• Title/Summary/Keyword: event-based

Search Result 3,219, Processing Time 0.033 seconds

An Experimental Study on the Analysis of Evacuation Characteristics Considering the Joining of Occupants in a Building Staircase (건축물 계단실 내 재실자의 합류를 고려한 피난특성 분석에 관한 실험적 연구)

  • Kim, Yun-Seong;Huh, Ye-Rim;Choi, Yun-Ju;Kim, Hye-Won;Kwon, Yeong-Jin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.11a
    • /
    • pp.204-205
    • /
    • 2021
  • In the event of a fire in a high-rise building, rapid evacuation through the stairwell is a very important factor in rapid evacuation. However, in the event of an actual fire, most of the occupants evacuate at the same time, resulting in a stay in the stairwell, reducing the evacuation speed. In Korea, conditions for buildings are created to evacuate quickly and safely while introducing performance-oriented designs to solve these problems, but there is no research data related to the evacuation speed due to joining in the event of vertical evacuation. Therefore, in this study, by analyzing the experiment conducted at W University in Japan, the density-speed relationship when staying in the staircase room was derived, and the regression equation was derived based on the results.

  • PDF

The Impact of Drug Interactions with Tyrosine Kinase Inhibitors on Adverse Event Development based on the changes of drug concentration level: Meta-analysis (Tyrosine Kinase 억제제와의 약물 상호작용이 약물 혈중농도 변화에 따라 부작용 발생에 미치는 영향: 메타분석 연구)

  • JinAh Hwang;Heeyoung Lee
    • Korean Journal of Clinical Pharmacy
    • /
    • v.34 no.1
    • /
    • pp.71-78
    • /
    • 2024
  • Background: Oral cancer drugs, particularly tyrosine kinase inhibitors (TKIs), are increasingly popular due to their convenience. However, they pose challenges like drug interactions, especially with medications like azole antifungals. While the FDA provides some guidance, more detailed information is needed to manage these interactions effectively. A meta-analysis was conducted to understand the impact of interactions between TKIs and azole antifungals on adverse events during clinical studies. Methods: A meta-analysis followed PRISMA guidelines. Data from PubMed, EMBASE, and references were searched until November 30, 2021. Inclusion criteria encompassed studies on TKI-antifungal interactions in English. Study selection and quality assessment were conducted by two independent investigators. Results: Out of 158 articles, 11 were selected for analysis. Combination therapy showed a slight increase in adverse events but was not statistically significant (OR 1.02, 95% CI 0.49-2.13, p=0.95). AUC and Cmax fold changes did not significantly impact adverse event development. Both itraconazole and ketoconazole showed no significant difference in adverse event development compared to TKI alone. Conclusions: Study finds TKI-DDI not significantly linked to AE increase; azole antifungal types not related to AE. Future DDI research crucial for drug development.

Simulation-Based Operational Risk Assessment (시뮬레이션 기법을 이용한 운영리스크 평가)

  • Hwang, Myung-Soo;Lee, Young-Jai
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.129-139
    • /
    • 2005
  • This paper proposes a framework of Operational Risk-based Business Continuity System(ORBCS), and develops protection system for operational risk through operational risk assessment and loss distribution approach based on risk management guideline announced in the basel II. In order to find out financial operational risk, business processes of domestic bank are assorted by seven event factors and eight business activities so that we can construct the system. After we find out KRI(Key Risk Indicator) index, tasks and risks, we calculated risk possibility and expected cost by analyzing quantitative data, questionnaire and qualitative approach for AHP model from the past events. Furthermore, we can assume unexpected cost loss by using loss distribution approach presented in the basel II. Each bank can also assume expected loss distributions of operational risk by seven event factors and eight business activities. In this research, we choose loss distribution approach so that we can calculate operational risk. In order to explain number of case happened, we choose poisson distribution, log-normal distribution for loss cost, and estimate model for Monte-Carlo simulation. Through this process which is measured by operational risk. of ABC bank, we find out that loss distribution approach explains closer unexpected cost directly compared than internal measurement approach, and makes less unexpected cost loss.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Micro-seismic monitoring in mines based on cross wavelet transform

  • Huang, Linqi;Hao, Hong;Li, Xibing;Li, Jun
    • Earthquakes and Structures
    • /
    • v.11 no.6
    • /
    • pp.1143-1164
    • /
    • 2016
  • Time Delay of Arrival (TDOA) estimation methods based on correlation function analysis play an important role in the micro-seismic event monitoring. It makes full use of the similarity in the recorded signals that are from the same source. However, those methods are subjected to the noise effect, particularly when the global similarity of the signals is low. This paper proposes a new approach for micro-seismic monitoring based on cross wavelet transform. The cross wavelet transform is utilized to analyse the measured signals under micro-seismic events, and the cross wavelet power spectrum is used to measure the similarity of two signals in a multi-scale dimension and subsequently identify TDOA. The offset time instant associated with the maximum cross wavelet transform spectrum power is identified as TDOA, and then the location of micro-seismic event can be identified. Individual and statistical identification tests are performed with measurement data from an in-field mine. Experimental studies demonstrate that the proposed approach significantly improves the robustness and accuracy of micro-seismic source locating in mines compared to several existing methods, such as the cross-correlation, multi-correlation, STA/LTA and Kurtosis methods.

Performance Evaluation of Node.js for Web Service Gateway in IoT Remote Monitoring Applications

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of remote and controlling system related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The web service gateway responsible for handling clients' requests attests an internet latency when an increasing number of end users requests submit toward it. Therefore, this web service gateway fails to detect several commands, slows down predefined actions which should be performed without human intervention. In this paper, we investigate the performance of a web server-side platgorm based event-driven, non-blocking approach called Node.js against traditional thread-based server side approach to handle a large number of client requests simultaneously for remote and controlling system in IoT remote monitoring applications. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in IoT environment.

XML-based Modeling for Semantic Retrieval of Syslog Data (Syslog 데이터의 의미론적 검색을 위한 XML 기반의 모델링)

  • Lee Seok-Joon;Shin Dong-Cheon;Park Sei-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.147-156
    • /
    • 2006
  • Event logging plays increasingly an important role in system and network management, and syslog is a de-facto standard for logging system events. However, due to the semi-structured features of Common Log Format data most studies on log analysis focus on the frequent patterns. The extensible Markup Language can provide a nice representation scheme for structure and search of formatted data found in syslog messages. However, previous XML-formatted schemes and applications for system logging are not suitable for semantic approach such as ranking based search or similarity measurement for log data. In this paper, based on ranked keyword search techniques over XML document, we propose an XML tree structure through a new data modeling approach for syslog data. Finally, we show suitability of proposed structure for semantic retrieval.

Automatic Indexing for the Content-based Retrieval of News Video (뉴스 비디오의 내용기반 검색을 위한 자동 인덱싱)

  • Yang, Myung-Sup;Yoo, Cheol-Jung;Chang, Ok-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1130-1139
    • /
    • 1998
  • This paper presents an integrated solution for the content-based news video indexing and the retrieval. Currently, it is impossible to automatically index a general video, but we can index a specific structural video such as news videos. Our proposed model extracts automatically the key frames by using the structured knowledge of news and consists of the news item segmentation, caption recognition and search browser modules. We present above three modules in the following: the news event segmentation module recognizes an anchor-person shot based on face recognition, and then its news event are divided by the anchor-person's frame information. The caption recognition module detects the caption-frames with the caption characteristics, extracts their character region by the using split-merge method, and then recognizes characters with OCR software. Finally, the search browser module could make a various of searching mechanism possible.

  • PDF

Specifcation and Farmalization of Transition Event Sequence (천이 사건 순서의 표현과 정형화)

  • Kim, Jung-Sool;Kang, Byung-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1204-1215
    • /
    • 1998
  • In this paper, we propose a scenario representing method, a specification language, and a verification technique for OARTS(Object based Approach for Real-Time Systems). As well as the general modeling method(event trace diagram), this study includes a specification language and a verification technique because there was no study about methodological level technique for scenario development as yet. Centering around the synchronization problem of transition of external modules which are the communication interfaces based on the objects, we lay stress on the representation of sequence of external events and internal action transitions. From the results of practical experiences, it has been ascertained that the proposed method reflect well the requirements in the analysis step, and its validity of the representation has been identified by a conceptual verifier. We support that it can serve as an analyzing tool for representing a general real-time scenarios also.

  • PDF

The Design of Operation and Control Solution with Intelligent Inference Capability for IED based Digital Switchgear Panel (IED를 기반으로 하는 디지털 수배전반의 지적추론기반 운전제어 솔루션 설계)

  • Ko, Yun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.9
    • /
    • pp.351-358
    • /
    • 2006
  • In this paper, DSPOCS(Digital Switchgear-Panel Operation and Control Solution) is designed, which is the intelligent inference based operation and control solution to obtain the safety and reliability of electric power supply in substation based on IED. DSPOCS is designed as a scheduled monitoring and control task and a real-time alarm inference task, and is interlinked with BRES(Bus Reconfiguration Expert System) in the required case. The intelligent alarm inference task consists of the alarm knowledge generation part and the real-time pattern matching part. The alarm knowledge generation part generates automatically alarm knowledge from DB saves it in alarm knowledge base. On the other hand, the pattern matching part inferences the real-time event by comparing the real-time event information furnished from IEDs of substation with the patterns of the saved alarm knowledge base.; Especially, alarm knowledge base includes the knowledge patterns related with fault alarm, the overload alarm and the diagnosis alarm. In order to design the database independently in substation structure, busbar is represented as a connectivity node which makes the more generalized graph theory possible. Finally, DSPOCS is implemented in MS Visual $C^{++}$, MFC, the effectiveness and accuracy of the design is verified by simulation study to the typical distribution substation.