• Title/Summary/Keyword: Access site

Search Result 595, Processing Time 0.031 seconds

Leveraging Reinforcement Learning for Generating Construction Workers' Moving Path: Opportunities and Challenges

  • Kim, Minguk;Kim, Tae Wan
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1085-1092
    • /
    • 2022
  • Travel distance is a parameter mainly used in the objective function of Construction Site Layout Planning (CSLP) automation models. To obtain travel distance, common approaches, such as linear distance, shortest-distance algorithm, visibility graph, and access road path, concentrate only on identifying the shortest path. However, humans do not necessarily follow one shortest path but can choose a safer and more comfortable path according to their situation within a reasonable range. Thus, paths generated by these approaches may be different from the actual paths of the workers, which may cause a decrease in the reliability of the optimized construction site layout. To solve this problem, this paper adopts reinforcement learning (RL) inspired by various concepts of cognitive science and behavioral psychology to generate a realistic path that mimics the decision-making and behavioral processes of wayfinding of workers on the construction site. To do so, in this paper, the collection of human wayfinding tendencies and the characteristics of the walking environment of construction sites are investigated and the importance of taking these into account in simulating the actual path of workers is emphasized. Furthermore, a simulation developed by mapping the identified tendencies to the reward design shows that the RL agent behaves like a real construction worker. Based on the research findings, some opportunities and challenges were proposed. This study contributes to simulating the potential path of workers based on deep RL, which can be utilized to calculate the travel distance of CSLP automation models, contributing to providing more reliable solutions.

  • PDF

Research on Data Acquisition Strategy and Its Application in Web Usage Mining (웹 사용 마이닝에서의 데이터 수집 전략과 그 응용에 관한 연구)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.231-241
    • /
    • 2019
  • Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user's access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users' detailed click behavior in the process of users' visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

Development of an Accident Consequence Assessment Code for Evaluating Site Suitability of Light- and Heavy-water Reactors Based on the Korean Technical Standards

  • Hwang, Won Tae;Jeong, Hae Sun;Jeong, Hyo Joon;Kil, A Reum;Kim, Eun Han;Han, Moon Hee
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.4
    • /
    • pp.368-372
    • /
    • 2016
  • Background: Methodologies for a series of radiological consequence assessments show a distinctive difference according to the design principles of the original nuclear suppliers and their technical standards to be imposed. This is due to the uncertainties of the accidental source term, radionuclide behavior in the environment, and subsequent radiological dose. Both types of PWR and PHWR are operated in Korea. However, technical standards for evaluating atmospheric dispersion have been enacted based on the U.S. NRC's positions regardless of the reactor types. For this reason, it might cause a controversy between the licensor and licensee of a nuclear power plant. Materials and Methods: It was modelled under the framework of the NRC Regulatory Guide 1.145 for light-water reactors, reflecting the features of heavy-water reactors as specified in the Canadian National Standard and the modelling features in MACCS2, such as atmospheric diffusion coefficient, ground deposition, surface roughness, radioactive plume depletion, and exposure from ground deposition. Results and Discussion: An integrated accident consequence assessment code, ACCESS (Accident Consequence Assessment Code for Evaluating Site Suitability), was developed by taking into account the unique regulatory positions for reactor types under the framework of the current Korean technical standards. Field tracer experiments and hand calculations have been carried out for validation and verification of the models. Conclusion: The modelling approaches of ACCESS and its features are introduced, and its applicative results for a hypothetical accidental scenario are comprehensively discussed. In an applicative study, the predicted results by the light-water reactor assessment model were higher than those by other models in terms of total doses.

The Usage of Diet and Nutritional Information on the Internet by Users' Age (이용자의 연령에 따른 인터넷 상의 식생활 및 영양 정보 이용)

  • Cho, Kuk-Hee;Choi, Bong-Soon;Seo, Ju-Young;Park, Geum-Soon;Lee, In-Sook
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.16 no.5
    • /
    • pp.542-549
    • /
    • 2006
  • The purpose of this study was to develop a web site providing sound and specific diet and nutritional information for internet users in different age groups to protect themselves from junk nutritional information. Among 660 internal users (436 in their 20s, 154 in their 30s, and 63 in their 40s), 66.4% had access to a computer to get nutritional information. Almost 38% of those in their 20s searched in the internet using the term 'diet', whereas 25.9% of those in their 30s and 27.1% of those in their 40s searched using 'cooking and recipe'(p<0.001). The main purpose of using nutritional information on the internet of the subjects was 'to take care of health'(p<0.001). Seventy percent of subjects answered 'so-so' for the satisfaction about the content of nutritional information that was self-explored. Contents related to nutritional information which needed to be improved was 'sound information' for 47.2% of those in their 30s, 'convenience for the application to daily life' for 51.1% of those in their 20s, and 39.6% of those in their 40s. A specialized nutritional information site must to be developed for users to gain access to reliable and valuable information without difficulty, as the variety of the interested area and application area for each user.

  • PDF

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

A Study on the Monitoring Method of Landslide Damage Area Using UAV (UAV를 이용한 산사태 피해지역 모니터링 방법에 관한 연구)

  • Kim, Sung-Bo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.6_2
    • /
    • pp.1043-1050
    • /
    • 2020
  • In this study, a study was presented on the monitoring technique of landslide area using UAV. In the case of disaster investigation using drone mapping, it can be used at various disaster sites. The mission can be carried out at various disaster sites, including surveys of damage to mountainous areas caused by landslides, building collapses surveys of flood damage, typhoons, earthquakes. The damage investigation plan using drone mapping is expected to be highly utilized at disaster sites where investigators cannot access it like in mountainous areas and where it is difficult to conduct direct damage investigations at the site. Drone mapping technology has many advantages in terms of disaster follow-up, such as recovery. Compared to the existing survey system, which was mainly carried out manually, the investigation time can be drastically reduced, and it can also respond to disaster sites that are difficult to carry out or are difficult to access directly. In addition, it is possible to establish and guide spatial data at the disaster site based on accurate mapping data from the time of the disaster, which has considerable strength in managing the situation of the disaster site, selecting priority areas for recovery, and establishing recovery plans. As such, drone mapping is a technology that can be used in a wide range of sites along with natural disasters and social disasters. If a damage investigation system is established through this, it is believed that it will contribute significantly to the rapid establishment of recovery plans along with the investigation of disaster response time and extent of damage recovery.

The Surrey Research Park: A Case Study of Strategic Planning for Economic Development

  • Parry, Malcolm
    • World Technopolis Review
    • /
    • v.1 no.3
    • /
    • pp.206-225
    • /
    • 2012
  • The development of the Surrey Research Park by the University of Surrey is an addition to a number of existing strategies to collaborate with industry that it has developed over its 120 year history. The potential to undertake this development was based on owning a substantial land holding that the University acquired when the Borough Council for the town of Guildford invited the University to relocate from Battersea in London to its new location in 1966. Initial plans for the Park in 1979 were accelerated in 1981 in response to plans by the then government to reduce funding for Higher Education in the UK. Beyond a broad master plan for the site that was based on topography and access to the site the plans that were developed were based on a survey of 100 companies that were deemed to be in the target market for the site and a review of the other 7 science parks that were being developed in the UK in 1981. The findings from this proved to be important in developing the master plan for the site. Another important influence on the project was the objectives that were defined for the 3 stakeholders in the project of the University, the tenant companies and the planning authority relate to economic development, a competitive advantage of tenant companies, knowledge transfer, the profile for the University and the capacity to generate income proved to be a valuable framework on which to develop a master plan. These details were underpinned by five objectives which served the three stakeholders in the site. Those for the University included commercial potential, knowledge transfer and image and reputation; those for the town primarily related to economic development and the plan was to help tenants gain a competitive advantage by locating on the site. In addition a number of success indicators were defined for the project against which to measure performance and have remained as a useful set of parameters on which to base the assessment of the performance of the site. In combination with these indicators a further analysis deals with the success factors that are considered as important in influencing performance. The paper sets details the history of the park and covers the success indicators and factors and reviews these in the context of the original objectives for the site.

A Study of Developing and Evaluating a Pansoree Retrieval System Using Topic Maps (토픽맵-기반 판소리 검색시스템 구축 및 평가에 관한 연구)

  • Oh Sam Gyun;Park Ok-Nam
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.77-98
    • /
    • 2005
  • The purpose of this research is to propose a powerful alternative in designing knowledge portals using Topic Maps(TM). To demonstrate the power of TM In constructing knowledge portals. we designed a TM-based korean folk music(pansori) site, tested It with an existing pansoree site (pansoree.com ) employing diverse query patterns : simple, advanced, associative, and cross referential Queries. The results show that the TM-based site outperforms the pansoree.com in searching time and steps. The TM-based site also provide novice users who do not know pansori domain with easy access to Information that they need.

  • PDF

Study on Providing Anonymity of HTTPS Web Site Blocking (HTTPS 웹 사이트 차단의 익명성 제공 방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • As the number of harmful sites increases, many social problems are occurring. Therefore, in order to solve this problem, the government is carrying out activities to block access to web sites to harmful sites based on the law. However, due to the change from HTTP to HTTPS protocol, it has become difficult to block the harmful sites in the existing method. In the existing HTTP protocol, a method of blocking the site corresponding to the harmful site domain list by utilizing the DNS information was used. However, due to the generalization of HTTPS, it is difficult to block the harmful sites in the existing method. Therefore, the ISP uses the method of blocking the website using the SNI field in the TLS (Transport Layer Security) Handshake protocol used for HTTPS. However, since the method using SNI field raises the concern of monitoring Internet users or exposing information about connected sites, in this paper, we proposed method which can support anonymity to Internet users while blocking harmful sites. The suggested method also can support integrity and source authentication to the transmitted data.

Landscape Design of KangWon Provincial Police Agency (강원도 지방경찰청 조경설계)

  • 이시영;김신원
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.79-87
    • /
    • 2002
  • This landscape design proposal was presented to a design competition for the KangWon Province Police Agency(KPA). The site, about 27,711 $m^2$, is located at 293-4 Udu-dong, Chunchun, KangWon-Do. Design objectives of the KPA were to build a symbolic place which fall community members with pride, to elevate an identity and status of the KPA by creating a landscape correspondent to the concept of the building design, to provide community residents with a space to enjoy cultural and social activities, and to make environment friendly space. The main concept was developed by one of characteristics of the traditional spatial structure of Korea known as an, 'Open and Closed spatial structure.'By re-interpreting the traditional spatial structure and applying it to the site, the design met the various desires of the KPA. The site is primarily segmented into 6 sub spaces; entrance space Podori plaza, symbolic court, police billeting area, sports area, and rear rest area. The entrance space, Podori plaza, and symbolic court on the south-west part of the site represent the publicity of the site as the concept of ″open space.″ On the contrary, considering the specialty of police affairs, the north-east part of the site, which contains the police billeting area and rest area, were designed to maintain security by using the concept of ″closed space.″ To express an identity of the KPA, 'Podori', a police mascot, the plaza was designed and is suppose to function as the hub of the community. In the front section of the plaza, a symmetrical planting pattern, centering the strong axis, was introduced to strengthen its symbolic meaning. Traditional window frames such as the pattern of 'Pisal-jige'and 'Umulsal-jige' were used for the paving system which is applied as the environment friendly design. Site facilities and furnitrue were placed at every important spot in order to connect various spaces organically. As these well-tied spaces properly shared their function, spatial sequence and management would be promoted. The entire space was designed to allow free access of handicapped people. This proposal is meant to create a new image of KangWon province and to enhance the way of inhabitants' think about their community.