• Title/Summary/Keyword: usage model

Search Result 1,970, Processing Time 0.026 seconds

Analyzing Intention to Use Shared E-scooters Considering Individual Travel Attitudes : The Case of Seoul Metropolitan Areas (개인 통행성향을 고려한 공유 전동킥보드 이용의향 분석: 서울시를 중심으로)

  • Lee, Yoonhee;Koo, Jahun;Choo, Sangho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.1-16
    • /
    • 2022
  • Recently, e-scooters have been attracting attention as eco-friendly modes of transportation in cities due to an increasing interest in the environment. Accordingly, various studies on usage behavior are being conducted, but studies that reflect individual travel attitudes are insufficient. Therefore, this study surveyed commuters in Seoul and analyzed respondents' traveling attitudes through factor analysis. It also built a binary logistic regression model for the intention to use shared e-scooters to determine how individual travel behaviors are affected. In particular, the model results showed that age, the main mode of transportation (car), walking time to the bus stop, and four travel attitude variables (disutility of travel, preference to self-drive, internet/smartphone friendliness, and willingness to pay extra money for services) significantly affected the intention to use shared e-scooters. This study is expected to be used as basic data, with aspect to travel behavior, for the efficient operation and use of shared e-scooters in the future.

A Study on the Implementation of Real-Time Marine Deposited Waste Detection AI System and Performance Improvement Method by Data Screening and Class Segmentation (데이터 선별 및 클래스 세분화를 적용한 실시간 해양 침적 쓰레기 감지 AI 시스템 구현과 성능 개선 방법 연구)

  • Wang, Tae-su;Oh, Seyeong;Lee, Hyun-seo;Choi, Donggyu;Jang, Jongwook;Kim, Minyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.571-580
    • /
    • 2022
  • Marine deposited waste is a major cause of problems such as a lot of damage and an increase in the estimated amount of garbage due to abandoned fishing grounds caused by ghost fishing. In this paper, we implement a real-time marine deposited waste detection artificial intelligence system to understand the actual conditions of waste fishing gear usage, distribution, loss, and recovery, and study methods for performance improvement. The system was implemented using the yolov5 model, which is an excellent performance model for real-time object detection, and the 'data screening process' and 'class segmentation' method of learning data were applied as performance improvement methods. In conclusion, the object detection results of datasets that do screen unnecessary data or do not subdivide similar items according to characteristics and uses are better than the object recognition results of unscreened datasets and datasets in which classes are subdivided.

Modelling of Transfer Impedance of Urban Rail Station (도시철도역사의 환승저항 모형 구축 연구)

  • Kim, Hwang Bae;Choi, Jin Hee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.1D
    • /
    • pp.11-15
    • /
    • 2010
  • It is necessary to improve transfer impedance of Urban Rail Station station users in order to increase the usage of public transportation. This study constructed a model for calculating transfer impedance based on bodily sensational transfer time in Urban Rail Station stations and calculated transfer impedance on major Urban Rail Station stations in Korea. The study results show that the addition of 100 meter exterior walking distance increases 2 minute travel time, 100 meter interior walking distance increases 3 minute travel time, 100 stairways increase 4 minute travel time, and escalators decreases 1 minute travel time. The calculated transfer impedance based on bodily sensational transfer time in this study can be utilized as objective criteria to compare transfer conditions of different Urban Rail Station stations and to prioritize them for facility improvement. The calculated transfer impedance also can be used as facility guidelines for designing a new transit center.

Concrete Reinforcement Modeling with IFC for Automated Rebar Fabrication

  • LIU, Yuhan;AFZAL, Muhammad;CHENG, Jack C.P.;GAN, Vincent J.L.
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.157-166
    • /
    • 2020
  • Automated rebar fabrication, which requires effective information exchange between model designers and fabricators, has brought the integration and interoperability of data from different sources to the notice of both academics and industry practitioners. Industry Foundation Classes (IFC) was one of the most commonly used data formats to represent the semantic information of prefabricated components in buildings, whereas the data format utilized by rebar fabrication machine is BundesVereinigung der Bausoftware (BVBS), which is a numerical data structure exchanging reinforcement information through ASCII encoded files. Seamless transformation between IFC and BVBS empowers the automated rebar fabrication and improve the construction productivity. In order to improve data interoperability between IFC and BVBS, this study presents an IFC extension based on the attributes required by automated rebar fabrication machines with the help of Information Delivery Manual (IDM) and Model View Definition (MVD). IDM is applied to describe and display the information needed for the design, construction and operation of projects, whereas MVD is a subset of IFC schema used to describe the automated rebar fabrication workflow. Firstly, with a rich pool of vocabularies practitioners, OmniClass is used in information exchange between IFC and BVBS, providing a hierarchy classification structure for reinforcing elements. Then, using International Framework for Dictionaries (IFD), the usage of each attribute is defined in a more consistent manner to assist the data mapping process. Besides, in order to address missing information within automated fabrication process, a schematic data mapping diagram has been made to deliver IFC information from BIM models to BVBS format for better data interoperability among different software agents. A case study based on the data mapping will be presented to demonstrate the proposed IFC extension and how it could assist/facilitate the information management.

  • PDF

Analysis of Research Trends in Cloud Security Using Topic Modeling and Time-Series Analysis: Focusing on NTIS Projects (토픽모델링과 시계열 분석을 활용한 클라우드 보안 분야 연구 동향 분석 : NTIS 과제를 중심으로)

  • Sun Young Yun;Nam Wook Cho
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.31-38
    • /
    • 2024
  • Recent expansion in cloud service usage has heightened the importance of cloud security. The purpose of this study is to analyze current research trends in the field of cloud security and to derive implications. To this end, R&D project data provided by the National Science and Technology Knowledge Information Service (NTIS) from 2010 to 2023 was utilized to analyze trends in cloud security research. Fifteen core topics in cloud security research were identified using LDA topic modeling and ARIMA time series analysis. Key areas identified in the research include AI-powered security technologies, privacy and data security, and solving security issues in IoT environments. This highlights the need for research to address security threats that may arise due to the proliferation of cloud technologies and the digital transformation of infrastructure. Based on the derived topics, the field of cloud security was divided into four categories to define a technology reference model, which was improved through expert interviews. This study is expected to guide the future direction of cloud security development and provide important guidelines for future research and investment in academia and industry.

Analysis on Lightweight Methods of On-Device AI Vision Model for Intelligent Edge Computing Devices (지능형 엣지 컴퓨팅 기기를 위한 온디바이스 AI 비전 모델의 경량화 방식 분석)

  • Hye-Hyeon Ju;Namhi Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • On-device AI technology, which can operate AI models at the edge devices to support real-time processing and privacy enhancement, is attracting attention. As intelligent IoT is applied to various industries, services utilizing the on-device AI technology are increasing significantly. However, general deep learning models require a lot of computational resources for inference and learning. Therefore, various lightweighting methods such as quantization and pruning have been suggested to operate deep learning models in embedded edge devices. Among the lightweighting methods, we analyze how to lightweight and apply deep learning models to edge computing devices, focusing on pruning technology in this paper. In particular, we utilize dynamic and static pruning techniques to evaluate the inference speed, accuracy, and memory usage of a lightweight AI vision model. The content analyzed in this paper can be used for intelligent video control systems or video security systems in autonomous vehicles, where real-time processing are highly required. In addition, it is expected that the content can be used more effectively in various IoT services and industries.

An Analysis of the Effect of Platform Information Quality and Customer Information Quality on Customer Loyalty to Online to Offline Platforms (O2O 플랫폼 충성도에 플랫폼 정보 품질과 고객 정보품질이 미치는 영향 분석)

  • Park, Jun Sung;Park, Heejun
    • Journal of Korean Society for Quality Management
    • /
    • v.52 no.1
    • /
    • pp.23-42
    • /
    • 2024
  • Purpose: This study aims to investigate the impact of two types of information quality, which are platform-oriented information quality and customer-oriented information quality, on customers' decision-making processes in the Online to offline (O2O) platform environment. Grounded in the product brokering efficiency model, which encompasses screening cost, evaluation cost, and decision quality, a model framework was developed. Furthermore, this study explores how these decision-making processes affect customer loyalty. Methods: Given that food delivery apps are the most widely used O2O service in Korea, this study targeted users of these apps for data analysis. We conducted hypothesis testing through a purposive sampling methodology focusing on food delivery app users. A Partial Least Squares Structural Equation Modeling analysis was conducted to analyze the data. The data collection occurred via an online survey from October to December 2021, with a total of 212 respondents participating. Results: The results of this study revealed the significant role of information quality in helping customers' decision processes while using food delivery apps. Specifically, it was found that platform-oriented information positively influences decision quality, while customer-oriented information significantly affects both the reduction of evaluation cost and the enhancement of decision quality. Additionally, the study indicated that lower evaluation costs and higher decision quality lead to increased platform loyalty. However, a reduction in screening cost did not have a significant impact on platform loyalty. Conclusion: While previous studies have overlooked the existence of two sides, service provider and user, in a platform, this research holds significance in its analysis of how information quality impacts loyalty by utilizing the two kinds of information quality. Practitioners can enhance customer loyalty to the platform by enriching customer-oriented information, thereby reducing customers' evaluation costs and encouraging more loyal usage of the platform.

Federated Learning-based Route Choice Modeling for Preserving Driver's Privacy in Transportation Big Data Application (교통 빅데이터 활용 시 개인 정보 보호를 위한 연합학습 기반의 경로 선택 모델링)

  • Jisup Shim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.6
    • /
    • pp.157-167
    • /
    • 2023
  • The use of big data for transportation often involves using data that includes personal information, such as the driver's driving routes and coordinates. This study explores the creation of a route choice prediction model using a large dataset from mobile navigation apps using federated learning. This privacy-focused method used distributed computing and individual device usage. This study established preprocessing and analysis methods for driver data that can be used in route choice modeling and compared the performance and characteristics of widely used learning methods with federated learning methods. The performance of the model through federated learning did not show significantly superior results compared to previous models, but there was no substantial difference in the prediction accuracy. In conclusion, federated learning-based prediction models can be utilized appropriately in areas sensitive to privacy without requiring relatively high predictive accuracy, such as a driver's preferred route choice.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.