• Title/Summary/Keyword: Network Delay

Search Result 2,887, Processing Time 0.026 seconds

A Study on the Implement of AI-based Integrated Smart Fire Safety (ISFS) System in Public Facility

  • Myung Sik Lee;Pill Sun Seo
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2023
  • Even at this point in the era of digital transformation, we are still facing many problems in the safety sector that cannot prevent the occurrence or spread of human casualties. When you are in an unexpected emergency, it is often difficult to respond only with human physical ability. Human casualties continue to occur at construction sites, manufacturing plants, and multi-use facilities used by many people in everyday life. If you encounter a situation where normal judgment is impossible in the event of an emergency at a life site where there are still many safety blind spots, it is difficult to cope with the existing manual guidance method. New variable guidance technology, which combines artificial intelligence and digital twin, can make it possible to prevent casualties by processing large amounts of data needed to derive appropriate countermeasures in real time beyond identifying what safety accidents occurred in unexpected crisis situations. When a simple control method that divides and monitors several CCTVs is digitally converted and combined with artificial intelligence and 3D digital twin control technology, intelligence augmentation (IA) effect can be achieved that strengthens the safety decision-making ability required in real time. With the enforcement of the Serious Disaster Enterprise Punishment Act, the importance of distributing a smart location guidance system that urgently solves the decision-making delay that occurs in safety accidents at various industrial sites and strengthens the real-time decision-making ability of field workers and managers is highlighted. The smart location guidance system that combines artificial intelligence and digital twin consists of AIoT HW equipment, wireless communication NW equipment, and intelligent SW platform. The intelligent SW platform consists of Builder that supports digital twin modeling, Watch that meets real-time control based on synchronization between real objects and digital twin models, and Simulator that supports the development and verification of various safety management scenarios using intelligent agents. The smart location guidance system provides on-site monitoring using IoT equipment, CCTV-linked intelligent image analysis, intelligent operating procedures that support workflow modeling to immediately reflect the needs of the site, situational location guidance, and digital twin virtual fencing access control technology. This paper examines the limitations of traditional fixed passive guidance methods, analyzes global technology development trends to overcome them, identifies the digital transformation properties required to switch to intelligent variable smart location guidance methods, explains the characteristics and components of AI-based public facility smart fire safety integrated system (ISFS).

A User Optimer Traffic Assignment Model Reflecting Route Perceived Cost (경로인지비용을 반영한 사용자최적통행배정모형)

  • Lee, Mi-Yeong;Baek, Nam-Cheol;Mun, Byeong-Seop;Gang, Won-Ui
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.2
    • /
    • pp.117-130
    • /
    • 2005
  • In both deteministic user Optimal Traffic Assignment Model (UOTAM) and stochastic UOTAM, travel time, which is a major ccriterion for traffic loading over transportation network, is defined by the sum of link travel time and turn delay at intersections. In this assignment method, drivers actual route perception processes and choice behaviors, which can become main explanatory factors, are not sufficiently considered: therefore may result in biased traffic loading. Even though there have been some efforts in Stochastic UOTAM for reflecting drivers' route perception cost by assuming cumulative distribution function of link travel time, it has not been fundamental fruitions, but some trials based on the unreasonable assumptions of Probit model of truncated travel time distribution function and Logit model of independency of inter-link congestion. The critical reason why deterministic UOTAM have not been able to reflect route perception cost is that the route perception cost has each different value according to each origin, destination, and path connection the origin and destination. Therefore in order to find the optimum route between OD pair, route enumeration problem that all routes connecting an OD pair must be compared is encountered, and it is the critical reason causing computational failure because uncountable number of path may be enumerated as the scale of transportation network become bigger. The purpose of this study is to propose a method to enable UOTAM to reflect route perception cost without route enumeration between an O-D pair. For this purpose, this study defines a link as a least definition of path. Thus since each link can be treated as a path, in two links searching process of the link label based optimum path algorithm, the route enumeration between OD pair can be reduced the scale of finding optimum path to all links. The computational burden of this method is no more than link label based optimum path algorithm. Each different perception cost is embedded as a quantitative value generated by comparing the sub-path from the origin to the searching link and the searched link.

A Study on the Data Driven Neural Network Model for the Prediction of Time Series Data: Application of Water Surface Elevation Forecasting in Hangang River Bridge (시계열 자료의 예측을 위한 자료 기반 신경망 모델에 관한 연구: 한강대교 수위예측 적용)

  • Yoo, Hyungju;Lee, Seung Oh;Choi, Seohye;Park, Moonhyung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.73-82
    • /
    • 2019
  • Recently, as the occurrence frequency of sudden floods due to climate change increased, the flood damage on riverside social infrastructures was extended so that there has been a threat of overflow. Therefore, a rapid prediction of potential flooding in riverside social infrastructure is necessary for administrators. However, most current flood forecasting models including hydraulic model have limitations which are the high accuracy of numerical results but longer simulation time. To alleviate such limitation, data driven models using artificial neural network have been widely used. However, there is a limitation that the existing models can not consider the time-series parameters. In this study the water surface elevation of the Hangang River bridge was predicted using the NARX model considering the time-series parameter. And the results of the ANN and RNN models are compared with the NARX model to determine the suitability of NARX model. Using the 10-year hydrological data from 2009 to 2018, 70% of the hydrological data were used for learning and 15% was used for testing and evaluation respectively. As a result of predicting the water surface elevation after 3 hours from the Hangang River bridge in 2018, the ANN, RNN and NARX models for RMSE were 0.20 m, 0.11 m, and 0.09 m, respectively, and 0.12 m, 0.06 m, and 0.05 m for MAE, and 1.56 m, 0.55 m and 0.10 m for peak errors respectively. By analyzing the error of the prediction results considering the time-series parameters, the NARX model is most suitable for predicting water surface elevation. This is because the NARX model can learn the trend of the time series data and also can derive the accurate prediction value even in the high water surface elevation prediction by using the hyperbolic tangent and Rectified Linear Unit function as an activation function. However, the NARX model has a limit to generate a vanishing gradient as the sequence length becomes longer. In the future, the accuracy of the water surface elevation prediction will be examined by using the LSTM model.

International Success the Second Time Around: A Case Study (제이륜국제성공(第二轮国际成功): 일개안례연구(一个案例研究))

  • Colley, Mary Catherine;Gatlin, Brandie
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.173-178
    • /
    • 2010
  • A privately held, third generation family owned company, Boom Technologies, Inc. (BTI), a provider of products and services to the electric utility, telecommunications and contractor markets, continues to make progress in exporting. Although export sales only equaled 5% of total revenue in 2008, BTI has an entire export division. Their export division's Managing Director reveals the trial and errors of a privately held company and their quest for success overseas. From its inception, BTI has always believed its greatest asset is its employees. When export sales struggled due to lack of strategy and direction, BTI hired a Managing Director for its export division. With leadership and guidance from BTI's president and from the Managing Director, they utilized the department's skills and knowledge. Structural changes were made to expand their market presence abroad and increase export sales. As a result, export sales increased four-fold, area managers in new countries were added and distribution networks were successfully cultivated. At times, revenue generation was difficult to determine due to the structure of the company. Therefore, in 1996, the export division was restructured as a limited liability company. This allowed the company to improve the tracking of revenue and expenses. Originally, 80% of BTI's export sales came from two countries; therefore, the initial approach to selling overseas was not reaching their anticipated goals of expanding their foreign market presence. However, changes were made and now the company manages the details of selling to over 80 countries. There were three major export expansion challenges noted by the Managing Director: 1. Product and Shipping - The major obstacle for BTI was product assembly. Originally, the majority of the product was assembled in the United States, which increased shipping and packaging costs. With so many parts specified in the order, many times the order would arrive with parts missing. The missing parts could equate to tens of thousands of dollars. Shipping these missing parts separately in another shipment also cost tens of thousands of dollar, plus a delivery delay time of six to eight weeks; all of which came out of the BTI's pockets. 2. Product Adaptation - Safety and product standards varied widely for each of the 80 countries to which BTI exported. Weights, special licenses, product specification requirements, measurement systems, and truck stability can all differ from country to country and can serve as a type of barrier to entry, making it difficult to adapt products accordingly. Technical and safety standards are barriers that serve as a type of protection for the local industry and can stand in the way of successfully pursuing foreign markets. 3. Marketing Challenges - The importance of distribution creates many challenges for BTI as they attempt to determine how each country prefers to operate with regard to their distribution systems. Some countries have competition from a small competitor that only produces one competing product; whereas BTI manufactures over 100 products. Marketing material is another concern for BTI as they attempt to push marketing costs to the distributors. Adapting the marketing material can be costly in terms of translation and cultural differences. In addition, the size of paper in the United States differs from those in some countries, causing many problems when attempting to copy the same layout and With distribution being one of several challenges for BTI, the company claims their distribution network is one of their competitive advantages, as the location and names of their distributors are not revealed. In addition, BTI rotates two offerings yearly: training to their distributors one year and then the next is a distributor's meeting. With a focus on product and shipping, product adaptation, and marketing challenges, the intricacies of selling overseas takes time and patience. Another competitive advantage noted is BTI's cradle to grave strategy, where they follow the product from sale to its final resting place, whether the truck is leased or purchased new or used. They also offer service and maintenance plans with a detailed cost analysis provided to the company prior to purchasing or leasing the product. Expanding abroad will always create challenges for a company. As the Managing Director stated, "If you don't have patience (in the export business), you better do something else." Knowing how to adapt quickly provides BTI with the skills necessary to adjust to the changing needs of each country and its own unique challenges, allowing them to remain competitive.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Is corporate rebranding a double-edged sword? Consumers' ambivalence towards corporate rebranding of familiar brands

  • Phang, Grace Ing
    • Asia Marketing Journal
    • /
    • v.15 no.4
    • /
    • pp.131-159
    • /
    • 2014
  • Corporate rebranding has been evident in the qualitative corporate rebranding studies as an imposed organizational change that induces mixed reactions and ambivalent attitudes among consumers. Corporate rebranding for the established and familiar corporate brands leads to more ambivalent attitudes as these companies represent larger targets for disparaging information. Consumers are found to hold both positive and negative reactions toward companies and brands that they are familiar with. Nevertheless, the imposed change assumption and ambivalent attitude, in particular corporate rebranding, have never been widely explored in the quantitative corporate rebranding studies. This paper aims to provide a comprehensive empirical examination of the ambivalence towards rebrandingrebranded brand attitude-purchase intention relationships. The author proposes that corporate rebranding for familiar corporate brands is a double-edged sword that not only raises the expectation for better performance, but also induces conflicted and ambivalent attitudes among consumers. These consumers' ambivalent attitudes are influenced by both the parent brands-related and general attitude factors which further affect their rebranded brand attitude and purchase intention. A total of 156 useable questionnaires were collected from Malaysian working adults; and two established Malaysian airfreight operators were utilized as the focal parent brands. The study found a significant impact of prior parent brand attitudes on ambivalence towards rebranding (ATR). The parent brand attitudes served as anchors in influencing how new information was processed (Mazaheri et al., 2011; Sherif & Hovland, 1961) and closely related to behavioral intention (Prislin & Quellete, 1996). The ambivalent attitudes experienced were higher when individuals held both positive and negative reactions toward the parent brands. Consumers also held higher ambivalent attitudes when they preferred one of the parent brands; while disliked the other brand. The study also found significant relationships between the lead brand and the rebranded brand attitude; and between the partner brands and ATR. The familiar but controversial partner brand contributed significantly to the ambivalent attitudes experienced; while the more established lead brand had significant impact on the rebranded brand attitude. The lead and partner brands, though both familiar, represented different meanings to consumers. The author attributed these results to the prior parent brand attitudes, the skepticism and their general ambivalence toward the corporate rebranding. Both general attitude factors (i.e. skepticism and general ambivalence towards rebranding) were found to have significant positive impacts on ATR. Skeptical individuals questioned the possibility of a successful rebranding (Chang, 2011) and were more careful with their evaluations toward 'too god to be true' or 'made in heaven' pair of companies. The embedded general ambivalent attitudes that people held toward rebranding could be triggered from the associative network by the ambiguous situation (Prislin & Quellete, 1996). In addition, the ambivalent rebranded brand attitude was found to lower down purchase intention, supporting Hanze (2001), Lavine (2001) and van Harreveld et al. (2009)'s studies. Ambivalent individuals were found to prefer delay decision making by choosing around the mid-ranged points in 'willingness to buy' scale. The study provides several marketing implications. Ambivalence management is proven to be important to corporate rebranding to minimize the ambivalent attitudes experienced. This could be done by carefully controlling the parent brands-related and general attitude factors. The high ambivalent individuals are less confident with their own conflicted attitudes and are motivated to get rid of the psychological discomfort caused by these conflicted attitudes (Bell & Esses, 2002; Lau-Gesk, 2005; van Harreveld et al., 2009). They tend to process information more deeply (Jonas et al., 1997; Maio et al., 2000; Wood et al., 1985) and pay more attention to message that provides convincible arguments. Providing strong, favorable and convincible message is hence effective in alleviating consumers' ambivalent attitudes. In addition, brand name heuristic could be utilized because the rebranding strategy sends important signal to consumers about the changes that happen or going to happen. The ambivalent individuals will pay attention to both brand name heuristic and rebranding message in their effort to alleviate the psychological discomfort caused by ambivalent attitudes. The findings also provide insights to Malaysian and airline operators for a better planning and implementation of corporate rebranding exercise.

  • PDF