• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.029 seconds

UWB RADAR based Modified Adaptive CFAR Algorithm for improved safety of Personal Rapid Transit (무인 궤도 차량의 안전성 제고를 위한 UWB 레이더 기반 적응형 CFAR 알고리즘)

  • Hong, Seok-Gon;Kim, Baek-Hyun;Jeong, Rag-Gyo;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.1
    • /
    • pp.28-42
    • /
    • 2013
  • Personal Rapid Transit(PRT) is a new unmanned transportation system using electricity. The purpose of the PRT is relieving the congestion of city traffic and connecting between inner city and airport, high-speed railroad. PRT requires to develop devices for the guarantee of safety and reliability. PRT as the mean of rail transportation must be equipped with control system for front rail sensing. Ultra Wide Band(UWB) radar system is suitable for PRT's detection because it has the advantage of low power consumption, low interference and high resolution. In this paper, an improved adaptive Constant False Alarm Rate(CFAR) algorithm is proposed and studied in various noise environments. The proposed algorithm improves performance in various noise environments compared to the Mean Level CFAR algorithms and other adaptive CFAR algorithms.

Efficient Methods for Road Sign Database Construction (도로표지의 효율적인 데이터베이스 구축방안)

  • Kim, Eui-Myoung;Cho, Du-Young;Chong, Kyu-Soo;Kim, Seong-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Road signs are part of the traffic facilities intended to guide drivers to their destinations in a safe and comfortable manner. Due to the creation of new routes, changes to the old routes, and the deterioration of road signs, road signs do require efforts to do ongoing field investigations and put the results in a database. The purpose of this study was to propose methodologies to do field investigations and build a database for road signs efficiently. For that purpose, a mobile mapping system was designed for field investigations. The designed mobile mapping system was comprised of three cameras to produce image information about road signs, GPS/IMU/DMI to obtain information about the position and attitude of a vehicle, and a laser scanner to generate information about the locations of road signs and routes. Also proposed in the study was a procedure to automatically detect the areas of road signs in the road signs images and recognize their characters.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

A Development of Preprocessing Models of Toll Collection System Data for Travel Time Estimation (통행시간 추정을 위한 TCS 데이터의 전처리 모형 개발)

  • Lee, Hyun-Seok;NamKoong, Seong J.
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.1-11
    • /
    • 2009
  • TCS Data imply characteristics of traffic conditions. However, there are outliers in TCS data, which can not represent the travel time of the pertinent section, if these outliers are not eliminated, travel time may be distorted owing to these outliers. Various travel time can be distributed under the same section and time because the variation of the travel time is increase as the section distance is increase, which make difficult to calculate the representative of travel time. Accordingly, it is important to grasp travel time characteristics in order to compute the representative of travel time using TCS Data. In this study, after analyzing the variation ratio of the travel time according to the link distance and the level of congestion, the outlier elimination model and the smoothing model for TCS data were proposed. The results show that the proposed model can be utilized for estimating a reliable travel time for a long-distance path in which there are a variation of travel times from the same departure time, the intervals are large and the change in the representative travel time is irregular for a short period.

  • PDF

Implementation of Constructor-Oriented Visualization System for Occluded Construction via Mobile Augmented-Reality (모바일 증강현실을 이용한 작업자 중심의 폐색된 건축물 시각화 시스템 개발)

  • Kim, Tae-Ho;Kim, Kyung-Ho;Han, Yunsang;Lee, Seok-Han;Choi, Jong-Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.55-68
    • /
    • 2014
  • Some infrastructure these days is usually constructed under the ground for it to not interfere the foot-traffic of pedestrians, and thus, it is difficult to visually confirm the accurate location of the site where the establishments must be buried. These technical difficulties increase the magnitude of the problems that could arise from over-reliance on the experience of the worker or a mere blueprint. Such problems include exposure to flood and collapse. This paper proposes a constructor-oriented visualization system via mobile gadgets in general construction sites with occluded structures. This proposal is consisted with three stages. First, "Stage of detecting manhole and extracting features" detects and extracts the basis point of occluded structures which is unoccluded manhole. Next, "Stage of tracking features" tracks down the extracted features in the previous stage. Lastly, "Stage of visualizing occluded constructions" analyzes and synthesizes the GPS data and 3D objects obtained from mobile gadgets in the previous stages. This proposal implemented ideal method through parallel analysis of manhole detection, feature extraction, and tracking techniques in indoor environment, and confirmed the possibility through occluded water-pipe augmentation in real environment. Also, it offers a practical constructor-oriented environment derived from the augmented 3D results of occluded water-pipings.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

An Enhanced Fast Handover Scheme for Real-Time Traffic in IPv6 Based WiBro Network (IPv6기반 와이브로 시스템에서 실시간 트래픽을 위한 개선된 빠른 핸드오버 방안)

  • Jeong, Seok-Jong;Lee, Sung-Kuen;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.377-386
    • /
    • 2008
  • In this paper, a new handover management scheme has been proposed to reduce handover latency and to support fast handover without packet losses, so that it may be applicable to the wireless mobile Internet system such as IPv6-based WiBro system. To minimize the handover latency in processing of movement detection, we propose the handover management scheme which simplifies the handover message exchanging procedure between mobile subscriber station (MSS) and network by integrating layer 2 and layer 3 handovers efficiently based on the layer2 information. To reduce the processing delay from new care-of-address (NCoA) configuration during handover, we propose that NCoA is created, distributed and managed by new access control router (NACR). In addition, in order to minimize the packet transmission delay and eliminate the packet losses, the proposed scheme employs a crossover router (CR) which is upper network located over PACR and NACR and employs the packet buffering for MSS. The simulation study shows that the proposed scheme achieves loss-free packet delivery and low latency in the environment of narrow overlapped cell area or high velocity of the MSS, comparing the performance with the conventional schemes.

Background and Local Histogram-Based Object Tracking Approach (도로 상황인식을 위한 배경 및 로컬히스토그램 기반 객체 추적 기법)

  • Kim, Young Hwan;Park, Soon Young;Oh, Il Whan;Choi, Kyoung Ho
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2013
  • Compared with traditional video monitoring systems that provide a video-recording function as a main service, an intelligent video monitoring system is capable of extracting/tracking objects and detecting events such as car accidents, traffic congestion, pedestrian detection, and so on. Thus, the object tracking is an essential function for various intelligent video monitoring and surveillance systems. In this paper, we propose a background and local histogram-based object tracking approach for intelligent video monitoring systems. For robust object tracking in a live situation, the result of optical flow and local histogram verification are combined with the result of background subtraction. In the proposed approach, local histogram verification allows the system to track target objects more reliably when the local histogram of LK position is not similar to the previous histogram. Experimental results are provided to show the proposed tracking algorithm is robust in object occlusion and scale change situation.

FMCW Radar simulation model with interference using a new radar performance parameter (새로운 레이더 성능지표를 이용한 FMCW 레이더 간섭 시뮬레이션 모델)

  • Mun, Sang-Kon;Park, Seung-Keun;Yang, Hoon-Gee;Cheon, Chang-Yul;Chung, Young-Seek;Bae, Kyung-Bin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.86-92
    • /
    • 2011
  • ITS(Intelligent Transport System) has been researched actively to guarantee the smooth traffic and the safety of the vehicle. In recent, as the sensor for the measurement of distance between vehicles, the FMCW radar system in millimeter wave band has been interested in ITS. Actually, 47, 60, 77, 94 and 139 GHz have been assigned for the vehicle radar frequencies in Europe and Japan. However, the performances of the FMCW radar are deteriorated due to the interferences from the surrounding radars and mobile devices. In this paper, in order to model and simulate the performance of FMCW radar under the exterior interference, we propose a new performance parameter, RER(Radius Error Rate), which contains the information of the range error due to the interferences, and show the effectiveness of the proposed parameter.