scholarly journals Analytical Model of Modified Traffic Control in an ATM Computer Network

10.14311/288 ◽  
2001 ◽  
Vol 41 (6) ◽  
Author(s):  
J. Filip

The ABR class of ATM computer networks uses feedback information that is generated by net switches and destination and is sent back to a source of data to control the net load. A modification of the standard traffic management of the ATM network is presented, based on the idea of using RM cells to inform the source about congestion. An analytical model of a net switch is designed and mathematical relations are presented. The probability of queueing is considered. The analytical model of the switch was constructed for the purpose of analysing the network behaviour. It is used for investigating of cells passing through the network. We describe the model below. The submitted analytical results show that this method reduces congestion and improves throughput.

Author(s):  
A. V. Strukova

The article considers the new automated air traffic management system «Synthesis AR4», as well as a system description for ensuring the implementation of a modernized airspace structure, navigation and surveillance that provides technical capabilities. A number of functional capabilities and advantages of the airspace security system are presented.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3658
Author(s):  
Qingfeng Zhu ◽  
Sai Ji ◽  
Jian Shen ◽  
Yongjun Ren

With the advanced development of the intelligent transportation system, vehicular ad hoc networks have been observed as an excellent technology for the development of intelligent traffic management in smart cities. Recently, researchers and industries have paid great attention to the smart road-tolling system. However, it is still a challenging task to ensure geographical location privacy of vehicles and prevent improper behavior of drivers at the same time. In this paper, a reliable road-tolling system with trustworthiness evaluation is proposed, which guarantees that vehicle location privacy is secure and prevents malicious vehicles from tolling violations at the same time. Vehicle route privacy information is encrypted and uploaded to nearby roadside units, which then forward it to the traffic control center for tolling. The traffic control center can compare data collected by roadside units and video surveillance cameras to analyze whether malicious vehicles have behaved incorrectly. Moreover, a trustworthiness evaluation is applied to comprehensively evaluate the multiple attributes of the vehicle to prevent improper behavior. Finally, security analysis and experimental simulation results show that the proposed scheme has better robustness compared with existing approaches.


Author(s):  
Hatem Abou-Senna ◽  
Mohamed El-Agroudy ◽  
Mustapha Mouloua ◽  
Essam Radwan

The use of express lanes (ELs) in freeway traffic management has seen increasing popularity throughout the United States, particularly in Florida. These lanes aim at making the most efficient transportation system management and operations tool to provide a more reliable trip. An important component of ELs is the channelizing devices used to delineate the separation between the ELs and the general-purpose lane. With the upcoming changes to the FHWA Manual on Uniform Traffic Control Devices, this study provided an opportunity to recommend changes affecting safety and efficiency on a nationwide level. It was important to understand the impacts on driver perception and performance in response to the color of the EL delineators. It was also valuable to understand the differences between demographics in responding to delineator colors under different driving conditions. The driving simulator was used to test the responses of several demographic groups to changes in marker color and driving conditions. Furthermore, participants were tested for several factors relevant to driving performance including visual and subjective responses to the changes in colors and driving conditions. Impacts on driver perception were observed via eye-tracking technology with changes to time of day, visibility, traffic density, roadway surface type, and, crucially, color of the delineating devices. The analyses concluded that white was the optimal and most significant color for notice of delineators across the majority of subjective and performance measures, followed by yellow, with black being the least desirable.


2021 ◽  
Vol 13 (2) ◽  
pp. 832
Author(s):  
Aleksandar Blagojević ◽  
Sandra Kasalica ◽  
Željko Stević ◽  
Goran Tričković ◽  
Vesna Pavelkić

Sustainable traffic system management under conditions of uncertainty and inappropriate road infrastructure is a responsible and complex task. In Bosnia and Herzegovina (BiH), there is a large number of level crossings which represent potentially risky places in traffic. The current state of level crossings in BiH is a problem of the greatest interest for the railway and a generator of accidents. Accordingly, it is necessary to identify the places that are currently a priority for the adoption of measures and traffic control in order to achieve sustainability of the whole system. In this paper, the Šamac–Doboj railway section and passive level crossings have been considered. Fifteen different criteria were formed and divided into three main groups: safety criteria, road exploitation characteristics, and railway exploitation characteristics. A novel integrated fuzzy FUCOM (full consistency method)—fuzzy PIPRECIA (pivot pairwise relative criteria importance assessment) model was formed to determine the significance of the criteria. When calculating the weight values of the main criteria, the fuzzy Heronian mean operator was used for their averaging. The evaluation of level crossings was performed using fuzzy MARCOS (measurement of alternatives and ranking according to compromise solution). An original integrated fuzzy FUCOM–Fuzzy PIPRECIA–Fuzzy MARCOS model was created as the main contribution of the paper. The results showed that level crossings 42 + 690 (LC4) and LC8 (82 + 291) are the safest considering all 15 criteria. The verification of the results was performed through four phases of sensitivity analysis: resizing of an initial fuzzy matrix, comparative analysis with other fuzzy approaches, simulations of criterion weight values, and calculation of Spearman’s correlation coefficient (SCC). Finally, measures for the sustainable performance of the railway system were proposed.


2021 ◽  
Vol 13 (3) ◽  
pp. 1383
Author(s):  
Judith Rosenow ◽  
Martin Lindner ◽  
Joachim Scheiderer

The implementation of Trajectory-Based Operations, invented by the Single European Sky Air Traffic Management Research program SESAR, enables airlines to fly along optimized waypoint-less trajectories and accordingly to significantly increase the sustainability of the air transport system in a business with increasing environmental awareness. However, unsteady weather conditions and uncertain weather forecasts might induce the necessity to re-optimize the trajectory during the flight. By considering a re-optimization of the trajectory during the flight they further support air traffic control towards achieving precise air traffic flow management and, in consequence, an increase in airspace and airport capacity. However, the re-optimization leads to an increase in the operator and controller’s task loads which must be balanced with the benefit of the re-optimization. From this follows that operators need a decision support under which circumstances and how often a trajectory re-optimization should be carried out. Local numerical weather service providers issue hourly weather forecasts for the coming hour. Such weather data sets covering three months were used to re-optimize a daily A320 flight from Seattle to New York every hour and to calculate the effects of this re-optimization on fuel consumption and deviation from the filed path. Therefore, a simulation-based trajectory optimization tool was used. Fuel savings between 0.5% and 7% per flight were achieved despite minor differences in wind speed between two consecutive weather forecasts in the order of 0.5 m s−1. The calculated lateral deviations from the filed path within 1 nautical mile were always very small. Thus, the method could be easily implemented in current flight operations. The developed performance indicators could help operators to evaluate the re-optimization and to initiate its activation as a new flight plan accordingly.


Aerospace ◽  
2021 ◽  
Vol 8 (5) ◽  
pp. 133
Author(s):  
Sugjoon Yoon ◽  
Dongcho Shin ◽  
Younghoon Choi ◽  
Kyungtae Park

In order to study air traffic control of UAS’s (Unmanned Aerial Systems) in very low altitudes, the UTM (UAS Traffic Management) simulator has to be as flexible and expandable as other research simulators because relevant technologies and regulations are not matured enough at this stage. Available approaches using open sources and platforms are investigated to be used in the UTM simulator. The fundamental rationale for selection is availability of necessary resources to build a UTM simulator. Integration efforts to build a UTM simulator are elaborated, using Ardupilot, MavProxi, Cesium, and VWorld, which are selected from the thorough field study. Design requirements of a UTM simulator are determined by analyzing UTM services defined by NASA (National Aeronautics and Space Administration) and Eurocontrol. The UTM simulator, named eUTM, is composed of three components: UOS (UTM Operating System), UTM, and multiple GCSs (Ground Control Stations). GCSs are responsible for generation of flight paths of various UASs. UTM component copies functions of a real UTM such as monitoring and controlling air spaces. UOS provides simulation of environment such as weather, and controls the whole UTM simulator system. UOS also generates operation scenarios of UTM, and resides on the same UTM computer as an independent process. Two GCS simulators are connected to the UTM simulator in the present configuration, but the UTM simulator can be expanded to include up to 10 GCS simulators in the present design. In order to demonstrate the flexibility and expandability of eUTM simulator, several operation scenarios are realized and typical deconfliction scenarios among them are tested with a deconfliction algorithm. During the study, some limits are identified with applied open sources and platforms, which have to be resolved in order to obtain a flexible and expandable UTM simulator supporting relevant studies. Most of them are related to interfacing individual sources and platforms which use different program languages and communication drivers.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Solomon Adegbenro Akinboro ◽  
Johnson A Adeyiga ◽  
Adebayo Omotosho ◽  
Akinwale O Akinwumi

<p><strong>Vehicular traffic is continuously increasing around the world, especially in urban areas, and the resulting congestion ha</strong><strong>s</strong><strong> be</strong><strong>come</strong><strong> a major concern to automobile users. The popular static electric traffic light controlling system can no longer sufficiently manage the traffic volume in large cities where real time traffic control is paramount to deciding best route. The proposed mobile traffic management system provides users with traffic information on congested roads using weighted sensors. A prototype of the system was implemented using Java SE Development Kit 8 and Google map. The model </strong><strong>was</strong><strong> simulated and the performance was </strong><strong>assessed</strong><strong> using response time, delay and throughput. Results showed that</strong><strong>,</strong><strong> mobile devices are capable of assisting road users’ in faster decision making by providing real-time traffic information and recommending alternative routes.</strong></p>


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Sign in / Sign up

Export Citation Format

Share Document