• Title/Summary/Keyword: Demand Prediction

Search Result 638, Processing Time 0.036 seconds

Evaluation of Future Water Deficit for Anseong River Basin Under Climate Change (기후변화를 고려한 안성천 유역의 미래 물 부족량 평가)

  • Lee, Dae Wung;Jung, Jaewon;Hong, Seung Jin;Han, Daegun;Joo, Hong Jun;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.19 no.3
    • /
    • pp.345-352
    • /
    • 2017
  • The average global temperature on Earth has increased by about $0.85^{\circ}C$ since 1880 due to the global warming. The temperature increase affects hydrologic phenomenon and so the world has been suffered from natural disasters such as floods and droughts. Therefore, especially, in the aspect of water deficit, we may require the accurate prediction of water demand considering the uncertainty of climate in order to establish water resources planning and to ensure safe water supply for the future. To do this, the study evaluated future water balance and water deficit under the climate change for Anseong river basin in Korea. The future rainfall was simulated using RCP 8.5 climate change scenario and the runoff was estimated through the SLURP model which is a semi-distributed rainfall-runoff model for the basin. Scenario and network for the water balance analysis in sub-basins of Anseong river basin were established through K-WEAP model. And the water demand for the future was estimated by the linear regression equation using amounts of water uses(domestic water use, industrial water use, and agricultural water use) calculated by historical data (1965 to 2011). As the result of water balance analysis, we confirmed that the domestic and industrial water uses will be increased in the future because of population growth, rapid urbanization, and climate change due to global warming. However, the agricultural water use will be gradually decreased. Totally, we had shown that the water deficit problem will be critical in the future in Anseong river basin. Therefore, as the case study, we suggested two alternatives of pumping station construction and restriction of water use for solving the water deficit problem in the basin.

Water Digital Twin for High-tech Electronics Industrial Wastewater Treatment System (I): e-ASM Development and Digital Simulation Implementation (첨단 전자산업 폐수처리시설의 Water Digital Twin(I): e-ASM 모델 개발과 Digital Simulation 구현)

  • Shim, Yerim;Lee, Nahui;Jeong, Chanhyeok;Heo, SungKu;Kim, SangYoon;Nam, KiJeon;Yoo, ChangKyoo
    • Clean Technology
    • /
    • v.28 no.1
    • /
    • pp.63-78
    • /
    • 2022
  • Electronics industrial wastewater treatment facilities release organic wastewaters containing high concentrations of organic pollutants and more than 20 toxic non-biodegradable pollutants. One of the major challenges of the fourth industrial revolution era for the electronics industry is how to treat electronics industrial wastewater efficiently. Therefore, it is necessary to develop an electronics industrial wastewater modeling technique that can evaluate the removal efficiency of organic pollutants, such as chemical oxygen demand (COD), total nitrogen (TN), total phosphorous (TP), and tetramethylammonium hydroxide (TMAH), by digital twinning an electronics industrial organic wastewater treatment facility in a cyber physical system (CPS). In this study, an electronics industrial wastewater activated sludge model (e-ASM) was developed based on the theoretical reaction rates for the removal mechanisms of electronics industrial wastewater considering the growth and decay of micro-organisms. The developed e-ASM can model complex biological removal mechanisms, such as the inhibition of nitrification micro-organisms by non-biodegradable organic pollutants including TMAH, as well as the oxidation, nitrification, and denitrification processes. The proposed e-ASM can be implemented as a Water Digital Twin for real electronics industrial wastewater treatment systems and be utilized for process modeling, effluent quality prediction, process selection, and design efficiency across varying influent characteristics on a CPS.

Analysis of domestic water usage patterns in Chungcheong using historical data of domestic water usage and climate variables (생활용수 실적자료와 기후 변수를 활용한 충청권역 생활용수 이용량 패턴 분석)

  • Kim, Min Ji;Park, Sung Min;Lee, Kyungju;So, Byung-Jin;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • Persistent droughts due to climate change will intensify water shortage problems in Korea. According to the 1st National Water Management Plan, the shortage of domestic and industrial waters is projected to be 0.07 billion m3/year under a 50-year drought event. A long-term prediction of water demand is essential for effectively responding to water shortage problems. Unlike industrial water, which has a relatively constant monthly usage, domestic water is analyzed on monthly basis due to apparent monthly usage patterns. We analyzed monthly water usage patterns using water usage data from 2017 to 2021 in Chungcheong, South Korea. The monthly water usage rate was calculated by dividing monthly water usage by annual water usage. We also calculated the water distribution rate considering correlations between water usage rate and climate variables. The division method that divided the monthly water usage rate by monthly average temperature resulted in the smallest absolute error. Using the division method with average temperature, we calculated the water distribution rates for the Chungcheong region. Then we predicted future water usage rates in the Chungcheong region by multiplying the average temperature of the SSP5-8.5 scenario and the water distribution rate. As a result, the average of the maximum water usage rate increased from 1.16 to 1.29 and the average of the minimum water usage rate decreased from 0.86 to 0.84, and the first quartile decreased from 0.95 to 0.93 and the third quartile increased from 1.04 to 1.06. Therefore, it is expected that the variability in monthly water usage rates will increase in the future.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

A study on the use of a Business Intelligence system : the role of explanations (비즈니스 인텔리전스 시스템의 활용 방안에 관한 연구: 설명 기능을 중심으로)

  • Kwon, YoungOk
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.155-169
    • /
    • 2014
  • With the rapid advances in technologies, organizations are more likely to depend on information systems in their decision-making processes. Business Intelligence (BI) systems, in particular, have become a mainstay in dealing with complex problems in an organization, partly because a variety of advanced computational methods from statistics, machine learning, and artificial intelligence can be applied to solve business problems such as demand forecasting. In addition to the ability to analyze past and present trends, these predictive analytics capabilities provide huge value to an organization's ability to respond to change in markets, business risks, and customer trends. While the performance effects of BI system use in organization settings have been studied, it has been little discussed on the use of predictive analytics technologies embedded in BI systems for forecasting tasks. Thus, this study aims to find important factors that can help to take advantage of the benefits of advanced technologies of a BI system. More generally, a BI system can be viewed as an advisor, defined as the one that formulates judgments or recommends alternatives and communicates these to the person in the role of the judge, and the information generated by the BI system as advice that a decision maker (judge) can follow. Thus, we refer to the findings from the advice-giving and advice-taking literature, focusing on the role of explanations of the system in users' advice taking. It has been shown that advice discounting could occur when an advisor's reasoning or evidence justifying the advisor's decision is not available. However, the majority of current BI systems merely provide a number, which may influence decision makers in accepting the advice and inferring the quality of advice. We in this study explore the following key factors that can influence users' advice taking within the setting of a BI system: explanations on how the box-office grosses are predicted, types of advisor, i.e., system (data mining technique) or human-based business advice mechanisms such as prediction markets (aggregated human advice) and human advisors (individual human expert advice), users' evaluations of the provided advice, and individual differences in decision-makers. Each subject performs the following four tasks, by going through a series of display screens on the computer. First, given the information of the given movie such as director and genre, the subjects are asked to predict the opening weekend box office of the movie. Second, in light of the information generated by an advisor, the subjects are asked to adjust their original predictions, if they desire to do so. Third, they are asked to evaluate the value of the given information (e.g., perceived usefulness, trust, satisfaction). Lastly, a short survey is conducted to identify individual differences that may affect advice-taking. The results from the experiment show that subjects are more likely to follow system-generated advice than human advice when the advice is provided with an explanation. When the subjects as system users think the information provided by the system is useful, they are also more likely to take the advice. In addition, individual differences affect advice-taking. The subjects with more expertise on advisors or that tend to agree with others adjust their predictions, following the advice. On the other hand, the subjects with more knowledge on movies are less affected by the advice and their final decisions are close to their original predictions. The advances in predictive analytics of a BI system demonstrate a great potential to support increasingly complex business decisions. This study shows how the designs of a BI system can play a role in influencing users' acceptance of the system-generated advice, and the findings provide valuable insights on how to leverage the advanced predictive analytics of the BI system in an organization's forecasting practices.

Health Care Utilization Pattern and Its Related Factors of Low-income Population with Abnormal Results through Health Examination (저소득층 건강검진 유소견자의 의료이용 양상 및 관련요인)

  • Kwon, Bog-Soon;Kam, Sin;Han, Chang-Hyun
    • Journal of agricultural medicine and community health
    • /
    • v.28 no.2
    • /
    • pp.87-105
    • /
    • 2003
  • Objectives: The purpose of this study was to examine the health care utilization pattern and its related factors of low-income population with abnormal results through health examination. Methods: Analysed data were collected through a questionnaire survey, which was given to 263 persons who 30 years or over with abnormal results through health examination at Health Center. This survey was conducted in March, 2003. This study employed Andersen's prediction model as most well known medical demand mode and data were analysed through 2-test, and multiple logistic regression analysis. Results: The proportion of medical utilization for thorough examination or treatment among study subjects was 51.0%. In multiple logistic regression analysis as dependent variable with medical utilization, the variables affecting the medical utilization were 'feeling about abnormal result(anxiety versus no anxiety: odds ratio 2.25, 95% confidence intervals 1.07-4.75)', 'type of health security(medicaid type I versus health insurance: odds ratio 2.82, 95% confidence intervals 1.04-7.66; medicaid type II versus health insurance: odds ratio 3.22, 95% confidence intervals 1.37-7.53)', 'experience of health examination during past 2 years(odds ratio 2.39, 95% confidence intervals 1.09-5.21)' and 'family member's response for abnormal result(recommendation for medical utilization versus no response: odds ratio 4.90, 95% confidence intervals 1.75-13.75; family member recommended to utilize medical facilities with him/her versus no response: odds ratio 19.47, 95% confidence intervals 5.01-75.73)'. The time of medical utilization was 8-15 days after they received the result(29.9%), 16-30 days after they receive the result(27.6%), 2-7 days after they received the result(20.9%) in order. The most important reason why they didn't take a medical utilization was that it seemed insignificant to them(32.4%). Conclusions: In order to promote medical utilization of low-income population, health education for abnormal result and its management would be necessary to family member as well as person with abnormal result. And follow-up management program for person with abnormal result through health examination such as home-visit health care would be necessary.

  • PDF

Summer Environmental Evaluation of Water and Sediment Quality in the South Sea and East China Sea (남해 및 동중국해의 하계 수질 및 저질 환경평가)

  • Lee, Dae-In;Cho, Hyeon-Seo;Yoon, Yang-Ho;Choi, Young-Chan;Lee, Jeong-Hoon
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.8 no.2
    • /
    • pp.83-99
    • /
    • 2005
  • To evaluate environmental charateristics of the South Sea and East China Sea on summer, water and sediment quality were measured in June 2001-2003. Surface layer was affceted by Warm water originated from the high temperature and salinity-Tsushima Warm Current, on the other hand, Yellow Sea Cold Water was spread to the bottom layer in the south-western part of the Jeju island, and salinity at stations near the Yangtze River was decreased below 29psu because of a enormous freshwater discharges. Thermocline-depth was formed at about 10m, and chlorophyll maximum layer was existed in and below the thermocline. COD(Chemical Oxygen Demand), TN(Total Nitrogen), and TP(Total Phosphorus) concentrations showed seawater quality grade II in surface layer of the most area, but concentrations of such as COD, Chl. a, TSS(Total Suspended Solid), and nutrients were greatly increased in the effect area of Yangtze River discharges. Correlations between dissolved inorganic nitrogen, Chl. a and salinity were negative patterns strongly, in contrast, those of inorganic phosphorus, COD and Chl. a were positive, which indicates that phytoplankton biomass and phosphorus are considered as important factors of organic matter distribution and algal growth, respectively. in the study area. The distribution of ignition loss, COD, and $H_2S$ of surface sediment were in the ranges of 2.61-8.81%, $0.64-11.86mgO_2/g-dry$, and ND-0.25 mgS/g-dry, respectively, with relatively high concentration in the eastern part of the study area. Therefore, to effective and sustainable use and management of this area, continuous monitoring and countermeasures about major input sources to the water and sediment, and prediction according to the environmental variation, are necessary.

  • PDF

Macroeconomic Consequences of Pay-as-you-go Public Pension System (부과방식 공적연금의 거시경제적 영향)

  • Park, Chang-Gyun;Hur, Seok-Kyun
    • KDI Journal of Economic Policy
    • /
    • v.30 no.2
    • /
    • pp.225-270
    • /
    • 2008
  • We analyze macroeconomic consequences of pay-as-you-go (PAYGO) public pension system with a simple overlapping generations model. Contrary to large body of existing literatures offering quantitative results based on simulation study, we take another route by adopting a highly simplified framework in search of qualitatively tractable analytical results. The main contribution of our results lies in providing a sound theoretical foundation that can be utilized in interpreting various quantitative results offered by simulation studies of large scale general equilibrium models. We present a simple overlapping generations model with a defined benefit(DB) PAYGO public pension system as a benchmark case and derive an analytical equilibrium solution utilizing graphical illustration. We also discuss the modifications of the benchmark model required to encompass a defined contribution(DC) public pension system into the basic framework. Comparative statics analysis provides three important implications; First, introduction and expansion of the PAYGO public pension, DB or DC, result in lower level of capital accumulation and higher expected rate of return on the risky asset. Second, it is shown that the progress of population aging is accompanied by lower capital stock due to decrease in both demand and supply of risky asset. Moreover, risk premium for risky asset increases(decreases) as the speed of population aging accelerates(decelerates) so that the possibility of so-called "the great meltdown" of asset market cannot be excluded although the odds are not high. Third, it is most likely that the switch from DB PAYGO to DC PAYGO would result in lower capital stock and higher expected return on the risky asset mainly due to the fact that the young generation regards DC PAYGO pension as another risky asset competing against the risky asset traded in the market. This theoretical prediction coincides with one of the firmly established propositions in empirical literature that the currently dominant form of public pension system has the tendency to crowd out private capital accumulation.

  • PDF

Analysis of the Elderly Travel Characteristics and Travel Behavior with Daily Activity Schedules (the Case of Seoul, Korea) (활동 스케줄 분석을 통한 고령자의 통행특성과 통행행태에 관한 연구)

  • Seo, Sang-Eon;Jeong, Jin-Hyeok;Kim, Sun-Gwan
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.5 s.91
    • /
    • pp.89-108
    • /
    • 2006
  • Korea has been entering the ageing society as the population of age over 65 shared over 7% since the year 2000. The ageing society needs to have transportation facility considering elderly people's travel behavior. This study aims to understand the elderly people's travel behavior using recent data in Korea. The activity schedule approach begins with travel outcomes are part of an activitv scheduling decision. For tho?e approach. used discrete choice models (especially. Nested Logit Model) to address the basic modeling problem capturing decision interaction among the many choice dimensions of the immense activity schedule choice set The day activity schedule is viewed as a sot of tours and at-home activity episodes tied togather with overarching day activity pattern using the Seoul Metropolitan Area Transportation Survey data, which was conducted in June, 2002. Decisions about a specific tour in the schedule are conditioned by the choice of day activity pattern. The day activity scheduling model estimated in this study consists of tours interrelated in a day activity pattern. The day activity pattern model represents the basic decision of activity participation and priorities and places each activity in a configuration of tours and at-home episodes. Each pattern alternative is defined by the primary activity of the day, whether the primary activity occurs at home or away, and the type of tour for the primary activity. In travel mode choice of the elderly and non-workers, especially, travel cost was found to be important in understanding interpersonal variations in mode choice behavior though, travel time was found to be less important factor in choosing travel mode. In addition, although, generally, the elderly was likely to choose transit mode, private mode was preferred for the elderly over 75 years old owing to weakened physical health for such things as going up and down of stairs. Therefore. as entering the ageing society, transit mode should be invested heavily in transportation facility Planning tor improving elderly transportation service. Although the model has not yet been validated in before-and-after prediction studies. this study gives strong evidence of its behavioral soundness, current practicality. and potential for improving reliability of transportation Projects superior to those of the best existing systems in Korea.