• Title/Summary/Keyword: traffic model

Search Result 3,241, Processing Time 0.035 seconds

An Unified Spatial Index and Visualization Method for the Trajectory and Grid Queries in Internet of Things

  • Han, Jinju;Na, Chul-Won;Lee, Dahee;Lee, Do-Hoon;On, Byung-Won;Lee, Ryong;Park, Min-Woo;Lee, Sang-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.83-95
    • /
    • 2019
  • Recently, a variety of IoT data is collected by attaching geosensors to many vehicles that are on the road. IoT data basically has time and space information and is composed of various data such as temperature, humidity, fine dust, Co2, etc. Although a certain sensor data can be retrieved using time, latitude and longitude, which are keys to the IoT data, advanced search engines for IoT data to handle high-level user queries are still limited. There is also a problem with searching large amounts of IoT data without generating indexes, which wastes a great deal of time through sequential scans. In this paper, we propose a unified spatial index model that handles both grid and trajectory queries using a cell-based space-filling curve method. also it presents a visualization method that helps user grasp intuitively. The Trajectory query is to aggregate the traffic of the trajectory cells passed by taxi on the road searched by the user. The grid query is to find the cells on the road searched by the user and to aggregate the fine dust. Based on the generated spatial index, the user interface quickly summarizes the trajectory and grid queries for specific road and all roads, and proposes a Web-based prototype system that can be analyzed intuitively through road and heat map visualization.

A Framework of Resource Provisioning and Customized Energy-Efficiency Optimization in Virtualized Small Cell Networks

  • Sun, Guolin;Clement, Addo Prince;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5701-5722
    • /
    • 2018
  • The continuous increase in the cost of energy production and concerns for environmental sustainability are leading research communities, governments and industries to amass efforts to reduce energy consumption and global $CO_2$ footprint. Players in the information and communication industry are keen on reducing the operational expenditures (OpEx) and maintaining the profitability of cellular networks. Meanwhile, network virtualization has been proposed in this regard as the main enabler for 5G mobile cellular networks. In this paper, we propose a generic framework of slice resource provisioning and customized physical resource allocation for energy-efficiency and quality of service optimization. In resource slicing, we consider user demand and population resources provisioning scheme aiming to satisfy quality of service (QoS). In customized physical resource allocation, we formulate this problem with an integer non-linear programming model, which is solved by a heuristic algorithm based on minimum vertex coverage. The proposed algorithm is compared with the existing approaches, without consideration of slice resource constraints via system-level simulations. From the perspective of infrastructure providers, traffic is scheduled over a limited number of active small-cell base stations (sc-BSs) that significantly reduce the system energy consumption and improve the system's spectral efficiency. From the perspective of virtual network operators and mobile users, the proposed approach can guarantee QoS for mobile users and improve user satisfaction.

The Influence of Personality Traits on Airline Untact Check-in: Focusing on Mobile Check-in User

  • YANG, Jae-Pil;PARK, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.15-30
    • /
    • 2021
  • Purpose: Year of 2020, COVID-19 has been changing the people's everyday life to ways never been thought of before all over the world. The IT and electronic industry, the methods of supplying goods and services have been changed from contact to un-tact environments based on un-tact systems very rapidly. COVID-19 has been striking the tourism and the travel industry, especially the airline and hotel industry of which services are provided by human. For the passenger service of airliner, automation has been propelled and un-tact style of service has become mainstreams except cabin service since 2000's. For passenger transportation, due to traffic regulations and exclusions etc., switching to new ways is not easy. However, under the new environment made by COVID-19, kiosk check-in, web check-in and mobile check-in has become more important. In this study, the characteristics of airline customers using mobile goods are investigated to find ways to raise the rate of utilizing mobile check-in and to increase the efficiency of boarding process. Research design, data, and methodology: Considering the COVID-19 environment, survey was done by online research company. The research model is designed to integrate the user characteristics and usage/purchase motive and technology acceptance theory. Especially considering infectious diseases prevention, concern of safety is adopted as one of the usage motive variable. Results: Extraversion or conscientiousness characteristics prefers counter check-in(contact service), while openness characteristics prefers mobile check-in(un-tact service). Concern of safety for infectious disease shows strong non-preference on counter check-in. Conclusions: Regarding service type regardless of type of the industry, automation and un-tact have been mainstreams due to high costs of labor, efficiency and standardization issue, etc., and COVID-19 has given impetus to them. For airliner, un-tact service including boarding process service has been more and more important. To raise the rate of un-tact service use, the characteristics of the user should be analyzed first. The study results indicate that for extraversion or conscientiousness, some kinds of methods to induce them to use un-tact service more are needed.

A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail (전자우편을 이용한 악성코드 유포방법 분석 및 탐지에 관한 연구)

  • Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.93-101
    • /
    • 2009
  • This paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the 'Analysis model' which is decoding traffics when hacker's encoding them to steal the information. I researched 'Methodology of intrusion detection techniques' in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes.

A New Method to Detect Anomalous State of Network using Information of Clusters (클러스터 정보를 이용한 네트워크 이상상태 탐지방법)

  • Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.545-552
    • /
    • 2012
  • The rapid development of information technology is making large changes in our lives today. Also the infrastructure and services are combinding with information technology which predicts another huge change in our environment. However, the development of information technology brings various types of side effects and these side effects not only cause financial loss but also can develop into a nationwide crisis. Therefore, the detection and quick reaction towards these side effects is critical and much research is being done. Intrusion detection systems can be an example of such research. However, intrusion detection systems mostly tend to focus on judging whether particular traffic or files are malicious or not. Also it is difficult for intrusion detection systems to detect newly developed malicious codes. Therefore, this paper proposes a method which determines whether the present network model is normal or abnormal by comparing it with past network situations.

Analysis of the Relationship between Three-Dimensional Built Environment and Urban Surface Temperature (도시의 3차원 물리적 환경변수와 지표온도의 관계 분석)

  • Li, Yige;Lee, Sugie;Han, Jaewon
    • Journal of Korea Planning Association
    • /
    • v.54 no.2
    • /
    • pp.93-108
    • /
    • 2019
  • This study examines the relationship between three-dimensional urban built environment and urban surface temperature using LANDSAT 8 satellite image data in Seoul city. The image was divided into 600m×600m grid units as an unit of analysis. Due to the high level of spatial dependency in surface temperature, this study uses spatial statistics to take into account spatial auto-correlation. The spatial error model shows the best goodness of fit. The analysis results show that the three-dimensional built environment and transport environment as well as natural environment have statistically significant associations with surface temperature. First, natural environment variables such as green space, streams and river, and average elevation show statistically significant negative association with surface temperature. Second, the building area shows a positive association with surface temperature. In addition, while sky view factor (SVF) has a positive association with surface temperature, surface roughness (SR) shows a negative association with it. Third, transportation related variables such as road density, railway density, and traffic volume show positive associations with surface temperature. Moreover, this study finds that SVF and SR have different effects on surface temperature in regard to the levels of total floor areas in built environment. The results indicate that interactions between floor area ratio (FAR) and three-dimensional built environmental variables such as SVF and SR should be considered to reduce urban surface temperature.

Modeling Survival in Patients With Brain Stroke in the Presence of Competing Risks

  • Norouzi, Solmaz;Jafarabadi, Mohammad Asghari;Shamshirgaran, Seyed Morteza;Farzipoor, Farshid;Fallah, Ramazan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Objectives: After heart disease, brain stroke (BS) is the second most common cause of death worldwide, underscoring the importance of understanding preventable and treatable risk factors for the outcomes of BS. This study aimed to model the survival of patients with BS in the presence of competing risks. Methods: This longitudinal study was conducted on 332 patients with a definitive diagnosis of BS. Demographic characteristics and risk factors were collected by a validated checklist. Patients' mortality status was investigated by telephone follow-up to identify deaths that may be have been caused by stroke or other factors (heart disease, diabetes, high cholesterol, etc.). Data were analyzed by the Lunn-McNeil approach at alpha=0.1. Results: Older age at diagnosis (59-68 years: adjusted hazard ratio [aHR], 2.19; 90% confidence interval [CI], 1.38 to 3.48; 69-75 years: aHR, 5.04; 90% CI, 3.25 to 7.80; ≥76 years: aHR, 5.30; 90% CI, 3.40 to 8.44), having heart disease (aHR, 1.65; 90% CI, 1.23 to 2.23), oral contraceptive pill use (women only) (aHR, 0.44; 90% CI, 0.24 to 0.78) and ischemic stroke (aHR, 0.52; 90% CI, 0.36 to 0.74) were directly related to death from BS. Older age at diagnosis (59-68 years: aHR, 21.42; 90% CI, 3.52 to 130.39; 75-69 years: aHR, 16.48; 90% CI, 2.75 to 98.69; ≥76 years: aHR, 26.03; 90% CI, 4.06 to 166.93) and rural residence (aHR, 2.30; 90% CI, 1.15 to 4.60) were directly related to death from other causes. Significant risk factors were found for both causes of death. Conclusions: BS-specific and non-BS-specific mortality had different risk factors. These findings could be utilized to prescribe optimal and specific treatment.

Preliminary Conceptual Design of a Multicopter Type eVTOL using Reverse Engineering Techniques for Urban Air Mobility (도심항공 모빌리티(UAM)를 위한 역설계 기법을 사용한 멀티콥터형 eVTOL의 기본 개념설계)

  • Choi, Won-Seok;Yi, Dong-Kyu;Hwang, Ho-Yon
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.29-39
    • /
    • 2021
  • As a means of solving traffic congestion in the downtown of large city, the interest in urban air mobility (UAM) using electric vertical take-off landing personal aerial vehicle (eVTOL PAV) is increasing. eVTOL configurations that will be used for UAM are classified by lift-and-cruise, tilt rotors, tilt-wings, tilted-ducted fans, multicopters, depending on propulsion types. This study tries to perform preliminary conceptual design for a given mission profile using reverse engineering techniques by taking the multicopter type Airbus's CityAirbus as a basic model. Wetted area, lift to drag ratio, drag coefficients were calculated using the OpenVSP which is an aerodynamic analysis software. The power required for each mission section of CityAirbus were calculated, and the corresponding battery and motor were selected. Also, total weight was predicted by estimating component weights of eVTOL.

Deep Learning Image Processing Technology for Vehicle Occupancy Detection (차량탑승인원 탐지를 위한 딥러닝 영상처리 기술 연구)

  • Jang, SungJin;Jang, JongWook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1026-1031
    • /
    • 2021
  • With the development of global automotive technology and the expansion of market size, demand for vehicles is increasing, which is leading to a decrease in the number of passengers on the road and an increase in the number of vehicles on the road. This causes traffic jams, and in order to solve these problems, the number of illegal vehicles continues to increase. Various technologies are being studied to crack down on these illegal activities. Previously developed systems use trigger equipment to recognize vehicles and photograph vehicles using infrared cameras to detect the number of passengers on board. In this paper, we propose a vehicle occupant detection system with deep learning model techniques without exploiting existing system-applied trigger equipment. The proposed technique proposes a system to detect vehicles by establishing triggers within images and to apply deep learning object recognition models to detect real-time boarding personnel.

A general-purpose model capable of image captioning in Korean and Englishand a method to generate text suitable for the purpose (한국어 및 영어 이미지 캡션이 가능한 범용적 모델 및 목적에 맞는 텍스트를 생성해주는 기법)

  • Cho, Su Hyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1111-1120
    • /
    • 2022
  • Image Capturing is a matter of viewing images and describing images in language. The problem is an important problem that can be solved by keeping, understanding, and bringing together two areas of image processing and natural language processing. In addition, by automatically recognizing and describing images in text, images can be converted into text and then into speech for visually impaired people to help them understand their surroundings, and important issues such as image search, art therapy, sports commentary, and real-time traffic information commentary. So far, the image captioning research approach focuses solely on recognizing and texturing images. However, various environments in reality must be considered for practical use, as well as being able to provide image descriptions for the intended purpose. In this work, we limit the universally available Korean and English image captioning models and text generation techniques for the purpose of image captioning.