• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.025 seconds

A Study on Microwave-FM-CW Detection System for the Sutomatic Optimal Point Traffic Control (교통신호의 자동최적점제어를 위한 마이크로파 FM-CW 검지계통에 관한 연구)

  • 양흥석;김호윤
    • 전기의세계
    • /
    • v.22 no.1
    • /
    • pp.35-41
    • /
    • 1973
  • An automatic point traffic control method is recommended for more idealistic traffic flow over coarse road netowrks. The automatic control apparatus recommended, consists of a transceiver, amplifier, digital-to-analog converter, signal light controller for emergency and steady state, and digital counter as monitor. The transmitter sends a signal to the target vy means of Microwave-FM-CW and a diode detector picks up the echo signal. Thus the operation of the entire system will be carried out through an open loop state. Some factors necessary for an ideal detector system are rapid response, longevity and stability. An analytical method of the Doppler effect substitutes the conventional frequency deviation into the amplitude of detector output. The changing rate of amplitude is proportional to the voltage of the detector output. Some induced formula from Maxwell's radiation field theory ensures this new method, and, new method, and proves the fact with an experimental data presentation. Stability depends upon Klystron as an oscillator and a diode as a detector. the transceiver installation affects on the response and sensitivity of the system. In accordance with the detector output, several targets are easily classified by amplitudes on the scope. The traffic flow, i.e., target movement which is analyzed by the amplitude method, is shown through the scope and indicates it on the digital counter. The best efficiency for the amplitude analysis can be attained through use of an antenna having the highest sensitivity.

  • PDF

A Study on the Development of Automatic Detection and Warning system while Drowsy Driving (졸음운전의 자동 검출 및 각성 시스템 개발에 관한 연구)

  • Kim, Nam-Gyun;Jeong, Gyeong-Ho;Kim, Beop-Jung
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.3
    • /
    • pp.315-323
    • /
    • 1997
  • Driving is a complex vigilance task that includes improper lookout, excessive speed and inattention. The primary objective of this research is to detect driver drowsiness so that the driver can be alerted to an impending traffic accident in performance. We developed the automatic detection and warning system during drowsy driving. A drowsiness detection system must be able to monitor driver status and detect the detrimental changes of a driver performance. Eyeblink has been found to be a reliable factor of drowsiness detection in earlier studies. As an additional parameter, we also considered the yawning which often occurs in a low vigilance state and predicts the drowsy state. We used a computer vision method to extract the eyeblink and yawning in the face image sequences. When the drowsy state was detected, the driver was refreshed by alarming device and menthol scent generator after deciding the warning level by fuzzy logic. For the evaluation of our system, we measured the physiological parameters such as EOG and EEG. The results indicated that it is possible to detect and alert the driver drowsiness temporarily or continuously by using our system.

  • PDF

Regional Traffic Information Acquisition by Non-intrusive Automatic Vehicle Identification (비매설식 자동차량인식장치를 이용한 구간교통정보 산출 방법 연구)

  • Kang Jin-Kee;Son Youngtae;Yoon Yeo-Hwan;Byun Sangchul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.1 no.1
    • /
    • pp.22-32
    • /
    • 2002
  • This paper describes about non-burial AVI (Automatic Vehicle Identification) system using general vehicle as probe car for obtaining more accurate traffic information while conserving road pavement surface. Existing spot traffic detectors have their own limits of not obtaining right information owing to its mathematical method. Burial AVI systems have some defects, causing traffic jam, needing much maintenance cost because of frequent cutting of loop and piezo-electric sensors. Especially, they have hard time to make right detection, when it comes to jamming time. Therefore, in this paper, we propose non-burial AVI system with laser trigger unit. Proposed non-burial AVI system is developed to obtain regional traffic information from normal Passing vehicle by automatic license number recognition technology. We have adapted it to national highway section between Suwon city and Pyong$\~$Taek city(9.5km) and get affirmative results. Vehicle detection rate of laser trigger unit is more than 95$\%$, vehicle recognition rate is 87.8$\%$ and vehicle matching rate is about 14.3$\%$. So we regard these as satisfying results to use the system for traffic information service. We evaluate proposed AVI system by regulation of some institutions which are using similar AVI system and the proposed system satisfies all conditions. For future study, we have plan of detailed research about proper lane number from all of the target lanes, optimal section length, information service period, and data fusion method for existing spot detector.

  • PDF

Development of an Evaluation Index for Identifying Freeway Traffic Safety Based on Integrating RWIS and VDS Data (기상 및 교통 자료를 이용한 교통류 안전성 판단 지표 개발)

  • Park, Hyunjin;Joo, Shinhye;Oh, Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.5
    • /
    • pp.441-451
    • /
    • 2014
  • This study proposes a novel performance measure, which is referred to as Hazardous Spacing Index (HSI), to be used for evaluating safety of traffic stream on freeways. The basic principle of the proposed methodology is to investigate whether drivers would have sufficient stopping sight distance (SSD) under limited visibility conditions to eliminate rear-end crash potentials at every time step. Both Road Weather Information Systems (RWIS) and Vehicle Detection Systems (VDS) data were used to derive visibility distance (VD) and SSD, respectively. Moreover, the K-Nearest Neighbors (KNN) method was adopted to predict both VD and SSD in estimating predictive HSIs, which would be used to trigger advanced warning information to encourage safer driving. The outcome of this study is also expected to be used for monitoring freeway traffic stream in terms of safety.

Traffic Sign Area Detection by using Color Rate and Distance Rate (컬러비와 거리비를 이용한 교통표지판 영역추출)

  • Kwak, Hyun-Wook;Lee, Woo-Beom;Kim, Wook-Hyun
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.681-688
    • /
    • 2002
  • This paper proposes a system detecting the area of traffic sign, which uses color rate as the information of colors, and corner point and distance rate as the information of morphology. In this system, a candidate area is extracted by performing dilation operation on the binary image made by the color rate of R, G, B components and by detecting corner point and center point through mask. The area of traffic sign with varied shapes is extracted by calculating the distance rate from center point, which is the information of morphology. The results of this experiment demonstrate that in this system which is invariable regardless of its size and location, it is possible to extract the exact area from varied traffic signs such as the shapes of triangle, circle, inverse triangle, and square as well as from the images at both day and night when brightness value is greatly different. Moreover, it demonstrates great accuracy and speed in processing.

Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information (플로우 분석을 이용한 분산 서비스 거부 공격 탐지 방법)

  • Jun, Jae-Hyun;Kim, Min-Jun;Cho, Jeong-Hyun;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.203-209
    • /
    • 2014
  • Today, Distributed denial of service (DDoS) attack present a very serious threat to the stability of the internet. The DDoS attack, which is consuming all of the computing or communication resources necessary for the service, is known very difficult to protect. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. It is very hard to prevent the DDoS attack. Therefore, an intrusion detection system on large network is need to efficient real-time detection. In this paper, we propose the detection mechanism using analysis of flow information against DDoS attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. The OPNET simulation results show that our ideas can provide enough services in DDoS attack.

A Light-weight and Dynamically Reconfigurable RMON Agent System

  • Lee, Jun-Hyung;Park, Zin-Won;Kim, Myung-Kyun
    • Journal of Information Processing Systems
    • /
    • v.2 no.3 s.4
    • /
    • pp.183-188
    • /
    • 2006
  • A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON agent system can miss some packets due to the high packet analyzing overhead when the number of packets on the subnet is huge. In this paper, we have developed a light-weight RMON agent system that can handle a large amount of packets without packet loss. Our RMON agent system has also been designed such that its functionality can be added dynamically when needed. To demonstrate the dynamic reconfiguration capability of our RMON agent system, a simple port scanning attack detection module is added to the RMON agent system. We have also evaluated the performance of our RMON agent system on a large network that has a huge traffic. The test result has shown our RMON agent system can analyze the network packets without packet loss.

Computer Vision-based Continuous Large-scale Site Monitoring System through Edge Computing and Small-Object Detection

  • Kim, Yeonjoo;Kim, Siyeon;Hwang, Sungjoo;Hong, Seok Hwan
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1243-1244
    • /
    • 2022
  • In recent years, the growing interest in off-site construction has led to factories scaling up their manufacturing and production processes in the construction sector. Consequently, continuous large-scale site monitoring in low-variability environments, such as prefabricated components production plants (precast concrete production), has gained increasing importance. Although many studies on computer vision-based site monitoring have been conducted, challenges for deploying this technology for large-scale field applications still remain. One of the issues is collecting and transmitting vast amounts of video data. Continuous site monitoring systems are based on real-time video data collection and analysis, which requires excessive computational resources and network traffic. In addition, it is difficult to integrate various object information with different sizes and scales into a single scene. Various sizes and types of objects (e.g., workers, heavy equipment, and materials) exist in a plant production environment, and these objects should be detected simultaneously for effective site monitoring. However, with the existing object detection algorithms, it is difficult to simultaneously detect objects with significant differences in size because collecting and training massive amounts of object image data with various scales is necessary. This study thus developed a large-scale site monitoring system using edge computing and a small-object detection system to solve these problems. Edge computing is a distributed information technology architecture wherein the image or video data is processed near the originating source, not on a centralized server or cloud. By inferring information from the AI computing module equipped with CCTVs and communicating only the processed information with the server, it is possible to reduce excessive network traffic. Small-object detection is an innovative method to detect different-sized objects by cropping the raw image and setting the appropriate number of rows and columns for image splitting based on the target object size. This enables the detection of small objects from cropped and magnified images. The detected small objects can then be expressed in the original image. In the inference process, this study used the YOLO-v5 algorithm, known for its fast processing speed and widely used for real-time object detection. This method could effectively detect large and even small objects that were difficult to detect with the existing object detection algorithms. When the large-scale site monitoring system was tested, it performed well in detecting small objects, such as workers in a large-scale view of construction sites, which were inaccurately detected by the existing algorithms. Our next goal is to incorporate various safety monitoring and risk analysis algorithms into this system, such as collision risk estimation, based on the time-to-collision concept, enabling the optimization of safety routes by accumulating workers' paths and inferring the risky areas based on workers' trajectory patterns. Through such developments, this continuous large-scale site monitoring system can guide a construction plant's safety management system more effectively.

  • PDF

Development of Algorithms for Four-quadrant Gate System and Obstacle Detection Systems at Crossings (철도건널목 지장물·진입위반차량 검지시스템 및 4분할 차단 알고리즘 개발)

  • Oh, Ju-Taek;Cho, Han-Seon;Lee, Jae-Myung;Shim, Kyu-Don
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.367-374
    • /
    • 2006
  • This research revealed the operation problems of the current crossing control systems through inspecting and testing the obstacle detection systems and gate control systems for the crossings. To resolve the problems of the crossing control systems, this research developed new algorithms of four-quadrant gate system and obstacle detection systems combing the functions of rasar sensors and magnetic sensors and tested the reliability of the systems. Currently, the obstacle detection systems and gate control systems controls approaching and departing traffic by simply detecting vehicles and obstacles but do not consider traffic movements at the crossings. In addition, they do not make signal cooperation for gate controls. As a result, such inefficient crossing controls result in unsafe gate controls for drivers. Therefore, the newly developed crossing control systems through this study will provide more effective crossing control services with more strengthen information cooperation within control systems. Besides they will help to reduce train crashes at the crossings by gate control systems considering various driving behaviors.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.