement System Based on Speed Data (무인속도위반단속시스템 설치구간에서의 운전자 운행특성 분석)

  • Lee, Ho-Won;Kim, Dong-Hyo;Park, Boo-Hee;Lee, Choul-Ki;Ha, Dong-Ik;Lee, Byung-Chul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.43-53
    • /
    • 2010
  • The increasing interest in the use of automated photographic equipment in Korea enables to detect speed violation and enforce traffic laws. Since 1996, Korean National Police Agency has been promoting a project for installation of Automated Speed Enforcement (ASE) system aiming at reduction of accidents. Recently, point to point speed cameras operate to measure a driver's average speed across length of road and/or the spot speed at individual camera sites along the road length. In this study, we were analyzed to driver's operating characteristics in point to point speed cameras. The point to point speed camera system has link-long influence on drivers and their speeds despite enforcement being visible only at the start and end of enforced road length. Then, mean and 85th percentile speeds were below speed limit along enforced road length by the two camers. Also, Female drivers were driving at low speed than male drivers along the road length.

Study on the Appropriate Time for Leading Pedestrian Intervals (보행자 우선 출발신호의 적정 시간 산출 연구)

  • Kim, Daekyung;Yoon, Suyoung;Yoon, Jinsoo;Kim, Sang-Ock;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • When pedestrians cross a pedestrian crossing during a pedestrian signal, there is a problem that pedestrians are exposed to the danger of traffic accidents due to permissive-left turning and right-turning vehicles. In order to solve this problem, there is an increasing demand to improve the traffic signal system to increase pedestrian safety at the signal crossing. This study aims to examine the feasibility of introducing a leading pedestrian interval(LPI) to prevent conflict between unprotected left and right turn vehicles and pedestrians. In this study, the need for LPI was surveyed by experts and the general public. As a result of the survey, many opinions indicated that the introduction of LPI was necessary. In addition, after selecting the non-protected left and right turn pilot operation targets, LPI was installed on two signal intersections. After installation, the speed analysis of the arrival vehicle in the pedestrian crossing and the violation rate of the pedestrian signal were analyzed. As a result of analysis, when the walking signal was equalized, the speed of the arriving vehicle in the pedestrian crossing was reduced, and the violation rate of the walking signal was improved.

Development of Mask-RCNN Based Axle Control Violation Detection Method for Enforcement on Overload Trucks (과적 화물차 단속을 위한 Mask-RCNN기반 축조작 검지 기술 개발)

  • Park, Hyun suk;Cho, Yong sung;Kim, Young Nam;Kim, Jin pyung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.57-66
    • /
    • 2022
  • The Road Management Administration is cracking down on overloaded vehicles by installing low-speed or high-speed WIMs at toll gates and main lines on expressways. However, in recent years, the act of intelligently evading the overloaded-vehicle control system of the Road Management Administration by illegally manipulating the variable axle of an overloaded truck is increasing. In this manipulation, when entering the overloaded-vehicle checkpoint, all axles of the vehicle are lowered to pass normally, and when driving on the main road, the variable axle of the vehicle is illegally lifted with the axle load exceeding 10 tons alarmingly. Therefore, this study developed a technology to detect the state of the variable axle of a truck driving on the road using roadside camera images. In particular, this technology formed the basis for cracking down on overloaded vehicles by lifting the variable axle after entering the checkpoint and linking the vehicle with the account information of the checkpoint. Fundamentally, in this study, the tires of the vehicle were recognized using the Mask RCNN algorithm, the recognized tires were virtually arranged before and after the checkpoint, and the height difference of the vehicle was measured from the arrangement to determine whether the variable axle was lifted after the vehicle left the checkpoint.

Road Safety Message Providing Methodology for Considering the Elderly Walking Behavior (고령자 보행행태를 고려한 상충위험정보 제공방법 설계)

  • Jang, Jeong-Ah;Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we introduce a warning message providing methodology by considering the elderly's walking behavior in V2P(: Vehicle-to-Pedestrian) communication systems. Using the elderly's accident records in Kyounggi-do area from 2011 to 2014, the elderly's accident behaviors are analyzed by categorizing accidents as road type (single road/ crossing road), existence of traffic signal (with signal/ without signal), existence of crosswalk (crosswalk/ jaywalk), cause of accident (jaywalk/ signal violation/ carelessness accident/ Etc.). In addition, the elderly's behavior variable and vehicle speed are applied, then some threshold values are utilized in a warning message providing in conflict area. Finally, we propose a distance which can protect an accident depending on the elderly's walking speed, safety margin and vehicle speed. By applying the results of this research to the V2P/P2V communication based road safety message providing system with the elderly's walking behavior, it may be helpful to reduce accident rate of the elderly.

Red Light Violations Analysis Using Statistical Methods - in case of Chungbuk 4-Legged Signalized Intersections - (통계적기법을 이용한 신호위반 분석(충청북도 4지 신호교차로를 중심으로))

  • Park, Jeong-Soon;Kim, Yun-Hwan;Jung, Woo-Teak
    • International Journal of Highway Engineering
    • /
    • v.12 no.3
    • /
    • pp.49-57
    • /
    • 2010
  • This case study investigated red light violations at CBD, suburban and rural signalized intersections in chungbuk. The goal of this study is to understanding the collection between red light violations and various driver, vehicles and environmental factors. This study uses descriptive statistics analysis and logistics analysis with SPSS 12.0 software. The major results of this study are as follows. First, red light violations occurred at rural and CBD more than suburban area. Second, About 81.1% of the violators were traveling at or below the posted speed limit. Moreover, 77.3% of the violations occurred within 2 seconds after the on set of red light. Finally, the logistic regression model, which is statistically significant(chisquare=0.000, McFadde=0.265)was developed, and includes the local type(CBD/suburban/rural), violators' gender, season, vehicle type, time of day, vehicle speed as the independent variables. In this study did not find significant relationship between red light violators' age and their driving behavior approaching signalized intersections.

The Case Study of the Violation of Speed and Bunker Consumption Rate at the Time Chartered Vessel - Focused on the Bulk Carriers - (정기용선선박의 선속 및 연료사용 유지의무 위반에 관한 분쟁사례 연구 - 벌크선을 중심으로 -)

  • Kim, Dong-Yol;Song, Young-Soo
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.2
    • /
    • pp.231-246
    • /
    • 2009
  • The time charterer depends on speed and bunker consumption rate of time chartered vessel because it is related charterers' benefit. It is important role of stipulated speed and daily bunker consumption rate at the Time Charter Party, it is generated any dispute against speed and daily bunker consumption rate deficiency. The case of dispute is a restricted word of stipulated speed and daily bunker consumption rate at Charter Party as "about", "good weather or good weather day", "smooth water", "ocean current" and "without guarantee". It happens a dispute against speed and daily bunker consumption rate because it is not well-educated as a vessel operator regarding Time Charter Party interpretation.

  • PDF

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography (고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현)

  • You, Yeonsoo;Lee, Samuel Sangkon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Post-Silicon Tuning Based on Flexible Flip-Flop Timing

  • Seo, Hyungjung;Heo, Jeongwoo;Kim, Taewhan
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.1
    • /
    • pp.11-22
    • /
    • 2016
  • Clock skew scheduling is one of the essential steps to be carefully performed during the design process. This work addresses the clock skew optimization problem integrated with the consideration of the inter-dependent relation between the setup and hold times, and clock to-Q delay of flip-flops, so that the time margin is more accurately and reliably set aside over that of the previous methods, which have never taken the integrated problem into account. Precisely, based on an accurate flexible model of setup time, hold time, and clock-to-Q delay, we propose a stepwise clock skew scheduling technique in which at each iteration, the worst slack of setup and hold times is systematically and incrementally relaxed to maximally extend the time margin. The effectiveness of the proposed method is shown through experiments with benchmark circuits, demonstrating that our method relaxes the worst slack of circuits, so that the clock period ($T_{clk}$) is shortened by 4.2% on average, namely the clock speed is improved from 369 MHz~2.23 GHz to 385 MHz~2.33 GHz with no time violation. In addition, it reduces the total numbers of setup and hold time violations by 27.7%, 9.5%, and 6.7% when the clock periods are set to 95%, 90%, and 85% of the value of Tclk, respectively.

Optimization of structural and mechanical engineering problems using the enriched ViS-BLAST method

  • Dizangian, Babak;Ghasemi, Mohammad Reza
    • Structural Engineering and Mechanics
    • /
    • v.77 no.5
    • /
    • pp.613-626
    • /
    • 2021
  • In this paper, an enhanced Violation-based Sensitivity analysis and Border-Line Adaptive Sliding Technique (ViS-BLAST) will be utilized for optimization of some well-known structural and mechanical engineering problems. ViS-BLAST has already been introduced by the authors for solving truss optimization problems. For those problems, this method showed a satisfactory enactment both in speed and efficiency. The Enriched ViS-BLAST or EVB is introduced to be vastly applicable to any solvable constrained optimization problem without any specific initialization. It uses one-directional step-wise searching technique and mostly limits exploration to the vicinity of FNF border and does not explore the entire design space. It first enters the feasible region very quickly and keeps the feasibility of solutions. For doing this important, EVB groups variables for specifying the desired searching directions in order to moving toward best solutions out or inside feasible domains. EVB was employed for solving seven numerical engineering design problems. Results show that for problems with tiny or even complex feasible regions with a larger number of highly non-linear constraints, EVB has a better performance compared to some records in the literature. This dominance was evaluated in terms of the feasibility of solutions, the quality of optimum objective values found and the total number of function evaluations performed.